Mobile payment (m-payment) systems have been developed in recent years to facilitate purchases of products, services and content in mobile and electronic commerce and also at physical points of sale. It is a point-of-sale payment made through a mobile device, such as cellular telephone, smartphone or personal digital assistant (PDA). Instead of paying cash, cheque or credit cards, a consumer can use m-payment to pay for a wide range of services and digital or hard goods.

Examples of M-payment systems that available in Malaysia and its potentials are:

Mobile Money
Hong Leong Bank has teamed up with a Malaysian company, Mobile Money International Sdn Bhd to bring its customers this innovative payment system. It unlocks the power of the mobile phone to make payments and allows card members to pay for goods and services using a mobile phone coupled with a 6-digit security PIN (Personal Identification Number) via SMS. This unique method of payment is called as “Mobile Money”. It is secure as the mobile phone is linked to the Hong Leong Mobile Credit Card account and the security PIN is set by the customer which used for approval of each payment. Its convenient will encourage more consumers to shop online which will definitely be a great boon to the e-commerce industry in Malaysia. For details, please refer to http://www.hlb.com.my/news/2005/corn148.jsp?flag=102005 and http://www.neowave.com.my/mobilemoney_overview.asp


TeleMoney
TeleMoney is Malaysia’s first mobile payment service via multi-channel access for Internet and wireless transactions that launched in November 2001. Through TeleMoney, Malaysians can enjoy a secure and convenient method to conduct mobile commerce using a GSM cellular phone. It is a service free of banks and telco dependence. A consumer with a credit card or debit card with a cellular phone can register for this service. To register, a consumer only need to have a GSM phone and a TeleMoney personal identification number that connecting it to a credit card, debit card, stored valued card, bank account or even the phone account.

Maxis FastTap
Malaysian mobile operator Maxis launched the world’s first contacless mobile payment system based on NFC (Near Field Communications) technology on April 2009. This m-payment system is called as Maxis FastTap. It is an integrated mobile payment service established under a partnership with Nokia, Visa, Maybank and Touch ‘n Go and available only on the Nokia 6212 classic device. NFC is a short-range wireless technology that allows communications between devices at close range. It offers high levels of interoperability between devices and readers and global standard for contactless mobile payments with a wide range of features that allows credit card, debit card, ticketing and transportation payments to be integrated into a mobile phone. For details, please refer to
http://www.telecoms.com/10397/maxis-brings-nfc-payments-to-malaysia and http://mis-asia.com/news/articles/worlds-first-contactless-mobile-payment-system-launches-in-malaysia

Mobile Wallet
Mobile wallet is mobile phone that has functionality to replace a traditional wallet and more. It stores personal and sensitive information like passport, credit card information, PIN codes, online shopping accounts, booking details and insurance policies that can be encrypted or password-protected. This technology aims to reduce the number of items that people need to carry around. With mobile wallet, consumer can use their mobile phone to pay transactions at merchants that accept mobile payments. The user just needs to upload digital cash from a credit card to their mobile phone and swipe their mobile phone at payment counters. For details, please refer to http://www.mobileworld.com.my/v1/content/view/219/62/

The developments of m-payment systems have simplified our busy life and making consumers’ everyday lives more convenient. It is predicted to have a bright future as m-commerce becomes more popular. Even it is still new and in developing process in Malaysia, but it is believed that the use of m-payment system will becomes a part of Malaysian daily routine. However, the acceptance of mobile payment systems depends on many factors including usability, costs, security and convenience issues.

In order to attract and encourage consumers to using the m-payment systems, few strategies can be carrying out:

o Organize activities such as advertisement and campaign to educate public about mobile payment systems and how the systems work
o Enhance the security of those m-payment systems to built users confidence
o Simplify the procedures that need to follow by the users in using m-payment systems to increase users’ satisfaction.
o Collaborate with more banks to facilitate and widen the use of m-payment around the world
o Lower down the costs that will be charge for each transactions that made through m-payment systems

Other References:
http://www.prlog.org/10138966-commerce-on-the-go-mobile-payment-systems-and-solutions.html
http://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci772807,00.html
http://www.zdnetasia.com/news/communications/0,39044192,39001884,00.htm

Hello, it has been one week time I never update my blog, last two week I have share with all of you about revenue model of some e-commerce website and discuss with all of you whether there are some threat of internet or how safe of our data is. I think it make all of you understand even more how online transactions work and how we can be safe by using it. Today, I will like to share further with all of you again, which it is about how actually those payments being make for those transactions online? If all of you still confuse how online transactions make the payments and receive the payment, here got some useful information for all of you. Actually those payment make or transfer is calls Electronic Currency.


Electronic Currency (also known as electronic money, digital currency, digital money, electronic cash, digital cash, and digital money) is the money or scrip which is exchange electronically, which is through use of computer network, internet and also digital stored value systems. In more detail, e-currency means the money that can use for shopping, do investment via internet by through credit card payment or some other payment methods. There are few popular example of electronic currency which is:


~Webmoney
~1MDC

~ e-gold














~e-bullion
~ Pecunix

~ Liberty Reserve



Typically it has two major types of electronic currency, which major different is the backed base, the types is describe below:

1) Backed by Precious Metal – such as e-gold which it is backed by gold
2) Backed by Hard Currency – example like Paypal



This is the link that got further explanation of the type of electronic currency:


http://www.giexc.com/

There are some major characteristic of electronic currency which is:

• The transfer of electronic currency is instant and ‘real time’ and cannot be reversed. It is just same like when you have purchase a cup of drink from a restaurant and you had pay for it, after that if u suddenly feel regret and would want to refund back for the payment, it is impossible because the transactions are final and not reversible in this kind of situation, so same situation apply by using electronic currency.

• Secondly, the transfer of electronic currency is private and anonymous for the sender and receiver, it means that normally it would not show the real identification of the sender and receiver and generally the account titles shown during transaction are numbers, nick names or email addresses. Additionally, just like actual cash, the source of the funds is never disclosed to the receiver.

Further explaination:
http://www.nowpublic.com/what_is_digital_currency_digital_money_real_cash

Requirement of Electronic Currency
1) Security
2) Anonymity
3) Scalability
4) Acceptability
5) Off-line Operation
6) Transferability
7) Hardware Independent


For the explanation and example of above requirements of electronic currency, you can refer to this link file:

http://clifford.neuman.name/papers/pdf/9311_netcash-medvinsky-neuman-cccs93.pdf

After share with all of you about the types, characteristics and requirements of the electronic currency, now I would like to share about benefits and limitation or disadvantages using electronic currency.

Benefits
1) Convenient
- provides users a quick, simple and safe way for shopping instead of showing their credit card information to merchant who they do not know
- offer a variety of services without having to handle physical cash or checks. Customers do not have to wait in lines; this provides a lower-hassle environment.
- Debit cards and online bill payments allow immediate transfer of funds from an individual's personal account to a business's account without any actual paper transfer of money. It saves up the time of process and doing paper work.

2) Low Transactions Cost
- Unlike other businesses that eat up your profit with exorbitant fees, electronic currency trading allows you to do business with minimal fees giving you more profit and more money for you.

3) Anonymity and Detection of Double Spender
- Highly confidential for users ID and also information and real-time checking of all transactions make the possibility of multiple expenditures negligible.

4) Globalization
- allows access to a global market where not restricted and controlled by local currencies.







Disadvantages or limitation:


1) Fraud or Criminal Activities
- hacking into bank accounts and illegal retrieval of banking records has led to a widespread invasion of privacy and has promoted identity theft.

2) Failure of Technology
- such as network breakdown, defected by virus or worm, power failure that cause loss of data and record may be one of the issue of electronic currency.





3) Privacy

- it is still an issue of how safe the confidential information of a credit card or debit card holders to be protected and personal information will not be misuse.


4) Costly to Implemented and Massive Databases
- Additional required of hardware is quite costly for installation and the bank have to maintain a detailed and confidential database which required them to have massive databases.

Below are some link that describe further about the Advantages and Disadvantages of electronic commerce, anyone interest can surf for it and understand it further.

http://www.romow.com/business-blog/benefits-of-e-currency-trading/
http://www.iit.edu/~peacjen/cs485/ecash2.htm
http://www.buzzle.com/articles/advantages-and-disadvantages-of-electronic-cash.html
http://www.businesspme.com/uk/articles/trade/90/Electronic-money---advantages-and-disadvantages.html
http://www.learncurrencytradingonline.com/electronic-currency-trading.html





Nowadays, credit card becomes a common instruments where many peoples now use it to pay for their bill in their daily use. Actually, the procedures and terms for applying credit card in nowadays is much simplier if compare to the past time. This may due to the competition between financial institutions where they try to attract more customers by lower down their interest rates and conditions. It is not surprising if you can found out that a person can hold 5 credit cards at the same time. However, everything in this world is double sided which are the application of credit card become easier now but it is not easy for the card holders to settle their debts. So, this week let me hare with you all the causes and preventions of credit cards debts.


CAUSES:
Income vs Expenses
A person must spend their income according to their expenses. Peoples alway think that they are able to pay for the bills when they want to buy something that is more expensive which the things is not really a "NEED" but a "WANTS". Many such cases happen in Taiwan where STUDENTS are too follow blindly nowadays fashion causing them to be in the red. They bought a lot of branded goods to satisfy their vanity. Some even owe RM100K to the bank.
Little saving
Many people nowadays do not save money for their future needs. They think that they can obtain short term loan from the bank easily if they need any financial assistance. Due to this thinking, they will always spend first without considering they are able to pay for the debts in the future. Besides, because of the little savings, they will not have enough money to deal with emergency. Again, credit card become the fatest way to loan money.

Unemployment
Unemployed person normally will depend on their credit cards to pay for their spending as this is the only way for them to survive. If they still spend extravagantly for a long time then they will have accumulated too much debt which they do not have ability to pay for it. Lastly, they will end up by declared bankruptcy.



Pay only the minimum

Some credit card holders will choose to pay part of their debts. This normally will step up their debts because of the interest that imposed on the late payment. Thus, that money paid by them actually is paying for the interest but not for the principal. If thing keep going for long time, then the debt will increase more and more.

PREVENTIONS:

Have a good money management

A person will need to have a good spending plan to keep track of their bills. This will help them to identify where is their money is going. Actually, it is good to form this habit because it can control their expenses where they only buy thing that they need.
Save money

Always save money...This is because cash is the most liquidity asset which it can be used when there is an emergency and future needs. Having enough saving for a rainy day is always a worthwhile investment.You will be more thankful if you have enough money on hand in case of emergency.



Pay on time
Never made late payment to any debt whether is your credit card debts or your car and housing loan. This is because the interest is calculated based on the daily balances. Pay on time will help you to save money on interest. Do not look down on the interest because it may be the main killer in settling your debts.
Self-control
Do not be a shopaholic!!! Buy whenever you needs but not useless things. Limit the "plastic" in your wallet or purse. This will restrain you from being overspend. Spend according to your income but not the fashion.
Choose the right card
Customers must read the terms and conditions carefully especially the fine print before they apply for the credit cards. This is because some financial institutions will imposed extra charges which you would not realized of it. You must understand everything from your interest rates and fees to how to earn rewards from your credit card. This can let you prevent from being charge more for your credit cards.More on this topic: http://www.cardratings.com/howtochoosetherightcreditcard.html

Reference:


Third parties refer to Certificate Authority (CA) who issue digital certificates to verify that a particular website is representing its company. One of the famous application of 3rd party certification programme in Malaysia is provided by the MSC Trustgate.com Sdn Bhd. MSC Trustgate.com Sdn Bhd was incorporated in 1999 as a licensed Certification Authority (CA) in Malaysia under Digital Signature Act 1997. It aims at catalyzing the growth of e-commerce by creating a trusted e-environment that helps businesses to expand in the new economy. It provides security solutions and trusted services to help companies build a secure network application infrastructure for their electronic transactions and communications over the network. The services that provides by Trustgate are SSL Certificate, Managed PKI, Digital ID, MyTRUST, MyKAD PKI, SSL VPN, Managed Security Services, VeriSign Certified Training.




SSL Certificate
Trusgate provides two SSL Certificates due to the increase of phishing attacks on the Internet. It helps the customers to ensure that they are dealing with trusted parties and their information traveled over the Internet was reaches at intended recipients. The two certificates are Global Server ID and Secure Server ID. Global Server ID adopts today's strongest encryption commercially available for secure communications via Server Gated Cryptography (SGC) technology while Secure Server ID protect the transfer of sensitive data on network using a minimum of 40-bit and up to 256-bit encryption. It includes VeriSign that provides security solutions to protect the network and consumers of the organization.

Managed Public Key Infrastructure (MPKI)
MPKI service is a fully integrated enterprise platform designed to secure intranet, extranet, and Internet applications by combining maximum flexibility, performance, and scalability with high availability and security. The service allow enterprise to quickly and cost-effectively establish a robust PKI and Certification Authority (CA) system with complete control over security policies, PKI hierarchies, authentication models, and certificate lifecycle management.

Digital ID
The use of Digital ID to sign and encrypt the transactions can ensure that the confidential information is secured. Digital ID is an electronic credentials that uses private key and public key to facilitate the following operations:

Authentication – you are who you claim you are
Privacy – your confidential data remains private
Authorization – control user access rights to important data
Integrity – be sure data is not altered behind your back
Non-repudiation – have the evidence in the event of a dispute

MyTRUST
SIM card can turns into a Mobile Digital Identity for secure mobile banking and other financial services with MyTRUST. Mobile digital signature provides non-repudiation on transactions under the Digital Signature Act, 1997. It runs on Wireless PKI platform and Mobile Operator infrastructure. PKI-enabled SIM cards are preloaded with MyTrust application and a digital certificate from a licensed Certification Authority. Therefore, users are able to digitally sign any transaction easily and conveniently via their mobile phone.

MyKad PKI (MyKey)
MyKey is the MSC Trustgate.com Sdn. Bhd.’s Digital Certificate which is loaded into MyKad. It is governed by Malaysia’s Digital Signature Act 1997 and is accepted by the Malaysian government. Mykey allows its users signed document digitally. The document is treated as a legal binding document as it is with a handwritten signature.


SSL Virtual Private Network (SSL VPN)
SSL VPN provides secure remote access based on the web security standard SSL (Secure Socket Layer). SSL VPN can be configured to access multiple intranet sites with single sign-on. Users can get access to intranet, e-mail and business system from wherever they are and whatever device they choose. Besides, it provides an advanced policy management component to authenticate users and type of device they are using.


Managed Security Services
Valuable business resources that are accessible over the network need to be protected against misuse to ensure the business runs smoothly. Trustgate provides full set of security solutions to help companies build a secure and reliable environment for their organization. Trustgate’s consultants have extensive experience in implementing IT security and conform to SAS 70 standard. They are committed to deliver effective security infrastructure to protect organization’s network from attacks.


Verisign Certified Training
Trustgate has been appointed as Asia's first VeriSign Authorised Training Centre. Under the partnership, Trustgate and APIIT (Asia Pacific Institute of Information Technology) jointly facilitate the delivery of VeriSign’s high-end Security and E-Commerce programmes.

The projects that have been implemented by Trustgate in Malaysia included:
~E-banking Security Deployment
~E-procurement Integration
~User Authentication and Customer Clearance Approval System
~PKI for Online Transaction Payment System
~PKI Development & Integration for Malaysia’s National Identification Card “MyKad”
~PKI Infrastructure for E-government and E-business Transactions
~Secure Document Storage System
~Project Management and Application System Development
~Security Consultancy & Outsourcing Services

Reference:
http://www.mykey.com.my/Website/home.php
http://www.trademal.com/global/index.php/id/17463/key/trustgate/MSC_Trustgate_com_Sdn_Bhd/index.html http://www.msctrustgate.com/

It’s cool of storing a lot of music, movie, photo, working paper, and some secret inside our computer. However, we will feel shock when we suddenly notice our personal things being uploaded in some website, or lost of data inside the computer. How it actually happened???

How data lost?
When a normal people like us having our first computer, first of all, we will think of applying for internet connection. This makes the opening, and our human’s action continues the tragedy. When opening internet browser, we will go search for something that we want. However, if you ever typed in “word unscrambler, lyrics, myspace, free music downloads, phelps, game cheats, printable fill-in puzzles, free ringtones and solitaire”, any of these term will probably carried the chance for your computer to get hit by “malware”, that might steal away your computer data.

Impact of data lost
Lost of data might cause losses either in physical or reputation. If our financial data being stolen, it is possible that our money will be just used by anonymous for their own transaction. For businessman, every customer data that had lost might cause an uncountable loss in business.

If personal data get stolen, it is just like the incident happened in November 2006. A Hong Kong male artist, Edison Koon-Hei Chen was involved in sex photo scandal of his with 6 others females. Although this incident brings him the hottest search result in Google search engine for year 2008, however, his reputation had already become a bad one.

Common methods to safeguard personal and financial data
The most common ways to safeguard our data are through encryption, password or PIN. With a password, we can protect from letting others access our computer and account. A further protection is installing antivirus to prohibit viruses attacking. To protect home network from offensive website and hacker, it is recommended that enable the Window Firewall.

The latest technology to protect data is through biometric, which will recognize owner’s fingerprint, optical, facial structure, voice, signature, or keystroke. Everyone in this world had his own unique physiological and behavioral characteristic, therefore, using biometric for identify and verify purpose can be a higher secure than password and PIN.

Other methods to safeguard personal and financial data
We always said that, there’s better prevent than cure. For me, I more prefer take precaution rather than take action. For a normal user for you and me, here, I’m willing to share the way I safeguard my data.

First time when sign in to MSN messenger, it warns that “Never give out your password or credit card number in an instant message conversation”. We should follow this instruction, because it was trying to protect us from financial aspect. If you using a shared computer, it is recommend that do not save your message as MSN history, so that other won’t know what you had chatted about.

In a MSN conversation, sometimes, your friend might send some file for you. For your benefit, it is recommend that you should ask your friend what is that file. A small tip for you, if you able to close the chat window when there’s a file in pending status, that file usually not a file from your friend, but a virus link. Sometimes, when your friend sends you a link (e.g.: http://SweetStufff.com :D, click here www.mebeholdgo.in), NEVER CLICK THAT! Unless you’d get the confirmation from your friend to do so.
P.S: DO NOT CLICK on that 2 links, any damages or losses is not liable.

It’s enjoying when you can access Wi-Fi in hotspot. However, when connected to these shared connection, you should bear in mind that you might get the chance to let other access to your network and personal information. So, it’s better for you not to online in the hotspot.
(Refer to http://www.cnn.com/2009/TRAVEL/business.travel/05/28/computer.security/)

When surfing website, we should aware of any pop-up advertisement. Any careless action will just cause the tragedy, think before you do. For credit card user, you are advised that make a routine review on the transaction made, so that can discover any unusual transaction at once.

Remember to set a schedule for your antivirus to update its database to the latest version. Although there is some free antivirus in open-source, it is recommended that spend some money to purchase original version antivirus. You will shock of the scan result after scanning it.

Too much I can write for it, however, too little I can think out right now. So, if there is any problem, you are most welcome to leave your comment here. I’ll reply whenever I read it…

Extra Informations:
1) US is started to concern on this issue, further information can refer to:
http://edition.cnn.com/2009/POLITICS/05/29/cyber.czar.obama/index.html#cnnSTCText
Video
http://edition.cnn.com/2009/POLITICS/05/29/cyber.czar.obama/index.html#cnnSTCVideo


2) How to Safeguard Your Personal Data – Before, During and After a Breach
http://www.eweek.com/c/a/Security/How-to-Safeguard-Your-Personal-Data-Before-During-and-After-a-Breach/

3) Digital Shredder Premium (Easily, Securely & Permanently Erase Confidential Data)
http://www.dtransfer.com/products/data-deletion/digital-shredder-premium/

4) Safeguarding Your Data
http://www.msisac.org/awareness/news/2007-03.cfm

Hi…everyone! Welcome to our blog AGAIN... This week, I am going to tell you all about the threat and attack that the e-commerce will face in this modern day. Even though, E-commerce has let our life more convenience nowadays, however, it also bring some problem to us where many deceivers actually make use of it on their self benefits. Thus, many users nowadays complaint that they have been cheated when they made any transaction through the internet.

One of the most popular threats nowadays is called PHISHING. The pronunciation of Phising is same as fishing. It is an act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to deceive the user into disclosing their private information that will be used for theft purposes. The e-mail usually will contain a link that direct the user to visit a website where they are asked to update their personal information, such as passwords, credit card numbers, and bank account numbers.

Phishing not only happen by sending email messages, but it actually exists in many ways. The other examples are:

a) On a social networking website.
b) On a fake website that accept donations for charity.
c) On a website that imitate your familiar website that you would not be realized of it.
d) In your instant message program
e) On your cell phone or mobile device.

Now, even has a new type of phishing which is spear phising. It focuses on a single user or a department within an organization. The e-mail message appears to be legitimately addressed from someone within the organization normally in a position of trust such as head of human resources or IT. From there, the employees are being requested for their login IDs and passwords. Once data is gained, the hackers can entry into secured networks and steal the data. Another type of spear phishing attack will ask users to click on a link, which deploys spyware that can steal their data as well.

So, to prevent this attack happen on ourselves, we need to learn how to spot a phishing scam. Normally, phishing scam will contain several elements:

a) The "From Field" shows the e-mail is send by the legitimate companies which normally appear as your bank or financial institution or a company you regularly to deal with such as e-bay, Paypal or Microsoft. User need to be very careful in looking out the senders as those deceivers can make use of the company name easily.


b) The e-mail will usually contain logos or images that have been taken directly from the legitimate Web site of the company. So, the existence of logo does not necessarily means that the e-mail is send by legitimate company. However, there will be some logos that are not an exact match to the company's logo or contain spelling errors. In such case, user should be alert that this a fake e-mail.


c) The e-mail will contain a clickable link which suggests you to use the inserted link to validate your information. When you rest your mouse on the link, it will show the real website address to which you will go. Note that the hyperlink usually does NOT point to the URL of the legitimate company. Somehow, the link will contain percentage signs followed by numbers or “@” signs, or random names. Besides, the deceivers will use web addresses that resemble the name of the legitimate company but slightly altered by adding or omitting letters. For example, the address "www.microsoft.com" could appear as, www.micosoft.com , www.mircosoft.com



d) It contains several phrases such as:
I) verify your account
II) You have won the lottery
III) If you don't respond within XX hours, your account will be closed

So, you all know what phishing mail look like. Now, it is the time to learn the prevention method.

a) We should always be alert to any email with urgent requests for personal financial information. Normally, a bank or other organization would not request your personal information through e-mail. However, there is digitally signed e-mail [more on: http://www.antiphishing.org/smim-dig-sig.html] which send by bank. These e-mails normally are more reliable and certified by third party which shown in the picture. However, it is more safety if you can contact the bank or related authority and confirm with them.


b) Don't click on the links in an email or instant message to get to any web page if you suspect the message might not be authentic or you don't know who the sender is.

c) Avoid filling out forms in email messages that ask for personal financial information instead you should only communicate information such as credit card numbers or account information via a secure website or the telephone.

d) Make it a habit to enter the address of any banking, shopping, auction, or financial transaction website yourself and not depend on displayed links. This is because phisers can mimic the legitimate URL which can lead you to the forge website.

e) Installing a Web browser which contains phising filter to protect you from phishing websites. You can get a free browser toolbar from: http://www.earthlink.net/earthlinktoolbar

f) Log into your online accounts and change the password regularly.

g) Check your bank, credit and debit card statements to ensure that all transactions are legitimate regularly.

h) Report to the legitimate company if you received a phising e-mail. Otherwise, you can report to reportphishing@antiphishing.org. which is an anti-phishing organization.

Nowadays, the crime rate in the internet has increased gradually. So, we need to alert to the happening around us regularly to prevent us from being cheated and of course being a brilliant customer in nowadays is important as well. I hope this information can provide a useful guide to you all.


Reference:





Since last week I explain about those revenue models of website transaction, I think now all of you will feel whether online transaction is it reliable and furthermore data that we insert to the net is it protected. According to the research I had made, there will not be 100 percent protected of our data and it show that actually there are still a lot of security issue to the net access and data storage by using computer. It is not only unsafe of our personal data, business data and private information, it also cause government data being hack by hacker. As an example, in June year 2006, US Pentagon faced theft of amazing amount of government data which causes by spoof e-mailing. Sensitive data housed on Defense systems was accessed, copied and sent back to the intruder. It took 3 weeks time for them to recover to normal operation and cost 4 million for reset the security. For further information about this case, you can refer to below link.


http://www.govexec.com/story_page.cfm?filepath=/dailyfed/0308/030508j1.htm&oref=search








From the example show above, even the world most advance country in technology which is US also being hack for their government data, it show that actually our data is not that safe due to a lot threat of online security. Even we set password for our data, but it have two-pronged problem by using password, because they offer a false sense of security and are actually easy to bypass, guess or steal. Security issue and threat is a very sensitive issue to the company which doing business online. Now, I will like to share with all of you about few threat that will causes of lost of data and some ways we can use to protect data and minimize the chance of losing important data.





1. Hacker




- Person who breaks into computers, usually by gaining access to administrative controls.


- Mostly is for hacking data of political issue and also for criminal purposes.


- Further explanation of different type of hacker is available at





http://en.wikipedia.org/wiki/Hacker_%28computer_security%29





- Example of famous hacker in the world


1. Kevin Mitnick - http://www.takedown.com/bio/mitnick.html


2. Jonathan James - http://en.wikipedia.org/wiki/Jonathan_James


2. Virus and Worm


- Can infect desktop computers, laptops and network servers and reach our PCs from email, web sites, downloaded files and loadable media


- It will disable our computer, add, modify and delete files or reformat the hard disk, steal addresses and etc.





3. Trojan Horse


- installed on a computer and allow remote attacker via “backdoor” when the computer user online and access or destroy any information stored. Alternatively, the Trojan can be programmed to automatically send any information on our PCs back to the attacker. Information that might be stolen is states in the website I provide below:


http://www.guard-privacy-and-online-security.com/how-do-you-stay-safe-on-the-internet.html





4. Spyware


- can scan our hard drive and search programs for sensitive information like credit card, bank information and personal details.

- It can change our browser's home page, scan browser history for web sites visited and monitor Internet activity we have did. The information will transmit to the attacker.




5. Natural Disaster


- other than those hacker and viruses, data also will lost due to fire, lightning strike, floods, hurricane, earthquake, tornados and solar flares.


Even though our data is prove to be unsafe but there still some way to prevent lost of data:


1. Antivirus software




- Example like Mc Afee, Norton Antivirus, Kaspersky, Grisoft AVG, and etc.


- But MAKE SURE it is UPDATED!!!






2. Online Backup or Database Center



3. Firewalls (normally come with window)



- Example: Norton Personal Firewall (part of Norton Internet Security), Zone Labs ZoneAlarm (a free version is available), McAfee, Sygate and Tiny.

4. Adware and Spyware Protection

- Example: Lavasoft AdAware and SpyBot Search and Destroy.


5. Management Effort

- Place the database in higher floor in the building to avoid disaster and also set security access to avoid unauthorized person go in the database. Furthermore, CCTV is set at database room and password encryption be use to protect data being access or hack.

Refences:


http://www.remotedatabackups.com/why/disaster_prevention.htm (way of prevention)


http://www.remotedatabackups.com/why/risks_natural.htm (natural disaster)


http://www.guard-privacy-and-online-security.com/how-do-you-stay-safe-on-the-internet.html (Viruses, Worm, Spyware, Trojan horse)


http://www.ecommercetimes.com/story/31171.html?welcome=1213803356&wlc=1245069883 (password problem)





When talking about E-commerce, first thing that come to our mind is to run a trading through online via internet. However, if you asking me an example of an E-commerce success, there will be no doubt for me to say that, Amazon.com!

Why Amazon would be one of the successful E-commerce? According to a study by Matt Pace, except the auction site (eBay), Amazon is the top online retailer in the year 2008!


Other than that, there is too a diagram to support on why Amazon able to be the top retailer in E-commerce, which is the session share and the visits per person that conducted in December 2008.

We had known that Amazon is one of the successes E-commerce, now, let's find out why it deserves such a victory.





I wonder if you ever tried to make your surf in Amazon.com, however, it will not be a big issue of not surfing it before. First of all, I like the way Amazon categorized its products in 12 main departments. Inside these departments, we can easily find the product we wished to purchase. There are a lot of product available, such as books, movies, MP3, computers, electronic devices, home accessories, grocery, toys, motor vehicles, and some other which will out of your expectation. All these can be found out in Amazon!







Second thing that Amazon can last until now is, it provided the shipping delivery globally. Although its head quarter was located at Seattle, Washington, USA; however, for us Malaysian, we still able to make our purchase there. Amazon provided a couple of country lists for users to check how was the charges per shipment and per item. It too provided the standard shipping days for every different countries. Amazon will get a competitive advantage as it globalizes its business.



Other than that, Amazon itself too provided some features and services. Not just products, even services also can be found in Amazon, such as broadband services, financial services, photo services, and travel services. A variety of services are provided, all you need to do is to move ur cursor and click on the item, further details can be found after you click on it. Not just that, you too can refer some reviews that had been posted by other users in the website too!

There's one important thing that been used in Amazon, as other E-commerce website did so, which is the Shopping Cart. Without a shopping cart, it will be troublesome as we need to complete each single transaction, before we continue on the next item. With the aid of shopping cart, it enables us to do our shopping all at once, and complete the transactions in one shot. Time had just been save with shopping cart~

Headache of don't know what category your item belong? Or you have certain specific item to purchase on? All these will not be a problem, as Amazon too provided a search engine, which enable users to type in their needs, to ease them from searching 1 page by 1 page.

If you had overlooked some items in previous shopping, nevermind, Amazon had inserted a column of your recent history. So, we just browse our history at there rather than click on "Back" button on our Internet Explorer.


Several conveniences can be enjoyed in Amazon, and it too keeps upgrading the server to fulfill every single need of our users. So, without any hesitate, let's type in www.amazon.com and sign up an account for your shop today!! :-D

There are some successful virtual e-commerce companies such as eBay, Amazon.com and so on. However, there are also a large number of failures of e-commerce companies that are failed to continue their business through e-commerce. One of the shinning examples is kozmo.com.



Kozmo.com was a short-lived online store and delivery service that provided fast and friendly service. It was founded by young investment bankers Joseph Park and Yong Kang in 1997 when they wanted goodies from a convenience store delivered to their door. They started the business in March 1998 at New York City. The great idea of this company was that you could order anything at anytime and they will delivered direct to your house within one hour with free of delivery charge for any item.

At the height of its business, the company operated in Atlanta, Chicago, Houston, San Francisco, Seattle, Portland, Boston, New York, Washington, D.C., San Diego, and Los Angeles in July 2007. It was popular with college student and young professionals. However, Kozmo.com ended it services in March 2001. The causes of failures are:

(i) Cost > Revenue
This is the main cause that brings to the failure of Kozmo. Kozmo offered free delivery charge and competitive prices to their customers for every product even the customer only buy a pack of snack. In case, the cost of delivery is more than the revenue that their earned. Kozmo was suffered sustainable financial loss due to the reason. Even though a $10 minimum charge was introduced after this, but that didn't stop it from closing in March 2001. Kozmo is learned too late that its primary attraction of free delivery charge to all customers was also its undoing.

(ii) Target consumers
Kozmo make a worst decision that stop to catering their main client which are middle class college-student due to the thought of target more upscale customer base who could afford expensive products. Indeed, college students were the customers that make up almost 76% of their sales.

(iii) Withdraw of investor
Investors promised to give a private funding of $30million to Kozmo but later on an investor had backed out of a $6million commitment. This has caused the merger deal with Los Angeles-based PDQuick collapsed when the funding that was promised to PDQuick did not materialize.

(iv) Ambitious business plan and lack of planning
The company had overly ambitious plans for expansion and didn't stop them down quickly once capital dried up. Besides, Park and Kang were relatively inexperienced to manage an e-commerce business. They may have overestimated the amount of revenue it could gain from the market. The revenues that Kozmo generated from sales were insufficient to cover all the business expenses.

As a conclusion, in order to success an e-commerce business, only has a creative idea without proper plans is insufficient. The use of business strategies, effectiveness in cost control, strong organizational, and efficiency in customer relationship management to meet the demands of its valuable customers are the key elements contribute to the success of e-commerce.

References:

http://www.thestandard.com/news/2008/05/29/where-are-they-now-kozmo-com
http://en.wikipedia.org/wiki/Kozmo.com
http://news.cnet.com/2100-1017-255710.html
http://www.cnet.com/1990-11136_1-6278387-1.html
http://www.businessweek.com/bwdaily/dnflash/apr2001/nf20010416_207.htm


We often heard people saying about “e-com” nowadays, but do you all know what e-com stands for? E-com actually is e-commerce which means a technological-mediated exchange between parties whenever is individuals, organization or both. The exchange (e.g. product, services and information) may made either intra- or inter-organizational.

Apart from knowing the definition, of course we also need to know a little about the history and revolution of e-commerce. In the early year of 1844, telegraph is use to send message throughout the world where e-commerce has not yet be emerged. Even though computer has existed in 1930an but the sharing of electronic data among geographically dispersed computer still cannot be implement. This happen because the software application of certain producer is not compatible with another producer. Thus, this hinders the data exchange between the computers that were not running the same computer software.

Things become different when there is an extended uses of electronic fund transfer (EFT) which was introduced in 1970s. This enables the financial institution and organization to transfer their fund to their associates, business partner or employees. In 1980s, another system was invented which is Electronic Data Exchange (EDI). This allows the inter-company exchanges of document (purchase order, invoices). EDI has reduced cost on producer and distributor sides by the enhancement of purchase processes which they can optimize their stock in correlate with the demand. However, there are disadvantages where this system is expensive to maintain and hard to compatible with other software.

A significant change happens during the yearly 1990. Tim-Berners Lee has written the first web-Browser which is World Wide Web (WWW), more about: http://en.wikipedia.org/wiki/World_Wide_Web
; The US government allowed public access to the internet; and introduction of software named Netscape was introduced in 1994 which provides user a simple browser to serve the internet. This truly global network has created a market for a business where there are two big online stores which is Amazon and E-bay was launched in 1995 and more and more offline store start their business on line. This happen because the WWW provides a user friendly interface and it actually can altered the way the information in the internet is presented such as they can add pictures, video, animation, music and hyperlink in their web page.

In conclusion, e-commerce has expanded from B2B to B2C, C2B, and C2C in recently years. As we can see, more and more organization are started to conduct their business through internet. This included McDonald, Dominos Pizza which provide on-line order services or the other example is Maybank which provides on-line banking service (Maybak2U). E-commerce seems to be a potential way to conduct a business in a technological world nowadays. However, security issues may always happen in an internet world. So, in order to expand the use of e-commerce, more attention needs to be emphasized in that aspect to light up the future of e-commerce.

Introduction of youthgeneration blog

Welcom to our blog!!! This is first time we blogging here and hope all of you will come to have a look and drop a comment to us and we will provide all of you some useful information and share with all of you. Let keep in touch all the buddy!!

THANK!!!

We have receive a lot comment from the visitors and we hope that we will provide more useful information to all of you in the coming days. Thank for the support, we will do better next time! :) I also would like to thank all of you for the praise of the design of our blog, anything want to share or discuss with us about the design we are welcome you leave a comment to us. :) have a nice day to all of you. Hope all of you will come revisit our blog again!

*My Favour Song*