Sunday, February 22, 2009

Things to prevent e-auction fraud when consumer participating in e-auction activities

Have you ever made a purchase or sold anything on an online auction? Is it secure to transact in this way? Not quite, if you are not aware of some loopholes that a clever scammer has in store to cheat you. But if you are aware of how to prevent yourself from being cheated, you can enjoy online auctions, just as much. Let’s tell you how.

Here is what is in your power to prevent online auction fraud:
  • Be aware of phishing. Verify that you are receiving emails from the correct source and that you are logging in at the correct website.
  • When making payment, prefer using your credit card over online transfer. Using a credit card give you the opportunity of a charge back in case the transaction turns out a fraud. Use debit card, wire transfer, or money order only when you completely trust the seller.
  • Use reputed escrow services. An escrow service mediates a buyer and a seller. They accept money from buyers and release them to a seller only when the buyer confirms that the product was received to his/her satisfaction. But be wary of sellers or buyers who themselves pose as an escrow service to cheat the other—a buyer posing as an escrow service gets a product released without making payment, or a seller poses as an escrow service to trick the buyer from making a payment.
  • DO NOT entertain emails received from outside of the auction website mentioning that the highest bidder has withdrawn and you are now entitled for a product. They veer you off the auction website and you lose any protection that the website may provide.
  • NEVER make a deal with a seller outside the auction. Although they sound lucrative, you are at a very high risk of being cheated.
  • READ the auction website’s terms and conditions, buyer protection policy, refund policy before making a transaction. Here, they list in how many days the order will be fulfilled, what if the product you receive is not the same as what was advertised, and so on. Also check that the policies are fair on both buyers and sellers.
  • Check if the product you are purchasing has appropriate warranty and documentation with it. If not, make sure that you intend to purchase it without that protection. Check if shipping and delivery is covered by the seller or if you have to bear those costs.
  • Check that you are not purchasing a product that you are not allowed to possess lawfully.
  • BE WARY of products that offer revolutionary results. In most cases, they are fraudulent claims.
  • DO NOT respond to emails that ask for your personal information, such as your log in details or credit card details.
  • READ the online auction website for feedback on the seller and a rating that they give to sellers and buyers. Most online auctions rate the sellers and buyers based on their transactions’ feedback.
  • READ the product features and the model number that you intend to purchase. Verify these with what is being advertised by the seller.
  • When giving your credit card details or your debit account details at a website, check that the Internet connection you are using is secure. Look for the lock at the bottom or https (an‘s’ appended to ‘http’) in the address field of your browser. These indicate that the connection is a secure one.
  • Avoid making a transaction if anything in the auction seems suspicious to you.
  • If you are cheated on any product purchase, be sure to post a note on the online auction website and let them know personally.

Saturday, February 21, 2009

Review on Local E-Commerce Site - Flowers.com.my

Flowers.com.my is a local site where you can purchase wonderful flowers and gifts for any occasions and send them to your loved ones or even to your family and so on. This website is a fully owned subsidy of CARI Internet Sdn Bhd and began active operations in the year 1999.

To provide a convenient way for people to purchase flowers and gifts, the founder decided to start as an online florist instead of having a shop first. Since inception, flowers.com.my has experienced tremendous growth in the process, they have since successfully established a network of over 60 florists throughout Malaysia with the trustworthy relationship to ensure quality of their suppliers and delivery channels. Now, they have their first retail shop in Kelana Jaya and more to come.

With no doubt, the products available in this site are bouquets, flowers arrangements, hampers, gift baskets and many other specialties utilizing imported flowers to produce truly unique gifts. Flowers.com.my helps customers to convey their messages and thoughts to their loved ones, friends & associates to commemorate momentous occasions such as new-born, birthdays, weddings, anniversaries, graduations and business openings and even for condolences.

This website has a simple layout and yet warmth design. It has a good navigation which will bring customers to the respective pages when they click on the link or items they wish to get accessed. There is no search engine in this site but it provides a list of events with breakdowns for customers to select types of flowers and gifts they wish to order for different types of events.

Once they click on the particular event, images of products will be displayed in the page with the names and prices. If they wish to order certain product, they can click on the image or product name for descriptions and add it into the shopping cart.

Products can be ordered from this site and shipments will be done with different shipment charges according to the locations of recipients. Payments can be made using Mastercard and Visa credit card payments through flowers.com.my's partner payment gateway provider "Commerce Payment Sdn Bhd". Maybank, Mobile Money and Paypal are the alternatives for customers to make their payments.

It is a secure site to make orders because customers' information is not visible for third parties and it is highly protected. Before the products are being charged and sent, customers need to log in with their respective accounts and passwords in this site for verification of information. Once this is done, orders will be confirmed and shipments will be done in a few days time.

But, there are some disadvantages. I found out that the choices of products are not in great variety and thus customers may not be able to choose products which they really want. Futhermore, they can only look at the description but not the real image of the flowers or gifts. As compared to a brick-and mortal florist, customers can check whether the flowers are fresh, how do they smell, what colors they like, types of wrapping they prefer and so on.

Seasonal conditions may affect the supply of certain kind of flowers and specific colors may not always be available. But arrangements will be made by this online florist and will always fulfill customers' needs.

Anyway, it is a recommended site for those who wish to send their wishes and gifts to someone far from them with the help of this site. I'm sure that the one who receives these from their loved ones or someone else will feel extremely surprised and touched.

To visit this site, go to www.flowers.com.my

Wednesday, February 18, 2009

Corporate Blogging: A new marketing communication tool for companies.

A corporate weblog is published and used by an organization to reach its organizational goals। Corporate blog has become a new marketing communication tool for companies. Corporate blog has divided into three types and there are internal blogs, external blogs, and CEO blogs. Thus, all current browseers which include Firefox, Opera, Safari and Internet Explorer 7 enable readers to read the recent posts easily without truly visit the blog through supporter of RSS technology.

One of the successful blogs is Amazon Web Services Blog by Amazon।com that about Amazon web services, products, tools and developer information। It helps to improve the communication and its customer services, attract more people to consume and discuss new products online।

A corporate blog can be:
  • A tool that helps the organization achieve a business goal-Redeploying scare resource just to have a blog makes no sense if there is no business case for one।
  • A useful extension of the company image in the marketplace। It is however no substitute for bad products or lack of commitment to customers.
  • An opportunity to open a two-way channel between employees and customers।

Corporate blogs are not only interesting and useful, they are also helping the companies hat author them develop a totally new relationship with their customers। In some cases, the blogs have helped the company move the needle in reputation, cute and thus purchase consideration.

References:

http://specgirlz.blogspot.com/2009/02/corporate-blogging-new-marketing.html
http://www.internetviz-newsletters.com/bulldog/e_article000404957.cfm
http://ecommercesite.wordpress.com/2008/07/04/corporate-blogging-a-new-marketing-tool-for-companies/
http://38blog123.blogspot.com/2008/07/corporate-blogging-new-marketing.html
http://ecomspace.blogspot.com/2008/06/corporate-blogging-new-marketing.html

Monday, February 16, 2009

E-Government in Malaysia: Its Implimentation So Far and Citizen's Adoption Strategies

E-Government in Malaysia

Electronic government, generally known as ‘E-government’ is the use of information and communication technologies in public administration combined with organizational change and new skills to improve public services and democratic processes and to strengthen support to public policies. E-government is a way for public administration to become more open and transparent, and to reinforce democratic participation: more service-oriented, providing personalized and inclusive services to each citizen.

Various countries, including Malaysia, are implementing E-government. The status of e-government implementation in Malaysia is widely discussed as to the potential of e-government implementation towards the public and businesses. The implementation of e-government started since the initiation of Multimedia Super Corridor (MSC) by the Malaysia government in 1996.

The E-government initiative in Malaysia was launched to lead the country into the Information Age. It use information technology and e-commerce to provide citizens and organizations with more convenient access to government information and services and to provide delivery of public services to citizens, business partners, and those working in the public sector. E-government services focus on four main customers which are citizens, the business community, government employees and agencies. In E-government system, individuals are able to initiate a request for a particular government service and then receive that government service through the Internet or some computerized mechanism. It seeks to improve the convenience, accessibility and quality of interactions with citizens and businesses; simultaneously, it will improve information flows and processes within government to improve the speed and quality of policy development, coordination and enforcement. This enabled the government to be more responsive to the needs of its citizens.

The myGovernment Portal (www.gov.my) acts as the one-stop source of Malaysian government information and services for the citizens.

E-government is one of the seven flagship applications introduced in MSC. Under the e-government flagship, seven main projects were identified to be the core of the e-government applications.

The e-government projects are:
1. Project Monitoring System (PMS)
2. Human Resource Management Information System (HRMIS)
3. Generic Office Environment (GOE)
4. Electronic Procurement (EP)
5. Electronic Services (E-Services)
6. Electronic Labor Exchange (ELX)
7. E-Syariah


The recent survey about e-government adoption in Malaysia, which was done by market information group TNS, indicated that the e-government use is growing but at a slow pace. As shown in the study, about 15% of Malaysians have used the internet to access online government services in year 2003 compared to 12% in year 2002. In the survey, Malaysia’s ranking is 25th out of 32 countries in terms of e-government usage growth. The Malaysians are also concerned about the security of doing transactions over the Internet and this resulted in low usage of e-government services. As far as the age group is concerned, the younger Malaysians who are under 34 are the primary users of e-government services. Also noted in the survey, households with high incomes and higher levels of education actively use the e-government services.


The implementation of e-government services will bring benefits to the public, businesses and the government itself. As for the public, saving time and money are the primary reasons to use the e-government implementation, the governments should market their offers, improve citizen’s awareness of the benefits and increase take-up of online services.


Ways to encourage more citizens to use the e-government applications:

  • Provide websites with multiple language versions.
  • Increase awareness through TV and radio advertisements, and organizing workshops at shopping malls.
  • Provide consultation services on how to use those services.
  • simplify procedures needed to access to the e-government services

Malaysian e-government successful applications:

  • Government’s drive for e-government services
  • Electronic Labour Exchange (www.elx.gov.my) has matched 75,000 potential employees with employers since 2005.
  • SMS alert on e-government services
  • Online renewal of driving licenses
  • Electronic filing of income tax forms
  • Voter information
  • Employment opportunities


However, there are some problems faced in e-government implementation, such as technological barrier, legislative and regulatory barriers, language barrier, budgetary framework, online behavior, lack of public awareness, digital divide impedes the benefits of E-government, and so on. So, Malaysia is keep on improving the core government applications and integrating more services across agencies in order to solve the issues or problem faced by E-government and provide a better services to the citizens in future.


Citizen's Adoption Strategies

E-Services form an emerging field, which is rapidly gaining attention and importance. Citizens expect and demand governmental services with a high degree of quality, quantity, and availability in a 24-hour, seven-days-a-week, and year-round fashion. Governments all over the world are developing information systems and electronic services that have the capacity to meet these emerging service needs and demands of citizens and other clients. Success in delivering electronic services depends upon the capability and self-confidence of citizens in performing e-transactions, as well as their trust and confidence in the protection of their personal data within an open and accountable government. The ease of use, compatibility, and trustworthiness are significant predictors of citizens’ intention to use e-Services and that perceived reactive advantage, perceived image, perceived compatibility, perceived usefulness, and relative advantage are significant elements of e-Government adoption.

The government should be able to propose an effective strategy to encourage citizen’s adoption of e-government by focusing on these 4 areas:


1. Customer satisfaction
E-Government adoption requires that citizens show higher levels of satisfaction with the online service provided by the government. A higher level of customer satisfaction will increase the rate of e-Government adoption.

2. Service Quality
Online service quality for e-Government could be measured in terms of quality of content provided on the website, the speed of the response to the citizens concerns with problem solving approach, and the availability of names. Other important measurement factors are telephone and fax numbers of personnel with whom citizens might need to get in touch, and the integration of an offline channel with online channel so that citizens could interact with government departments through other means if necessary. Higher quality of service will lead to higher levels of customer satisfaction and thus can increase the use of e-government services.

3. Website Design
Personalization of websites, customization of product offerings, and self-care are the three key features that could be used not only to build relationship with the visitors, but also to enhance their experience. These features give visitors a sense of control and participation and could potentially enhance their adoption

4. User Characteristic
User characteristics such as perceived risk, perceived control, and internet experience can have a direct impact on internet adoption. Experience influences a citizen’s trust of e-Government. Users with prior experience, especially if satisfied, would be more likely to return to use e-Government services. Perceived risk leads to security and privacy issues that could discourage the use of online services. It is important to ensure that citizens can transact online securely and their personal information will be kept confidential to increase the level of trust and the e-government adoption rate.

References:

http://e-comm4entrepreneur.blogspot.com/2008/07/e-government-in-malaysia-its.html

http://evolutionboyz.blogspot.com/2008/07/e-government-in-malaysia-its.html

http://milkmom.blogspot.com/2008/07/e-government-in-malaysia-its.html

http://youthdew.blogspot.com/2008/06/e-government-in-malaysia-its.html

http://e-worldbiz.blogspot.com/

Mobile Payment Systems in Malaysia: Its potentials and consumers' adoption strategies




MOBILE WALLET
system is an innovative and revolutionary breakthrough mobile commerce solution that offers the conveniences of cash-less and card-less shopping, as well as making remote payments via any mobile phone, where financial and merchandising transactions are done at the touch of the fingertips.

It is suitable for the masses as it is a mobility redemption system that not only helps improve efficiency and convenience; it also enhances productivity and faster turn around time. Basically anyone can use MOBILE WALLET as if it is a cash or debit card.

Users can use their MOBILE WALLET (activated as an account) immediately after they have registered their SIM-card number and activated it. Prior to that they would also need to top up their MOBILE WALLET with a minimum of RM10 which will then be converted into *MW10 (MOBILE WALLET e-money currency) . RM1 = MW1

The differences between of MOBILE WALLET, debit and credit card

MOBILE WALLET

Debit Card

Credit Card

Instant top-up, instant spending.

Spending directly deducted from your account.

Spend first, settle payment later.

Instant checking balance through mobile phone.

Need to make sure account has enough money before spending.

Keep spending without worrying account balancing.

Enjoy shopping and manage to control spending budget.

Always worrying account balancing can’t cover shopping expenses.

Overspending and increase debt.

"Pay bills through your very own mobile phone, via SMS." That is MOBILE WALLET’s concept. An *instruction guide booklet (obtainable through all MOBILE WALLET Kiosks and MOBILE WALLET Agents) will provide the comprehensive SMS-codes for making payments to various products and services.

Alternately, one can use MOBILE WALLET’s very own mWiz program downloadable through the website at www.mobilewallet2u.com and straightaway make payments with the most intuitive and easy to use program. *Only in the Klang Valley.

Minimum top up for MOBILE WALLET is RM10 which will then be converted into *MW10 (MOBILE WALLET e-money currency), with a maximum top up limit of *MW200. A nominal charge of * MW0.50for each and every successful transaction. Users can top up at Kiosk, Maybank, Ambank and through e-pay.

To cash out existing/balance MW money:

a) Sending an SMS command(please refer to the guidebook) and activate the cash-out option, Or

b) Cash out by logging into one's MW-Account online and initiate cash-out payment via direct bank-in into his or her account of choice. There will be a 7-days grace period for the processing of payment and a nominal fee of 2% will be charged from one's MW-Account upon successful transaction.

For Mobile Wallet users:

1) To preview or get your latest transaction record, you can log on to the website at www.mobilewallet2u.com and login with your registered MOBILE WALLET account (your mobile phone number), with your provided security code and PIN number.
2) You just need to type in MW OWNPIN send to MW Gateways if you have forgotten your security number or pin code. You will get your security number and PIN code in less than a minute.
3) If you lost your mobile phone, you may call the Customer Care Line at 603-9205 5550 / 603-9205 5551. They will assist you to solve this problem.
What is MW Gateway?

The MW Gateways are numbers that call corresponds to user mobile phone Telco numbers (namely 012, 016, 019) .

The MW Gateways are:
6012.676.9093 / 6016.331.9093 / 6019.278.3039

Mobile Wallet users are able to make payments wirelessly for purchase(s) or service(s) immediately anywhere at anytime from anyone to anyone. With no doubt, it is very convenient and easy to use. For further information, please visit http://www.mobilewallet2u.com/lang/en/index.html.

Sunday, February 15, 2009

Electronic Currency

Electronic currency refers to money or scrip which is exchanged through electronically. Electronic currency involves in use of computer networks, the internet and digital stored value systems. The examples of electronic currency are Electronic Funds Transfer (EFT). Electronic funds transfer (EFT) refers to the computer-based systems used to perform financial transactions electronically.

A private currency may use gold to provide extra security, such as digital gold currency. An e-currency system may be fully backed by gold (like e-gold and c-gold), non-gold backed, or both gold and non-gold backed (like e-bullion and Liberty Reserve). Also, some private organizations, such as the US military use private currencies such as Eagle Cash. Many systems will sell their electronic currency directly to the end user, such as Paypal and WebMoney, but other systems, such as e-gold, sell only through third party digital currency exchangers. In the case of Octopus Card in Hong Kong, deposits work similarly to banks'. After Octopus Card Limited receives money for deposit from users, the money is deposited into banks, which is similar to debit-card-issuing banks redepositing money at central banks.


Electronic currency means the money you use over the internet. Electronic currency allows its holder to buy the goods and the services that the vastness of the internet offers. Electronic currency trading, therefore, means buying and selling of this internet money. Just like in normal everyday monetary currencies, electronic currencies are also varied. Each one of them is backed by an underlying monetary currency or in some cases, even valuable or precious metals. One profits by trading on these electronic currencies. It’s much more complicated than that of course but I’m sure you know what I’m talking about.

Benefits of Electronic currency:

1.) Electronic currency trading allows you to do business and earn with only a few dollars of investment. Electronic currency trading does not demand much and it is really up to you if you want to increase your investment or not. With electronic currency trading you are given many opportunities to profit without spending too much on investment.

2.) Electronic currency trading has a low transaction cost. Unlike other businesses that eat up your profit with exorbitant fees, electronic currency trading allows you to do business with minimal fees giving you more profit and more money for you.

3.) Electronic currency trading is versatility and convenience to the persons involved. You can work with any electronic currency trading market that best suits your needs for any time of day. The electronic currency trading business does not sleep so night or day, the world is merely at your fingertips.

Disadvantages of Electronic currency:

1.) Fraud over electronic currency trading has been a pressing issue in recent years. Hacking into bank accounts and illegal retrieval of banking records has led to a widespread invasion of privacy and has promoted identity theft.

2.)There is also a pressing issue regarding the technology involved in electronic currency trading. Power failures, loss of records and undependable software often cause a major setback in promoting technology.

Friday, February 13, 2009

Threats of Online Security - How safe is Our Data?

Are you safe online? Find out what are the Top 5 threats to internet security and how to protect yourself. The Internet is a very scary place. If you don’t have internet security software, you are playing a risky game. That’s a very simple and direct statement but a powerful one. I am sure most PC users have had some form of malware on the PC. We all have been the victim of a virus, spyware, adware, phishing or spam mail. All these have the potential to cause crippling damage to your PC, threaten your privacy or expose to your personal information.

Since 2004 online shopping, banking and digital trading has increased 25% each year. If you are performing any of these actions without the aid of internet security software, you are being very foolish and making hackers very happy. It has never been more risky to shop online. The Spam/Spyware industry alone has become a billion dollar underground network. Your information is valuable. Hackers are will to invest time and resources to obtain. Therefore, it is more important than ever to learn how to combat these threats with internet security software and educate yourself on safe surfing techniques. Here are the top five threats to your internet security.


1. Spyware

Spyware is an all inclusive term that includes most malware such as Trojans, adware, pop up ads, modified cookies, keyloggers etc. This term does not include virus which is engineered to replicates itself, not spy or steal. Spyware is usually engineered to watch your online activity and uncover security flaws. This is usually the first step in setting you up for some time information theft. Hackers have developed sophisticated tools such as keyloggers that can record every key you type. Yes that means passwords, banking information, and email entries can be uncovered using this software. A quick tip is to avoid free anti-spyware. This has been proven to be ineffective and sometime can be spyware itself. Remember that spyware works by exposing flaws in your internet security. So search for the anti-spyware program with a major magazine endorsement.

2. Identity Theft

Hackers can steal your information by a variety of methods. Once this information is gained, it will be used to make online purchases using your credit card data, divert paychecks and create false documents. Usually the top internet security software comes with some protection against this problem. An internet security suite may be your best bet to protect your online information. Quick tips to protect yourself against online ID theft are never provide your credit card info to any site that does not offer multiple forms of internet security to protect your transaction. Another key factor to search for is a major secure payment processor logos and information. And last but not least, please read the internet security warning before the payment is processed. It only natural that you protect yourself against this internet security threat.

3. Spam Mail

Spam Mail itself is not dangerous. However Spam mail can have malicious links that can do everything from cause your PC to be infected by a virus, introduce spyware, and attract more spam. A good internet spam filter is usually a good option. Using internet security software and some common sense will help you avoid be inundated with spam mail. Quick internet security tip: When typing your address into the net. Try using a combination of 13 letters and numbers. This will make it very difficult for address to be added spam mail list.

4. Phishing Mail

There is not doubt that you may have heard the term “phishing”. If you haven’t, you soon will because it’s a major internet security threat. This method has become one of the more popular ways to stealing vital information such as user names and password. This works by sending messages to your email account pretending to be trusted sites such as eBay, Paypal or your bank. The links redirect you to a fake site that mimics the trusted site. You type in your personal information and hacker using it to make online transactions with your info or your money. This is real threat to you internet security. The best way to avoid this is to update your web browser with phishing detection. Also other internet security software packages have great phishing detection systems such as Webroot’s Spysweeper and ZoneAlarm Internet Security Suite.

5. You!!

That’s right maybe the factor of the possess the biggest threat to your internet security. Social engineering such as clicking on obvious spam mail links, downloading freeware and sharing files is a very dangerous practice on the net. By just investing in the best software and updating regularly, could save you from frustration and identity theft. This is the one category where the bargain bin should be avoided. Also, never download anything that is sent to your mail unless you have scanned it for spyware and viruses. However, in the age of digital sharing people often buck internet security by trading pictures, movies and files without hesitaion.

Are you surprised that computer viruses didn’t make the Top 5 internet security threats? There are several reasons for this is not considered the number one internet security threat. One is that the hackers have been shying away from the use of viruses because the technology is mint to disrupt and destroy your internet security. However, spyware is easier to develop and much more effective. Also, most computer users and Windows developers have taken the steps to protect themselves. Anti-virus programs are quite good and can usually respond to new viruses by updating the signature databases daily.


All in all you are responsible for that steps you take online. However, there is no need to risk loosing your valuable data or money because of lack of PC maintenance. Upgrade your computer by increases the amount of internet security measures. Feel confident that you done everything to protect yourself and enjoy everything the net has to offer.

Thursday, February 12, 2009

The Application of Pre-paid Cash Card for Consumers

The prepaid cash card is from a new idea which the concept is basically same as mobile phone SIM card or prepaid gift card. It is a reloadable debit card that allows people to only spend up to the amount they have pre-deposited into the account. A prepaid cash card look like a credit or debit card, it allows consumers to purchase products and services through a card but with a difference which means a person can limit their spending with only spend the balance that has been preloaded onto the card rather then borrowing. This means there is no risk of running into debt as it has no credit or overdraft facility. It benefits consumers in their day life and allows them to have a better control over their finance.

One can simply start using prepaid cash card when money has been loaded on to a prepaid card by cash at a bank, Post Office, at Payzone or PayPoint terminals, bank transfer, through your employer or even by credit card.

When using for purchasing at a high street store, they work in exactly the same way as a credit or debit card. When purchasing just simply hand over the card and then you will be asked to enter your PIN number (supplied with the card) on an electronic keypad or to sign a payment slip so your signature can be matched with that on the back of the card (if there is no Chip on the card). The total amount will be taken from your card immediately and the transaction is complete.


The examples of pre-paid cash card are General Spending Debit Card, Payroll and commission payout Card, Remittance, Affinity Group Card, Travel Card, and Student Card. There are several benefits by using those pre-paid cash card, such as:

1. The payment quickly and securely moves “Checking Account Like” funds without the hassles or risks involved with paper checks

2. Security features such as personal identification numbers (PINs) protect consumers against theft and fraud

3. Consumers prefer Prepaid Cash Cards because they act virtually the same as cash, only with much more security

4. Consumers who make debit card purchases are free of interest charges associated with credit cards

5. Funds Transfer – Consumers can conveniently and inexpensively transfer funds to friends and relatives everywhere

6. Bill Payment and On-line Purchases – Un-banked consumers can pay bills and purchase products and services on-line or through phone calls.



The application of Smarts Cards in Malaysia are:

1. Retail purchases (purchases using credit cards)

2. Transit fares (paying for bus and taxi rides, parking, and so on)

3. E-identification (smart cards storing personal info, for example Malaysian identity card and Malaysian International Passport)

4. Health care (stores health data about patients, allergies, pass medical records and etc)


Pre-paid Vista Cash Card is issued by Four Oaks Bank & Trust Company that given the opportunity for consumers with poor credit record and young children by not spending more than the balance on the card. It offers a secure, cost-effective, and convenient alternative to paying by checks or cash. These products enable many consumers to access their pre-funded pool of funds to make everyday purchases, pay bills, and even receive direct deposits with a Visa prepaid cash card. Visa also permits travelers access to money at automated teller machines in 65 countries and book the train tickets by offering prepaid cash card such as Metro Card in New York City.



Touch ‘n Go (TnG) smart card is used by Malaysian for electronic payment system to toll expressway and highway. It is expanding its business to retail purchase by starting with fast food industry that enables consumers to buy dough nut, burger or fast-food from 21 outlets such as Burger King, 7-Eleven, Dunkin’ Donut. It is imitating the success of Hong Kong’s Octopus Card by setting 5 to 10% of the card holders for retail purchase as current target of the company.

Octopus Card was launched in Hong Kong on year 1997, September. It is a rechargeable contactless stored value smart card to transfer electronic payments in online in offline system. It is widely used in payment system for transportation, supermarkets, fast food restaurant, car parks and other pint of sale application such as service stations and vending machines that have achieved good outcomes.

References:

http://youthdew.blogspot.com/2008/06/prepaid-cash-card-allows-consumers-to.html

http://ec.eurecom.fr/~arnaud/zds/report/node48.html

http://www.marketprosecure.com/free-prepaid-debit-card.html

http://ecomspace.blogspot.com/2008/06/application-of-pre-paid-cash-card-for.html

http://ezinearticles.com/?The-Homeland-Visa-Prepaid-Credit-Card---Many-Options-For-Todays-Consumer&id=1315803

Wednesday, February 11, 2009

Credit Card debts: Causes and Prevention

Credit card debt is an example of unsecured consumer debt, access through ISO 7810 plastic credit card। (From Wikipedia)
Responsible use of a credit card does not exist। Credit card debt is major problem in America. There are about $962 million at US (July 2008).
There is NO positive side to credit card use. You spend more if you use credit cards. Even by paying the bills on time, you are not beating the system? But most families don’t pay on time. The average family today carries $8,000 in credit card debt according to the American Bankers’ Association.
When you pay cash, you can ‘feel’ the money leaving you। This is not true with credit cards. Flipping a credit card up on a counter registers nothing emotionally. If you use credit cards instead of cash you will spend 12-18% more. This is money you could have saved

Course of credit card debts


  1. Poor Money Management: Poor money management is one of the best reasons that why so many families have accumulated many credit card debts। It is because people are unaware to conduct a monthly spending plan and do not keep track of monthly bills. People have never realized their spending o the items that are useless and do not have any value in their life. Thus, it has lead to a rise in debts by using credit cards.
  2. Unemployment: Households are forced to use credit card for groceries, utilities and some expenses purposes to maintain current lifestyle when the main breadwinner of the household has loss his job and could not find a new job during short periods। This may lead to a rise in debt when expenses are not cut down in line with the reduction in income.
  3. Gambling: Gambling is popular entertainment। Everyone likes to gamble with the money they have. How many come back home with a bag full of cash? Very few. The guarantee in this game of chance is that will be definitely paying to the house. Gambling loans are also available which lead to debt.

Prevention

  1. Budget: It is important to have a plan for your money so that you will know exactly where all if your funds are going। Many people believe that a budget will be constricting and not allow them any freedom. Really the opposite is true. A budget allows you the freedom of having peace of mind knowing that all of your bills are paid and the money has been allocated ahead of time for these expenses.
  2. Self control and discipline: One of the best practices is to have a direct set up so that able to pay back the full amount each month and use in emergencies। Thus, self control and discipline to keep these cards in wallet and would not overspend.
  3. Keep your credit limit low: A low credit limit will help you resist the urge to splurge। If you receive a congratulatory letter informing you your credit limit has been increased, you should call the credit card issuer and decline the offer. If the issuer would not do it, close the account.

The main prevention is aware of the causes of credit card debts and starts to spend less in order to stay with well financial situation।



The main prevention is aware of the causes of credit card debts and starts to spend less in order to stay with well financial situation।



References:

http://ecommerze.wordpress.com/2008/06/25/credit-card-debt-causes-and-prevention/
http://ecommercesite.wordpress.com/2008/06/25/credit-card-debts-causes-and-prevention/ http://loss1987.blogspot.com/2008/06/credit-card-debts-causes-and-prevention.html
http://loss1987.blogspot.com/2008/06/credit-card-debts-causes-and-prevention.html
daveramsey.com/the_truth_about/credit_card_debt_3478.html.cfm">http://www।daveramsey.com/the_truth_about/credit_card_debt_3478.html.cfm
http://www.streetdirectory.com/travel_guide/145666/debts_loans/debt_prevention_and_management.html

Saturday, February 7, 2009

How to safeguard our personal and financial data?

The growing popularity of the use of computers now cause the threat to our personal and financial data. So, safeguard of our personal and financial data had become important now. How to safeguard our important data?

Here are some tips to safeguard our personal and financial data:
1.Use passwords and encrypt our important data- Passwords and other security features add layers of protection if used appropriately. Use a strong password or pass-phrase to protect access to your data. By encrypting files, you can ensure that unauthorized people can`t view your data even if they can physically access it. When you use encryption, it is important to remember your passwords and pass phrases; if you forget or lose them, you may lose your data.
2.Install a firewall-
A firewall is a software program designed to allow good people in and keep bad people out. Most new computers come with firewalls integrated into their operating systems. Those who have a DSL or cable modem have an added layer of protection because these modems come with yet another firewall built in.
3.Use and maintain anti-virus software- Protect yourself against viruses and Trojan horses that may steal or modify the data on your own computer and leave you vulnerable by using anti-virus software. Make sure to keep your virus definitions up to date.
4.Regularly scan your computer for spyware - Spyware or adware hidden in software programs may affect the performance of your computer and give attackers access to your data. Use a legitimate anti-spyware program to scan your computer and remove any of these files.
5.Keep software up to date - Install software patches so that attackers cannot take advantage of known problems or vulnerabilities. Many operating systems offer automatic updates. If this option is available, you should turn it on.
6.Temporary data storage- If you need to store sensitive/confidential data temporarily on a memory stick, laptop, or other device, remove that data from the device when you have finished. Ensure that data has been completely erased and not just deleted.
7.Dispose of sensitive information properly - Simply deleting a file does not completely erase it. To ensure that an attacker cannot access these files, make sure that you adequately erase sensitive files.
8.Avoid accessing financial information in public- Resist logging on to check your bank balance when working from a coffee shop that offers wireless access. These systems are convenient, but also unknown. Casual users have no way of assessing how sturdy their firewalls are.
9.Update your browser- Updating your browser on a regular basis can help plug up security holes, so make it a habit.
10.Don't open mystery attachments- Never open an attachment or click on a link sent to you by an unknown party. Attachments can contain viruses and links can lead unsuspecting users to dummy sites where they are asked to input financial information.

Thursday, February 5, 2009

The application of 3rd party certification programme in Malaysia

Security With WebTrust can allow enterprises to ensure that access to its electronic commerce system and data is restricted only to authorized individuals in conformity with its disclosed security policies. The WebTrust Program's Security standards provide a comprehensive solution for e-businesses by independently verifying a web site's compliance with online security best practices. The WebTrust Security Principle sets out an overall objective for the security of data transmitted over the Internet and stored on an e-commerce system.


Certification Authority (CA) is the body given the license to operate as a trusted third party in the issuance of digital certificates. One of the famous applications of 3rd party certification program in Malaysia is the MSC Trustgate com Sdn Bhd. It is a licensed Certificate Authority under the operation of the Multimedia Super Corridor which incorporated in 1999, under the Digital Signature Act 1997 (DSA). MSC Trustgate was state-of-the-art data center located in Cyberjaya is one of the most advanced in ASEAN and conforms to IT security standard, Orange Book Tier 4. All of the consultants carry out a stringent certification process and continuous training programs and are well experienced in deploying large-scale projects. At present, MSC Trust gate has 12 million of paid up capital.

The projects MSC Trustgate have implemented are E-banking Security Deployment and E-procurement Integration, User Authentication and Customer Clearance Approval System, and Public Key Infrastructure (PKI) to assist all type of companies and institution conducting their business over the internet. MSC Trust gate offers complete security solutions and trusted services for individuals, organizations, government, and e-commerce service providers by digital certificates, encryption and decryption. It could help companies build a secure network and application infrastructure for their electronic transactions and communications over the network.

The objective of MSC Trustgate is to secure the open network communications from both locally and across the ASEAN region. Trustgate provide digital certification services such as digital certificates, cryptographic products and software development. The products and services of Trustgate are SSL Certificate, MyKAD ID, MyTRUST, Managed PKI, SSL VPN, Personal ID, Managed Security Services, VeriSign Certified Training and Application Development. The vision of Trustgate is to enable organizations to conduct their business securely over the internet, as much as what they have been enjoying in the physical world.


helps companies and consumers all over the world to engage in trusted communications and commerce. VeriSign is the most trusted mark on the Internet, the seal of verisign is an instant proof that your web site is genuine because you have been verified by the Certification Authority, and your customers can conduct business with you free of worry. It offers the strongest SSL encryption, and VeriSign is the leading Secure Sockets Layer (SSL) Certificate Authority. SSL is a protocol originally developed by Netscape in 1996 as a way of ensuring the security of e-commerce transactions, communications, and interactions for Web sites, intranets, and extranets.

Whereas SSL creates a secure connection between a client and a server, over which any amount of data can be sent securely, Security HTTP is designed to transmit individual messages securely. SSL uses a cryptographic system that uses two keys to encrypt data − a public key known to everyone and a private or secret key known only to the recipient of the message.
Digital certificate usually attach to an e-mail message or an embedded program in a web page that verifies that user or website is who they claim to be. The common functions of a digital certificate are user authentication, encryption and digital signatures. User authentication provides other security than using username and password. Its session management is stronger. Encryption can make the data transmission secured by using the information encrypted. The intended recipient of the data is only person to receive the message. Digital signatures are like the hand signature in the digital world. It can ensure the integrity of the data. Furthermore, the digital certificates can assist the development of greater internet based activities.

Why is the 3rd party certification needed? The reason is there are threats of internet security spreading over the net nowadays. For example, customers want to make sure that whether they are dealing business with a trusted party. They are afraid of their personal information such as ID number, passwords, credit card numbers and so on being stolen, information contaminated by third parties, and the transacting party denying any commercial commitment with the users. Thus, the certification from 3rd party is needed to ensure their information traveled over the Internet reaches the intended recipients and is safe.

Moreover, it can provide e-mail protection and validation, secure online shopping carts and more services in order to avoid being spammed, hacked and attacked by the malicious software such as virus, trojan horse and worms.

Lastly, by applying 3rd party certification, there are more safeguard for online shopping, which means the customers can shop safely. In addition, the confidentiality of customers towards the internet will also be enhanced and hence the organizations will be able to earn more profits.

References:

http://youthdew.blogspot.com/2008/06/application-of-3rd-party-certification.html
http://milkteablog.blogspot.com/2008/06/application-of-3rd-party-certification.html
http://littleangele-commerce.blogspot.com/2009/02/application-of-3rd-party-certification.html
http://focus.ti.com/lit/ml/szzq009a/szzq009a.pdf
http://www.rhb.com.my/insurance/en/join-rhbi/business-development-opportunities/the-requirements/Default.aspx
http://ecomworld.wordpress.com/2008/06/25/the-application-of-3rd-party-certification-programme-in-malaysia-2/
http://e-noll.blogspot.com/2009/02/application-of-3rd-party-certification.html
http://www.bnm.gov.my/files/doc/forex_online_application_userguide.pdf

Wednesday, February 4, 2009

Phishing: Examples and its prevention methods.




What is phishing?


Phishing in this computer world is where perpetrator using fraud method and criminally and fraudulently steal people information such as usernames, password, credit card number, bank account number to invade other people privacy.
Communications purporting to be from popular social web sites (YouTube, Facebook, MySpace), auction sites (eBay), online banks (Bank of America), online payment processors (PayPal), or IT Administrators (Yahoo) are commonly used to lure the unsuspecting।


How phishing works?

The perpetrator carried out using e-mail addresses and instant messaging. They will use fake website they have created instead of legitimate one to steal the information from people, the fake e-mail address that they have sent usually redirect to the perpetrator website which is fake so that it look similar to the original website.
Phishing occurs when a consumer receives a deceptively-legitimate looking e-mail from what appears to be a reputable company. The e-mail asks recipients to update their credit card information or their account will be promptly terminated. Or the message offers a service to protect their credit cards from possible fraud.

The best way to protect yourself from phishing is to learn how to recognize a phish.

Phishing e-mail:



What to look for in a phishing e-mail:

1. Generic greeting: Phishing e-mails are usually sent in large batches. To save time, Internet criminals use generic names like “First Generic Bank Customer” so they don’t have to type all recipients’ names out and send emails one-by-one. If you don’t see your name, be suspicious.
2. Forged link: Even if a link has a name you recognize somewhere in it, it doesn’t mean it link to the real organization. Roll your mouse over the link and see if it matches what appears in the e-mail. If there is a discrepancy, don’t click on the link. Also, websites where it is safe to enter personal information begin with ‘https’ – the‘s’ stand for secure. If you don’t see “https” don’t proceed.
3. Requests personal information: The point of sending phising e-mail is to trick you into providing your personal information. If you receive an e-mail requesting your personal information, it is probably a phishing attempt.
4. Sense of urgency: Internet criminals want you to provide your personal information now. They do this by making you think something has happened that requires you to act fast. The faster they get your information, the faster they can move on to another victim.

Example of Phishing email from PayPal:



Example of Phishing email from Citibank:


Example of Phishing email from eBay:



Example of Phishing email from YouTube:





Phishing website:


What to look for in a phishing website:

1. Poor resolution: Phishing websites are often poor in quality, since they are created with urgency and have a short lifespan. If the resolution on a logo or in text strikes you as poor, be suspicious.
2. Forged URL: Even if a link has a name you recognize somewhere in it, it doesn’t mean it links to the real organization. Read URLs from right to left – the real domain is at the end of the URL. Also, websites where it is safe to enter personal information begin with “https” – the “s” stands for secure. If you don’t see “https” do not proceed. Look out for URLs that begin with an IP address such as http:// - these are likely phishes .

Example of Phishing website from Paypal:



Example of Phishing website from Citibank:


Example of Phishing website from eBay:


Example of Phishing website from YouTube:



How to spot phishing scams:
1. Keep your e-mail and Instant Message Addresses Private
2. Immediately report suspected phishing contacts
3. Limit your dialogue
4. Never reply to e-mail message that request your personal information
5. Don’t click links is suspicious e-mail, the link might not be trustworthy
6. use the strong or different password for each of your accounts and change them frequently
7. Don’t send personal information in regular e-mal messages
8. Do the business only with companies you know and trust
9. Help protect your PC, keep your PC updated and use antivirus software
10. Monitor your transaction, using just one credit card for online purchases makes it easier to track your transactions
11. Use credit cards for transactions on the Internet instead of debit cards to avoid the big credit limit from your bank account


If you receive a suspicious e-mail, you can send it to the US Federal Trade Commission at spam@uce.gov or you can just click the ‘report as junk’ button on your e-mail program.
Learn more about protecting yourself from online identity theft with the FREE Computer Safety Pro e-Course. http://www.ComputerSafetyPro.com
Microsoft also provides the method to fight for the spammers or phishing actives. http://www.microsoft.com/protect/yourself/phishing/identify.mspx


References:

http://en।wikipedia.org/wiki/Phishing
http://www.phishtank.com/what_is_phishing.php
http://evolutionboyz.blogspot.com/2008/06/phishing-examples-and-its-prevention.html
http://chowkamleeng.blogspot.com/2008/06/phishing-examples-its-prevention.html
http://ezinearticles.com/?How-to-Prevent-Phishing-Scams&id=1147318