Sunday 6 July 2008

A REVIEW ON A POST ON LEGAL FROM MY E-COMMERCE BLOG: UK TO GET TOUGH WITH ILLEGAL DOWNLOADERS.


Nowadays in UK, there are around 6 million people who are downloading files illegally. For example, illegal downloading materials are music and movies. These illegal downloading will cause the industry to lose millions of pounds in revenue every year.

Why does it happen? It is because the Internet Service Providers Association (ISP) bear no responsibility for illegal file sharing as the content is not hosted on their servers. It is also because the technology is becoming more effective and that allows internet providers to monitor what content is being downloaded. This is also likely to help to hurry the process of identifying pirates, and may lead to swifter disconnection, or prosecution. However, the ISP had said the data protection laws would prevent providers from looking at the content of information sent over their network. But among the content, the ISP who failed to enforce the rules could take legal action and details of customers suspected in illegal downloading can be made available to the courts.

Therefore, UK has proposed a new law that will take action against the users who use their account to access pirated material by the internet services provider. As I found out that the UK government is working on the new law now to have this illegal down loader's internet connection to be cut off.


by Ng Pei Qi

Sunday 29 June 2008

Corporate Blogging: A new marketing communication tool for companies



Corporate blogging enables the employees of the company to express their ideas about the aspect of the company. Due to the advancement of technology, it is imperative for company to choose to blog in order to know the feedback of their newly launched product or managing relations within or outside the company.

In fact, there are 2 types of corporate blogging, internal and external. For internal blogs, the employees can participate freely by accessing to the intranet to discuss the company’s issues, communicate with different levels of managerial personnel to share the knowledge and information of the company. While, extranet blogs serve as marketing tools to promote the new company product, announce the upcoming events, and clarify the grapevine to the stakeholders of the company. Therefore, the corporate blogs can promote the openness and honesty of the company which contribute to a higher level of reputation in organizations.

Take an example of the coca-cola conversation blog http://www.coca-colaconversations.com, which initiated by Phil Mooney, an archivist for the Coca-Cola Company for the last 30 years. The information shared is about coca-cola history to the value of collectibles. The impressive topics include recipes, memorabilia, and collectors of coca-cola. From the weblogs, the reader can really know more about coca-cola and the curiosity of the brand also can be fulfilled. Indeed, corporate blogs can serve as a marketing tool to promote the products or service and improve the corporate image.

Lastly, there are many well known companies also involves in corporate blogging including:

1. Johnson & Johnson

http://www.jnjbtw.com/

2. Delta Airlines

http://blog.delta.com/

3. Guinness

http://www.guinnessblog.co.uk/

4. Accenture

http://www.accenture.com/Global/Research_and_Insights/Accenture_Blogs/

by Ngan Sin Yin

THINGS TO TAKE NOTE TO PREVENT E-AUCTION FRAUD WHEN A CONSUMER PARTICIPATING IN AN E-AUCTION


eBay, the largest Internet auctioneer, has introduced several measures in an effort

to reduce e-auction fraud. However, some are free, some are not. The following are some of eBay’s antifraud measures:

1. User identity verification

eBay uses the services of Equifax to verify user identities for a $5 fee. Verified eBay User, a voluntary program, encourages users to supply eBay with information for online verification. By offering their Social Security number, driver’s license number, and date of birth, users can qualify for the highest level of verification on eBay.

2. Authentication service

Product authentication is a way of determining whether an item is genuine and described appropriately. Authentication is very difficult to perform because it relies on the expertise of the authenticators. Because of their training and experience, experts can (for a fee) often detect counterfeits based on subtle details. However, two expert authenticators may have different opinions about the authenticity of the same item.

3. Grading services

Grading is a way of determining the physical condition of an item, such as “poor quality” or “mint condition.” The actual grading system depends on the type of item being graded. Different items have different grading systems—for example, trading cards are graded from A1 to F1, whereas coins are graded from poor to perfect uncirculated.

4. Feedback Forum

The eBay Feedback Forum allows registered buyers and sellers to build up their online trading reputations. It provides users with the ability to comment on their experiences with other individuals.

5. Insurance policy

eBay offers insurance underwritten by Lloyd’s of London. Users are covered up to $200, with a $25 deductible. The program is provided at no cost to eBay users.

6. Escrow services

For items valued at more than $200 or when either a buyer or seller feels the need for additional security, eBay recommends escrow services (for a fee). With an easy-to-access link to a third-party escrow service, both partners in a deal are protected. The buyer mails the payment to the escrow service, which verifies the payment and alerts the seller when everything checks out. At that point, the seller ships the goods to the buyer. After an agreed-upon inspection period, the buyer notifies the service, which then sends a check to the seller. An example of a provider of online escrow services is tradenable.com.

7. Nonpayment punishment

eBay implemented a policy against those who do not honor their winning bids. To help protect sellers, first-time nonpayment results in a friendly warning. A sterner warning is issued for a second-time offense, a 30-day suspension for a third offense, and indefinite suspension for a fourth offense.

8. Appraisal services.

Appraisers use a variety of methods to appraise items, including expert assessment of authenticity and condition and reviewing what comparable items have sold for in the marketplace in recent months. An appraised value is usually accurate at the time of appraisal but may change over time as an item becomes more or less popular in the marketplace.

9. Verification.

One way of confirming the identity and evaluating the condition of an item is through verification. With verification, neutral third parties will evaluate and identify an item through a variety of means. For example, some collectors have their item “DNA tagged” for identification purposes. This provides a way of tracking an item if it changes ownership in the future.


by Leong Yen Teng

E-Government in Malaysia: Its implementation so far and citizen’s adoption strategies.

Malaysia has improved vastly on its ranking worldwide. From number 157 to number 25, that’s a great jump in fact! We, as citizens of Malaysia, feel the change and have done ourselves a great deal of changes too, to adapt to this newly introduced technology. It has helped us is a lot of ways, and made our lives so much easier.

Some of the successful implementations include government’s drive for e-government services, Electronic Labour Exchange, SMS alert on e-government services, online renewal of driving licenses, Electronic filing of income tax forms, voter information, details for government tenders and employment opportunities. All these have in deed made our lives so much easier and advance. Things have been so much efficient compared to before.

However, despite the success, there are bound to have failures. There are a few unsuccessful start-ups, which maybe the government are doing something about it to improve or make it happen.

We as the people who are using such services, we have made a vast improvement on ourselves regarding our knowledge on these technologies. Internet has been an essential part of our lives, and we use them for almost everything if possible. To pay our tax, to renew our license or any membership, banking and also our bookings for flights and rooms, these are all the activities that we can do just with a click of the finger, no car driving, no jams and most of all, no waiting!

by Liew Yilin


reference:
http://ecommerze.blogspot.com/search/label/e-Government

Monday 23 June 2008

the application of pre-paid cash card for consumers.

A pre-paid cash card is similar to a debit card, credit card or smart card. As we know, what debit cards and credit cards are because it is normally used by the consumers but we seldom hear about smart cards. Smart cards is an electronic card containing an embedded microchip and looks like a plastic payment card. It is usually a “read-only” card, similar to a credit card. There are many types of application pre-paid cash that can be made by the consumers but I will choose two most common ones to discuss.

Firstly, it is applied for retail purchases. It is a purchase similar to credit cards. It also can be extended with other payment services. In the retail field, many of these services are aimed at those establishments where payments are usually made in cash, speed and convenience. For example, E-purses and contactless payments represent this type of value-added service. With an e-purse smart card application, money is loaded into the card from the cardholder’s bank account and the cardholder’s account is immediately debited. The value is transferred to a floating account at the bank or the system operator. This transaction is carried out online and is PIN protected, just like a cash withdrawal from an ATM. Cardholder’s can use their e-purses anywhere where e-purses are accepted. When an e-purse is being used, the value is transferred from the e-purse to the terminal and the value remaining in the e-purse is adjusted. Therefore, consumers can enjoying shopping with this pre-paid cash cards without bringing any cash in hand

Secondly, it can be used for transit fares. This program started in US in 1999 and is a permanent, contactless, rechargeable fare card that can hold up to $300 in fare value. This card can be used with 17 different transit systems including Metro-operated parking lots, the Metrorail, Metrobuses and other regional rail services. These transit cards also can be combined with payment cards that can be used to purchase goods and services such as snacks, bridge tolls, parking fees, or food in restaurants or grocery stores located near the transit stations. In addition, to handling transit fares, smart cards and other e-payment are being used for other transportation applications.

by Ng Pei Qi

Credit card debts: Causes and Prevention


Credit card can be either very useful or harmful. It is all depend on how you utilize it. Recently, more than 6000 credit cardholders were declared insolvent and incurred RM2.5 billion of bad debt to the credit institution.

There are several causes that will lead to credit card debt. However the main contributor is laid on the habits of the credit cardholders. Some people like to buy on impulse and even spend more than what has they earned.

First, it is because their expense is greater than income. They misused the application of the credit card that is spending now, pay later. They might spend their future money which will make the purchase to be convenient and seem as if their purchasing power has increased. However, by doing so, the transaction made is transformed into a new debt. Of course the cardholder will opt for minimum payment per month instead of the full payment. Thus, the monthly balance will be charged higher interest and lead to greater debt.

Secondly, by having too many credit cards the users will get addicted using their cards as they perceive that they should “fully utilize” their offer from credit card institution. They will end up too many debts

The worse scenario that can ha[[en is when the cardholders use one credit card to pay off other cards. Eventually, the credit card debt will roll bigger with additional interest.

We should limit ourselves from using credit card if there is sufficient cash in hand. Moreover, we should plan our budget before we spend on something and control ourselves from adding more debt. If this behavior can be maintained in the long run, our debts will decrease gradually.

Reference:

http://www.ecommercetimes.com/story/51756.html

http://ecommerze.blogspot.com/2008/05/more-than-6000-card-holders-in-malaysia.html

http://ecommerze.blogspot.com/2008/01/5-bad-habits-for-getting-into-debts.html

http://ecommerze.blogspot.com/2008/01/10-warning-signs-of-credit-card-debts.html

by Ngan Sin Yin

A REVIEW ON A POST ON E-TAILING FROM MY E-COMMERCE BLOG: USING TOUCH N GO CARD TO BUY FAST FOOD IN MALAYSIA WILL BE A REALITY





The next time you go to a fast-food stall for your burger or doughnut, need not worry if you have forgotten your money as all you need is your Touch ’n Go card.

Now, one can buy such items from 21 outlets in the Klang Valley under a pilot scheme for the Touch ‘n Go card which is currently a toll, public transport and parking paying device.

The outlets are from A&W, Burger King, Dunkin’ Donut, 7-Eleven, Carrefour hypermarkets, Caltex convenience stores and Cineleisure.

According to Touch ’n Go chief operating officer, Hasni Zarina Mohamed Khan, this project would be the start of the card being used for retail purchase. Describing it as a natural progression, she pointed out that the card was an electronic purse and supports Bank Negara’s move for a cashless society.

She said even for the Octopus card – the transit electronic purse in Hong Kong that is one of the most successful in the world – only 20% of the holders use it for retail purchase.

Consumers need not worry about hidden cost because all the chain stores have an agreement that there will be no extra charges for those using Touch ’n Go cards compared to those using cash. If the item is RM1 then it will still be RM1 if you are using Touch ’n Go card to make payment.

Hasni Zarina also said that cardholders could top up the value of their cards to RM1,000 and need not worry if the cards were lost or stolen.

What they need to do is to inform the management immediately if card were stolen and they will block the card. Then a new card with the remaining value will be issued to replace the stolen card.

The card could also be a good way of controlling children’s spending as this could be their one card from taking public transport to buying their lunch or snacks.

by Leong Yen Teng

Mobile payment systems in Malaysia: its potentials and consumers’ adaptation strategies:

There are many electronic payment methods, which includes electronic payment cards. Virtual credit cards, smart cards, person-to-person payment methods, payments made electronically at kiosk, and many more. E-payments for business-to-business include electronic checks, purchasing cards, EBT, EFT and many more.

The mobile channel can be effectively used as a self-funding and revenue generating medium.

In Malaysia, these services are developed at a very fast rate. Its has been increasing rapidly and improving day by day. In fact, its popularity can be viewed through the bar chat.

There are some characteristics that makes it so Famous. Besides being an independence device, its divisible, safe and has little transaction fees. It is easy to use and has certain regulations that make it very reliable.


Malaysians have made various improvement and changes to adapt and use e-payment systems. Companies have changed to a computerized era and have upgraded their own knowledge on IT. To support such a system, they have to make sure it is easy and simple for their customers to use. Besides being user-friendly, there are customer service departments to assist users who are illiterate in IT to use such a system too. Companies have made use of the internet to help improve their own efficiency and also customers’ convenience.


Education has played a part too. Children of this generation rely highly on the internet. They used it everyday to send e-mails, finding information and even keep in touch through many applications online.

E-payment has become an essential part of our lives today, making it very easy and convenient. Thanks to the IT development, we can save the hustle and bustle on the road and paper work, being more environmental friendly.

by Liew Yilin

Wednesday 18 June 2008

The threat of online security: How safe is our data?

The Internet should be a safe way to shop. However, security relies on alertness and you should extremely pay attention to safeguard your data when you are online.Online security is an essential issue for all internet users. The threats are always changing so it's important to ensure antispyware and anti-virus software always up to date.

There are several cases that could increases our awareness of importance of the security of data. For example the theft of the laptop which contain of a lots of confidential information can put the record at risk. As a consequences the data could be misused by the other party who with the crime intentions.

Accidental actions that will lead to the threat to our security data include as poor password options or the losing of CD. A poor password choice could encourage cybercriminal take only few second to hack in. The users with lack of knowledge about online security concepts are necessary to be educated to safeguard their data. Otherwise, these threats can result financial loss, legal liabilities, breakdown of duty of care and so on.

The next possibility of exposures of security data are the hacking activity. There are also cases that revealed that even a big organization like hospital or university could be hacked. The loss of the important information such as financial, bank accounts, phone number, salary details and so on. This data can be abused to apply the loans or credit cards.

Therefore it is advisable to have the full alertness towards the maintenance of the confidential information or privacy. Otherwise, exploitation on data by the cybercriminal will bring us only a tragedy.

Reference:

http://www.theregister.co.uk/2007/03/28/hospital_laptop_theft/

http://www.theregister.co.uk/2007/04/04/ucsf_computer_security_alert/

http://www.theregister.co.uk/2008/01/07/lib_dems_data_losses/

by Ngan Sin Yin

Monday 16 June 2008

Phishing: Examples and its prevention methods.

Phishing is a new type of network attack where the attacker creates a copy of an existing Web page to trick users by using specifically designed e-mails or instant messages into disclosing your private information that will be used for identity theft. Typically, the e-mails come from well known and trustworthy Web sites such as PayPal, eBay, MSN, Yahoo, BestBuy, and America Online. The e-mail directs the user to visit a Web site where users are asked to update their personal information, such as passwords and credit card, social security, and bank account numbers, that the authorized party already has. This practice is sometimes referred to as "fishing" because the attacker is fishing for user private account information. Typically, attackers try to trick user into providing user name and password so that they can gain access to an online account. Once the attacker gains access, they can use the user’s personal information to commit identity theft, charge user credit cards, empty user bank accounts, read user email, and lock user out of the online account by changing user password.

One of the examples is WesBanco Bank, Inc. WesBanco is a multi-state, bank holding company. The headquarters is in Wheeling, West Virginia. Deposit and nondeposit products are available through the WesBanco companies. WesBanco has been phishing attacks in the last few weeks. The prevention that WesBanco do is that they will upgrade the servers to withstand this severe flow of attacks. In addition, they will be implementing additional security features in their online banking service. Due to these upgrades, user may experience interruptions while using WesBanco’s online banking. There is another method that can prevent users from being trick, that is update their WesBanco online banking information by clicking the link below: https://onlinebank.wesbanco.com/update

Another example is PayPal where spelling mistakes occurs in the e-mails and the presence of an IP address in the link(visible in the tooltip under the yellow box) are both clues that this is a phishing attempt. Another difference is the lack of a personal greeting, although the presence of personal details would not be a guarantee of legitimacy. Besides that, other signs show the message is a fraud are misspellings of simple words and the threat of consequences such as account suspension if the users fail to comply to the message's requests. The PayPal prevents these problems by advising the users of PayPal never to provide their password to unknown persons. PayPal will automatically update the users’ confidential details using the Secure Sockets Layer protocol (SSL). PayPal will not ask their users to enter their password in an e-mail as well.

It is our responsibility to be aware and alert for these kind of threats.

by Ng Pei Qi

A Review on a post on Internet Security from My E-commerce blog

According to the blog, I have realized a lot of things on what security is and how important is it to protect ourselves.

For the China’s case, 1 million in 12 months is a lot. viruses, worms, and Trojans being able to reach this scary figure indicates a loud warning sign. Ironically, as long as there are virus an all these in this world, there are antivirus software and others. They seem to come as if they were planned. Adding the calculation made that 1 million out of 130 million which is about 0.77% malwares found in china, this is a scary amount. Added to the disaster, China can fall back in a lot of knowledge and updates in the current world. It is the internet that keeps everything alive!

Malware is another dangerous thing. It is all out to fool anti-virus programs. Which means our anti virus might not be able to detect it. Now, it all happened vastly during year 2007. Question is why? Was it because of the unstable economic condition that made people find means to get money? Or, was it due to some enemy between the countries top military peoples? Or is it due to more and more criminals out there on the loose, getting revenge against whoever they want to? In fact, hi-tech criminals are actually trying to mixed up programs created to detect them.

Many security firms for example, Panda Software, AV Test and f-secure have reported a significant increased in the viruses found online. Which means it is no longer that safe anymore for us to serve the net as we used to in the past. To the extent that even bloggers are being threatened? Like for the joke on the John cow web being hacked? That was a funny yet interesting one, but only to the extent that no harm was caused. Actually, it shows how important it is to prevent and protect our blogs from being hacked. Besides overriding our personal rights and disturbing our private peaceful lives, these hackers are nothing but a bunch of nonsense. Various prevention is recommended and to me, better safe than sorry.

To me, sometimes messages needed to be passed on, or conveyed on to attract people’s attention onto something serious is important. Yes, the method is indeed very important. But, to use such ridiculers and absorb way is a little insensible isn’t it? It misleads others making others having to go through many unnecessary troubles. Maybe US people think differently. According to the comments given, I guess only a hand full are acting and thinking normally.

Indeed fighting cyber terrorism is important, but I personally hope this sum of money spent is not misused again. People want to see results, the outcome for such an amount paid. The serious cyber war that occurred in Estonia is astonishing. No one is hurt, no blood spilt, no killings, no bombing, no nothing. But, the damage is severe. Its such a small place. In fact, not counting in my low geography knowledge, I myself have never heard of this place before! I am also quite certain, cyber war won’t stop. This is merely the beginning of a cold and brutal war.

The best examples for spams are the junk mails we received in our mails. There are so may types of spams. For example, spam in blogs, mobile phone messaging (my 1st encounter) and internet forum spam. The new tactics like PDF spam, Piggyback Spam and greeting card spam are interesting. The innovative hackers or rather spam creators, used various ways to get their spamware into out personal pc. But, it looks like they’re going to have a hard time now since we are all aware of such things.

As for the Pentagon’s case, the US Defense Security really doesn’t use emails? This sounds like a joke to me. Sources of hackers include recreational hackers, self-styled cyber-vigilantes, various groups with nationalistic and ideological agendas, trans-national actors and nation-status.

Now this really attracted my attention. I don’t know if I am being ignorant about what’s going on but, I really have never of mobile malware? It seems even mobile devices can be affected! This is a dangerous indication. It seems as if everything we use, do have might become a threat to our own lives. There are several potential threats and also some prevention too. We should really take not of them.

To me, everyone has their rights to personal life. These stealing indirectly cause people to loose their privacy. Its like, putting an advertisement of your biodata including other information which are private and confidential having the perception that everyone on earth holds a right to your life! No way!! This is too much. Sometimes, for their own benefits, humans are willing to do anything and just everything to get what they want. Now that’s what I call reality. However, since company’s and organizations are holding people’s personal data, regardless of whether is it P & C or not, it is the trust entrusted to them by users. It is only the company’s responsibility to make sure everything is in tip top condition. They should be given the 1st top priority when it comes to security.

Well, what can I say? Competition is everywhere. But, the fact is, dirty works turn me really off. Why can’t people compete fairly? Oh well, nothing’s fair. The only thing that is fair given by God, is 24 hours a day. That’s all. Not even justice and law of the high courts make fair equal judgment sometimes.

To me, these hackers are genius. Like the guy from Singapore? To me, I felt that the government should really make use of these kind of people to really track and hack down hackers. Well, they are one of a kind. It is possible that only an actor will recognize another actor. That’s very true. Remember the show, Catch Me if You Can? Now, that’s the best example.

There are always new treats coming up everyday. And, we can’t stop these things from happening. All we can do is just read and update ourselves to make sure we are at the safe side. That’s the best we can do to stop all these from becoming more famous. Just like, stop the killing by stop the buying.

by Liew Yilin

HOW TO SAFEGUARD OUR PERSONAL AND FINANCIAL DATA?

As Internet criminals grow smarter and sneakier, it's increasingly difficult to keep our personal and financial data safe. If we don't take basic steps to protect our information, we may find ourselves a victim of fraud or identity theft.

To ensure that we don't fall prey to cyber fraud, be sure to follow these top 10 rules to ensure our information safe online:

1. Install a firewall.

A firewall is a software program designed to allow good people in and keep bad people out. Most new computers come with firewalls integrated into their operating systems. Those who have a DSL or cable modem have an added layer of protection because these modems come with yet another firewall built in. If you have an older computer or use dial up, you may need to purchase a firewall separately and install it yourself.

2. Install and update antispyware and antivirus programs.

Microsoft and numerous application vendors offer users regular updates to existing antispyware programs, so be on the lookout. As for antivirus protection, Symantec and Norton antivirus are popular choices.

3. Avoid accessing financial information in public.

Resist logging on to check your bank balance when working from a coffee shop that offers wireless access. These systems are convenient, but also unknown. Casual users have no way of assessing how sturdy their firewalls are.

4. Update your browser.

Updating your browser on a regular basis can help plug up security holes, so make it a habit.

5. Look for "locks."

The Web address should start with "https" instead of "http". Also, look for small lock icon in the lower-right corner of the browser window.

6. Don't open mystery attachments.

Never open an attachment or click on a link sent to you by an unknown party. Attachments can contain viruses and links can lead unsuspecting users to dummy sites where they are asked to input financial information.

7. Don't be paranoid, but be aware.

We don't need to be scared, but we need to be cautious and cognizant that there are people on the Internet that will take advantage if we allow them to. If something doesn't seem right, trust your gut.

8. Be cautious about providing your information.

Don't give your financial information or personally identifying details to organizations you don't know or haven't dealt with before. It's important to know that giving simply personal information such as date of birth and mother's maiden name can be just as dangerous as financial information.

9. Be careful of the merchants with which you deal.

Try to make sure it is a legitimate site; not just a spoof of a real site. Only do business with reputable companies.

10. Keep your eye out for scams.

Many people have become familiar with common scams and delete them without hesitation, but now there are more convincing scam e-mails. If you receive an e-mail from any institution asking for your personal or financial information, even if it appears to come from a place you trust such as eBay or Bank of America, do not respond. Instead, pick up the phone and call to verify that information if necessary.

by Leong Yen Teng