<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0"><channel><title>UBAI3013 E-COMMERCE</title><description></description><managingEditor>noreply@blogger.com (UBAI3013 E-COMMERCE)</managingEditor><pubDate>Wed, 4 Sep 2024 21:20:49 +0800</pubDate><generator>Blogger http://www.blogger.com</generator><openSearch:totalResults xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">20</openSearch:totalResults><openSearch:startIndex xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">1</openSearch:startIndex><openSearch:itemsPerPage xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">25</openSearch:itemsPerPage><link>http://g6ecommerce.blogspot.com/</link><language>en-us</language><item><title>E-Government in Malaysia: Its implementation so far and citizen’s adoption strategies.</title><link>http://g6ecommerce.blogspot.com/2008/07/e-government-in-malaysia-its.html</link><category>malaysia</category><category>week6</category><author>noreply@blogger.com (UBAI3013 E-COMMERCE)</author><pubDate>Thu, 10 Jul 2008 15:12:00 +0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2088153267698402729.post-5744976695726876642</guid><description>&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiM4WV07H4DLrB0XumGyoeZV-ehDcCSWeGXv5-nBqOgELmKFQIn8uUI0do15nMk-qHqgyWCge50UDe0gcq4LElHzWW2WCgWLoh3tHfVBtEhBEwzeP54I9ODUzDfcMX6eTnfZR8Og2OgbrE/s1600-h/MSC%2520LOGO.jpg"&gt;&lt;img id="BLOGGER_PHOTO_ID_5221281422503500274" style="DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center" height="219" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiM4WV07H4DLrB0XumGyoeZV-ehDcCSWeGXv5-nBqOgELmKFQIn8uUI0do15nMk-qHqgyWCge50UDe0gcq4LElHzWW2WCgWLoh3tHfVBtEhBEwzeP54I9ODUzDfcMX6eTnfZR8Og2OgbrE/s400/MSC%2520LOGO.jpg" width="374" border="0" /&gt;&lt;/a&gt;&lt;span style="font-family:trebuchet ms;"&gt;The &lt;span style="color:#3333ff;"&gt;Electronic Government&lt;/span&gt; initiative was launched to lead the country into the Information Age. It will improve how the government operates internally, as well as how it delivers services to the people of Malaysia. It seeks to improve &lt;span style="color:#009900;"&gt;the convenience, accessibility and quality of interactions&lt;/span&gt; with citizens and businesses. At the same time, it will improve &lt;span style="color:#009900;"&gt;information flows and processes&lt;/span&gt; within government to &lt;span style="color:#009900;"&gt;improve the speed and quality of policy development, coordination and enforcement&lt;/span&gt;. &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:trebuchet ms;"&gt;(Source: &lt;/span&gt;&lt;a href="http://www.american.edu/initeb/ym6974a/egovernment.htm"&gt;&lt;span style="font-family:trebuchet ms;color:#000099;"&gt;&lt;u&gt;http://www.american.edu/initeb/ym6974a/egovernment.htm&lt;/u&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style="font-family:trebuchet ms;"&gt;)&lt;br /&gt;So far, the implementation of Malaysia E-Government project in progress is:&lt;br /&gt;1. &lt;span style="color:#ff6600;"&gt;Project Monitoring System (SPP II)&lt;/span&gt;&lt;br /&gt;2. &lt;span style="color:#ff6600;"&gt;Human Resource Management Information System (HRMIS)&lt;/span&gt;&lt;br /&gt;3. &lt;span style="color:#ff6600;"&gt;Generic Office Environment (GOE)&lt;br /&gt;&lt;/span&gt;4. &lt;span style="color:#ff6600;"&gt;Electronic Procurement (EP)&lt;/span&gt;&lt;br /&gt;5. &lt;span style="color:#ff6600;"&gt;Electronic Services (E-Services)&lt;/span&gt;&lt;br /&gt;6. &lt;span style="color:#ff6600;"&gt;Electronic Labour Exchange (ELX)&lt;/span&gt;&lt;br /&gt;7. &lt;span style="color:#ff6600;"&gt;E-Syariah&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;To fully utilize the e-government applications, a &lt;span style="color:#009900;"&gt;guideline should be provided&lt;/span&gt; to the nation on how to use the electronic services provided. The &lt;span style="color:#009900;"&gt;system should always be updated&lt;/span&gt; to ensure a more secure and efficient services provided. The core government applications should also be improved and integrating more e-services across agencies.&lt;br /&gt;In order to make the right decisions and avoid falling behind, government will need to identify and resolve the different issues that have arise from the transitional period during which traditional and e-government co-exist.&lt;/span&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiM4WV07H4DLrB0XumGyoeZV-ehDcCSWeGXv5-nBqOgELmKFQIn8uUI0do15nMk-qHqgyWCge50UDe0gcq4LElHzWW2WCgWLoh3tHfVBtEhBEwzeP54I9ODUzDfcMX6eTnfZR8Og2OgbrE/s72-c/MSC%2520LOGO.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">2</thr:total></item><item><title>Review On A Local E-Commerce Site</title><link>http://g6ecommerce.blogspot.com/2008/06/review-on-local-e-commerce-site.html</link><category>malaysia</category><category>review</category><category>week6</category><author>noreply@blogger.com (UBAI3013 E-COMMERCE)</author><pubDate>Mon, 30 Jun 2008 22:51:00 +0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2088153267698402729.post-1745013051164613240</guid><description>&lt;div align="justify"&gt;&lt;a href="http://www.flowers-for-you.com.my/"&gt;&lt;img id="BLOGGER_PHOTO_ID_5217693774260108498" style="DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCHIlL7n_4ml_5IzN1UIFC_qTAHtd8SOPhiUSccb_oXSJTt_ITOOY1VPOxV2Ne8utuygcxe6j1Az6RPFeg5Jv0SJQvJWPw8tBwFrhu8uQfjvzyUE0JXiVtiWGWHJ96dchyphenhyphenMZCHY_au4yA/s400/flowers-for-you.jpg" border="0" /&gt;&lt;/a&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;a href="http://www.flowers-for-you.com.my/"&gt;&lt;span style="color:#000099;"&gt;&lt;u&gt;Flowers-for-you&lt;/u&gt; &lt;/span&gt;&lt;/a&gt;is registered as &lt;span style="color:#ff0000;"&gt;Flowerz Dot Biz&lt;/span&gt; to the Companies Commision of Malaysia. It is an online Flower Delivery Shop in Malaysia and strives to provide high quality service of direct flowers order processing at a reasonable cost and a 100% satisfaction guaranteed goal for every order made.&lt;br /&gt;&lt;br /&gt;In my opinion, the designs and layout of &lt;span style="color:#000000;"&gt;&lt;em&gt;Flowers-for-you&lt;/em&gt;&lt;/span&gt; are quite beautiful and attracting. Moreover, this website is user friendly as it has &lt;a href="http://www.flowers-for-you.com.my/faq.aspx"&gt;&lt;span style="color:#000099;"&gt;&lt;u&gt;FAQ&lt;/u&gt;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span style="font-family:trebuchet ms;"&gt;(frequently asked questions) section &lt;/span&gt;&lt;span style="font-family:trebuchet ms;"&gt;that answers the customers about the problems relating to placing an order and delivery guidelines.&lt;br /&gt;&lt;br /&gt;However, there are few areas that I think &lt;em&gt;Flowers-for-you&lt;/em&gt; should improve. First of all, in order to view the graphics and catalogs, this website requires customers to install “&lt;span style="color:#ff0000;"&gt;Microsoft Silverlight&lt;/span&gt;” software. This might troublesome customers to spend their precious time to install the software. Besides, although customers have installed the software, there are still some runtime errors occurred when they want to view the&lt;br /&gt;&lt;a href="http://www.flowers-for-you.com.my/catalog2.aspx"&gt;&lt;u&gt;&lt;span style="color:#000099;"&gt;Silverlight Catalog&lt;/span&gt;&lt;/u&gt;&lt;/a&gt;. More to the point, the design of “&lt;a href="http://www.flowers-for-you.com.my/weddingpackages/"&gt;&lt;span style="color:#000099;"&gt;&lt;u&gt;Wedding Package Samples&lt;/u&gt;&lt;/span&gt;&lt;/a&gt;”&lt;/span&gt;&lt;span style="font-family:trebuchet ms;"&gt; is interesting but it takes time to download the photos. In the &lt;span style="color:#000000;"&gt;"Wedding Package Samples"&lt;/span&gt;, customers have to flip the pages to view each photo. This may cause customers to feel tired and bored if they flip too many times.&lt;br /&gt;&lt;img id="BLOGGER_PHOTO_ID_5218151996340279250" style="DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjq0eM9vyNlzcqS1Al_ZHf0ycIn0szyGOGcakaJj7EJC90SqcqhH9F-JkyGQbfaFqqmIcYED4zj6FJUg9YLgJ6q4VEXs8ngnQ7kZgIvUgr67LoQUO6UD6BjjvkvfLxw3KaIbsTOszQfqh4/s400/Flowers+for+you.bmp" border="0" /&gt;&lt;br /&gt;Due to the above reasons, a normal customer may ignore to place an order with &lt;em&gt;Flowers-for-you&lt;/em&gt;. Therefore, &lt;em&gt;Flowers-for-you&lt;/em&gt; has to improve or even eliminate those frustrating problems to make its business more successful. &lt;/span&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCHIlL7n_4ml_5IzN1UIFC_qTAHtd8SOPhiUSccb_oXSJTt_ITOOY1VPOxV2Ne8utuygcxe6j1Az6RPFeg5Jv0SJQvJWPw8tBwFrhu8uQfjvzyUE0JXiVtiWGWHJ96dchyphenhyphenMZCHY_au4yA/s72-c/flowers-for-you.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">2</thr:total></item><item><title>Things to take note to prevent e-auction fraud when a consumer participating in an e-auction.</title><link>http://g6ecommerce.blogspot.com/2008/06/things-to-take-note-to-prevent-e.html</link><category>e-auction</category><category>week6</category><author>noreply@blogger.com (UBAI3013 E-COMMERCE)</author><pubDate>Sat, 28 Jun 2008 16:57:00 +0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2088153267698402729.post-7257188272554917124</guid><description>&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgq1W-1gdtlPgLhlA1P95tGJCXb9kJA0uyYvor_IrD9YF_kYn9A20_-xUKcV-hT7Tx3ive-w8gJWRoYmBGtLGnAlyDeiE6rzKPYr5b0mCbza_e24FnYGJ4kQU0s1UjRg7S4A2wpl8AspxI/s1600-h/e_auction.jpg"&gt;&lt;img id="BLOGGER_PHOTO_ID_5216854428591355442" style="FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 167px; CURSOR: hand; HEIGHT: 218px" height="242" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgq1W-1gdtlPgLhlA1P95tGJCXb9kJA0uyYvor_IrD9YF_kYn9A20_-xUKcV-hT7Tx3ive-w8gJWRoYmBGtLGnAlyDeiE6rzKPYr5b0mCbza_e24FnYGJ4kQU0s1UjRg7S4A2wpl8AspxI/s400/e_auction.jpg" width="181" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div&gt;&lt;span style="font-family:trebuchet ms;"&gt;An &lt;span style="color:#ff6600;"&gt;&lt;strong&gt;e-auction&lt;/strong&gt;&lt;/span&gt; is an electronic “reverse” auction where suppliers use internet-based software to bid against each other online and in real time against a published specification. Industry experts predict a veritable explosion of e-auction fraud cases as the number of e-auction participants continues to increase. Online auction fraud is already the most frequently reported form of Internet fraud. Types of e-auction fraud consist of &lt;span style="color:#006600;"&gt;bid shielding, shilling, fake photos and misleading descriptions, improper grading techniques, selling reproductions&lt;/span&gt; and so on.&lt;br /&gt;&lt;br /&gt;In order to prevent e-auction fraud, e-auction participants can choose to &lt;span style="color:#3333ff;"&gt;participate in a voluntarily identity verification process&lt;/span&gt;. This is because the e-auction sites have had problems finding a practical way to verify the personal identification information of their users. eBay uses the services of &lt;a href="http://en.wikipedia.org/wiki/Equifax"&gt;&lt;u&gt;&lt;span style="color:#3333ff;"&gt;Equifax&lt;/span&gt;&lt;/u&gt;&lt;/a&gt; to verify user identities for a $5 fee. Verified eBay User, a voluntary program, encourages users to supply eBay with information for online &lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiozkDyR_hgHBFBQXwLmChsITfA7juoy20d4eE1MHarMAObMZPiCVwHODV12ssW6qeTZI7w-MnE0p4JGXEojFgwVohg2i3JRklepwWcCo3ev8_NolExcWu4IBZwL4uizXdxFTGwYPf4eRU/s1600-h/ebay-logo-716-90_302_x_302.jpg"&gt;&lt;img id="BLOGGER_PHOTO_ID_5216855764542993586" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 254px; CURSOR: hand; HEIGHT: 222px" height="246" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiozkDyR_hgHBFBQXwLmChsITfA7juoy20d4eE1MHarMAObMZPiCVwHODV12ssW6qeTZI7w-MnE0p4JGXEojFgwVohg2i3JRklepwWcCo3ev8_NolExcWu4IBZwL4uizXdxFTGwYPf4eRU/s400/ebay-logo-716-90_302_x_302.jpg" width="267" border="0" /&gt;&lt;/a&gt;verification. By offering their Social Security number, driver’s license number, and date of birth, users can qualify for the highest level of verification on eBay.&lt;br /&gt;&lt;br /&gt;Besides that, e-auction participants can elect to &lt;span style="color:#3333ff;"&gt;use an &lt;a href="http://en.wikipedia.org/wiki/Escrow"&gt;&lt;u&gt;&lt;span style="color:#3333ff;"&gt;escrow&lt;/span&gt;&lt;/u&gt;&lt;/a&gt; service,&lt;/span&gt; typically paying up to 5% of the total transaction value. The&lt;span style="color:#3333ff;"&gt; &lt;/span&gt;&lt;a href="http://en.wikipedia.org/wiki/Escrow"&gt;&lt;u&gt;&lt;span style="color:#3333ff;"&gt;escrow&lt;/span&gt;&lt;/u&gt;&lt;/a&gt; fees are based on the amount of the transaction and the method of payment. A neutral third party holds the buyer’s funds until the purchased item arrives and is found to be what was bid for, arriving in the condition described in the auction. For items valued at more than $200 or when either a buyer or seller feels the need for additional security, eBay recommends&lt;span style="color:#3333ff;"&gt; &lt;/span&gt;&lt;a href="http://en.wikipedia.org/wiki/Escrow"&gt;&lt;u&gt;&lt;span style="color:#3333ff;"&gt;escrow&lt;/span&gt;&lt;/u&gt;&lt;/a&gt; services.&lt;br /&gt;&lt;br /&gt;Furthermore, e-auction participants can also go for &lt;span style="color:#3333ff;"&gt;purchasing insurance for certain auction transactions&lt;/span&gt;. eBay offers insurance underwritten by&lt;span style="color:#3333ff;"&gt; &lt;/span&gt;&lt;a href="http://en.wikipedia.org/wiki/Lloyd%27s_of_London"&gt;&lt;u&gt;&lt;span style="color:#3333ff;"&gt;Lloyd’s of London&lt;/span&gt;&lt;/u&gt;&lt;/a&gt;. Users can cover up to $200, with a $25 deductible under “Fraud Protection Program”. The program is provided at no cost to eBay users.&lt;br /&gt;&lt;br /&gt;Others than that, e-auction participants can also decide on &lt;span style="color:#3333ff;"&gt;having some offered items authenticated&lt;/span&gt; as a result of the e-auction sites view the transactions on their sites as private and do not vet the offerings or descriptions themselves. The seller nominally pays for the authentication, but the payment is typically reflected in an increase in the winning bid, due to the additional security. eBay has begun to provide third parties to authenticate certain offered items, at the option and expense of the sellers.&lt;br /&gt;&lt;br /&gt;E-auction participants can also opt for &lt;span style="color:#3333ff;"&gt;educating themselves about their auction counterparts, with varying degrees of reliability, by accessing the e-auction sites’ feedback forums&lt;/span&gt;. The e-auction sites solicit feedback from their users, in the hopes of turning their customers into equivalent of their police force. The eBay Feedback Forum allows registered buyers and sellers to build up their online trading reputations. It provides users with the ability to comment on their experiences with other individuals.&lt;br /&gt;&lt;bg&gt;&lt;/div&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;/span&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgq1W-1gdtlPgLhlA1P95tGJCXb9kJA0uyYvor_IrD9YF_kYn9A20_-xUKcV-hT7Tx3ive-w8gJWRoYmBGtLGnAlyDeiE6rzKPYr5b0mCbza_e24FnYGJ4kQU0s1UjRg7S4A2wpl8AspxI/s72-c/e_auction.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>Review on post: “UK to get tough with illegal downloader</title><link>http://g6ecommerce.blogspot.com/2008/06/new-law-to-ban-illegal-downloader-by.html</link><category>review</category><category>week6</category><author>noreply@blogger.com (UBAI3013 E-COMMERCE)</author><pubDate>Sat, 28 Jun 2008 16:41:00 +0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2088153267698402729.post-2597261233044126004</guid><description>&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9gvzBR9PSJmGVcY6PLmNU2R7csukuBZCLgjGM68CokU43bQmER9BWnLHO0NL-wsOuIEDZNK5Rhh319J9zOS3qD-INrVBVRzOOfl4ZEP0J1tELLIXNYFybK_P14kK3sH-DuKp2dA_vXog/s1600-h/sha0378l.jpg"&gt;&lt;img id="BLOGGER_PHOTO_ID_5216850958138429842" style="FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 298px; CURSOR: hand; HEIGHT: 186px" height="201" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9gvzBR9PSJmGVcY6PLmNU2R7csukuBZCLgjGM68CokU43bQmER9BWnLHO0NL-wsOuIEDZNK5Rhh319J9zOS3qD-INrVBVRzOOfl4ZEP0J1tELLIXNYFybK_P14kK3sH-DuKp2dA_vXog/s400/sha0378l.jpg" width="326" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;(review source: &lt;a href="http://ecommerze.blogspot.com/search/label/Legal"&gt;&lt;span style="color:#000099;"&gt;http://ecommerze.blogspot.com/search/label/Legal&lt;/span&gt;&lt;/a&gt;)&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family:trebuchet ms;"&gt;New law to ban illegal downloader by way of cutting off their internet connection is now being proposed by UK government. Among the contents of the new proposed law are &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:trebuchet ms;"&gt;“&lt;span style="color:#ff6600;"&gt;&lt;a href="http://en.wikipedia.org/wiki/ISP"&gt;&lt;span style="color:#ff6600;"&gt;&lt;u&gt;ISP&lt;/u&gt;&lt;/span&gt;&lt;/a&gt; who failed to enforce the rules could be prosecuted and details of customers suspected in illegal downloading can be made available to the courts&lt;/span&gt;”.&lt;br /&gt;&lt;br /&gt;However, this new proposed law seems insufficient and even not really workable. Following are several &lt;span style="color:#006600;"&gt;reasons&lt;/span&gt; that show &lt;span style="color:#006600;"&gt;why illegal downloader will not face a UK ban&lt;/span&gt;:&lt;br /&gt;1. This proposal was just a draft consultation green paper which could be defined as “&lt;span style="color:#000099;"&gt;a proposal without any commitment to action&lt;/span&gt;”. The government receives many of these on a daily basis and they are just treated them like junk mail.&lt;br /&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVmr96OPE_lRKZHE3SIjn7ZDkvhpv02dJaWGzQByntLAI18s0OgV0l3SAcMVEKFeiA6wKZItD8yL6vC_83cTvu_M-T1J9SeoM-oZpb_6RcbA0uWOluHM5uCcxy2D-_seLkmu0kuOnw_3Y/s1600-h/17047230-17047233-slarge.jpg"&gt;&lt;img id="BLOGGER_PHOTO_ID_5216851140873932546" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; CURSOR: hand" height="251" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVmr96OPE_lRKZHE3SIjn7ZDkvhpv02dJaWGzQByntLAI18s0OgV0l3SAcMVEKFeiA6wKZItD8yL6vC_83cTvu_M-T1J9SeoM-oZpb_6RcbA0uWOluHM5uCcxy2D-_seLkmu0kuOnw_3Y/s400/17047230-17047233-slarge.jpg" width="266" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;2. This proposal is &lt;span style="color:#000099;"&gt;totally and completely unworkable in the real world&lt;/span&gt;. For &lt;a href="http://en.wikipedia.org/wiki/ISP"&gt;&lt;u&gt;&lt;span style="color:#000099;"&gt;ISPs&lt;/span&gt;&lt;/u&gt;&lt;/a&gt;, banning customers and exposing themselves to billions in liability is not a good business strategy. As such, &lt;a href="http://en.wikipedia.org/wiki/ISP"&gt;&lt;u&gt;&lt;span style="color:#000099;"&gt;ISPs&lt;/span&gt;&lt;/u&gt;&lt;/a&gt; will not accept liability for the contents of packets, and it would be definitely impossible for them to open and check if every single download and upload was legal without the entire internet grinding to halt.&lt;br /&gt;&lt;br /&gt;3. It would be &lt;span style="color:#000099;"&gt;impossible to tell the different between illegal downloading and legal activities&lt;/span&gt;, for instance, downloading software patches, using torrents to share stuff legally, playing online video games, using &lt;a href="http://en.wikipedia.org/wiki/Voip"&gt;&lt;u&gt;&lt;span style="color:#000099;"&gt;VoIP&lt;/span&gt;&lt;/u&gt;&lt;/a&gt;, photo sharing, telecommuting, and many others.&lt;br /&gt;&lt;br /&gt;4. &lt;span style="color:#000099;"&gt;This idea goes against the ruling of the European Court which states that European member states are not obligated to disclose personal information about suspected file shares&lt;/span&gt;. It would also in contradiction with Article 10 of the European freedom of expression law which gives every European the freedom to hold opinions and to receive and impart information and ideas without interference by public authority and regardless of frontiers.&lt;br /&gt;&lt;br /&gt;5. &lt;span style="color:#000099;"&gt;WIFI &lt;a href="http://en.wikipedia.org/wiki/Piggybacking_%28internet_access%29"&gt;&lt;u&gt;&lt;span style="color:#000099;"&gt;piggybacking&lt;/span&gt;&lt;/u&gt;&lt;/a&gt; and encrypted packets make it impossible to tell who is downloading what in the first place&lt;/span&gt;. These techniques are only getting more sophisticated, while for the most part, the content industries collectively remain as dumb as a box of hair.&lt;/span&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9gvzBR9PSJmGVcY6PLmNU2R7csukuBZCLgjGM68CokU43bQmER9BWnLHO0NL-wsOuIEDZNK5Rhh319J9zOS3qD-INrVBVRzOOfl4ZEP0J1tELLIXNYFybK_P14kK3sH-DuKp2dA_vXog/s72-c/sha0378l.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>Corporate Blogging: A New Marketing Communication Tool for Companies</title><link>http://g6ecommerce.blogspot.com/2008/06/corporate-blogging-new-marketing.html</link><category>blogging</category><category>week6</category><author>noreply@blogger.com (UBAI3013 E-COMMERCE)</author><pubDate>Sat, 28 Jun 2008 16:29:00 +0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2088153267698402729.post-2986859801113214882</guid><description>&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkJUgpYgyd1WqoYG9Nn4F7yll0_377ZkEXfKPlVPU3zKsVWl8lzVFWLfYb_oFXvsf3BmcZ-HaP36H7hylzY6KVQx9s9Q_Qfg0i5irvnh2BwkDAzg7xC6xM-HZiadEO-CaL7NZmQ9IyRCM/s1600-h/1.bmp"&gt;&lt;img id="BLOGGER_PHOTO_ID_5216848226390762114" style="DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 400px; CURSOR: hand; HEIGHT: 249px; TEXT-ALIGN: center" height="230" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkJUgpYgyd1WqoYG9Nn4F7yll0_377ZkEXfKPlVPU3zKsVWl8lzVFWLfYb_oFXvsf3BmcZ-HaP36H7hylzY6KVQx9s9Q_Qfg0i5irvnh2BwkDAzg7xC6xM-HZiadEO-CaL7NZmQ9IyRCM/s400/1.bmp" width="514" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div&gt;&lt;span style="font-family:trebuchet ms;"&gt;Blogging is not restricted to only individuals or personals, an organization may as well create its own corporate weblog. The &lt;span style="color:#000099;"&gt;&lt;strong&gt;corporate weblog&lt;/strong&gt;&lt;/span&gt; will be used by the organization to reach its organizational goals. According to &lt;a href="http://www.thenewpr.com/wiki/pmwiki.php"&gt;&lt;span style="color:#ff6600;"&gt;&lt;strong&gt;&lt;u&gt;NewPR Wiki&lt;/u&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/a&gt;, there are &lt;span style="color:#ff6600;"&gt;136 organizations having their own corporate blogs&lt;/span&gt; (updated until February 4, 2008). They are some of the huge successful organizations such as &lt;span style="color:#ff6600;"&gt;Dell, Coca-cola, Google, Yahoo, HP and many more&lt;/span&gt;.&lt;br /&gt;&lt;br /&gt;Basically, corporate blogging can be categorized as either &lt;span style="color:#000099;"&gt;internal&lt;/span&gt; or &lt;span style="color:#006600;"&gt;external&lt;/span&gt;. The &lt;span style="color:#000099;"&gt;internal blog&lt;/span&gt; is generally accessed through the organization’s intranet. So only the people working within the organization (e.g. employees, managers) can access to the internal blog. This &lt;span style="color:#000099;"&gt;encourages employee participation, free discussion of issues, collective intelligence, direct communication between various layers of an organization and developing a sense of community&lt;/span&gt;.&lt;br /&gt;&lt;br /&gt;The &lt;span style="color:#006600;"&gt;external blog&lt;/span&gt; will be the publicly available weblog where employees, teams or spokesperson can share their views. It is also used to &lt;span style="color:#006600;"&gt;announce new products, explain and clarify policies, react to public criticism on certain issues, as well as being an informal press release of the organization’s ongoing activities&lt;/span&gt;. Besides, external blog is useful as it can have diverse audiences besides the above such as customers, product evangelists or influencers &lt;span style="color:#006600;"&gt;providing valuable feedback on customer services, exclusive previews, product testing and marketing plans for further organization improvement.&lt;/span&gt;&lt;/span&gt;&lt;span style="color:#006600;"&gt; &lt;/span&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkJUgpYgyd1WqoYG9Nn4F7yll0_377ZkEXfKPlVPU3zKsVWl8lzVFWLfYb_oFXvsf3BmcZ-HaP36H7hylzY6KVQx9s9Q_Qfg0i5irvnh2BwkDAzg7xC6xM-HZiadEO-CaL7NZmQ9IyRCM/s72-c/1.bmp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>The application of pre-paid cash card for customer</title><link>http://g6ecommerce.blogspot.com/2008/06/application-of-pre-paid-cash-card-for.html</link><category>e-payments</category><category>week5</category><author>noreply@blogger.com (UBAI3013 E-COMMERCE)</author><pubDate>Tue, 24 Jun 2008 01:14:00 +0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2088153267698402729.post-4965080612579449181</guid><description>&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_3KH82qgdJPwIeqyNE3enzJ5z4ZN58UH-Xm8XdvjZXo6thlahw8752ANHOoTe2WULIHdZkgSM6RsHUpiFcOee9IOBQvug2O_057VC8hQd_1oylQ1OCIn1d6W2GD2ecSysjB7oV8sNhV4/s1600-h/cash_parsys-0001-Image_0_0_0_ImageRef.jpg"&gt;&lt;img id="BLOGGER_PHOTO_ID_5215126643759140642" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; CURSOR: hand" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_3KH82qgdJPwIeqyNE3enzJ5z4ZN58UH-Xm8XdvjZXo6thlahw8752ANHOoTe2WULIHdZkgSM6RsHUpiFcOee9IOBQvug2O_057VC8hQd_1oylQ1OCIn1d6W2GD2ecSysjB7oV8sNhV4/s400/cash_parsys-0001-Image_0_0_0_ImageRef.jpg" border="0" /&gt;&lt;/a&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;span style="color:#ff0000;"&gt;Pre-paid cash cards&lt;/span&gt; is one of the electronic cash cards which is getting popular nowadays. It is quite similar with debit cards because they both use existing money, rather than borrowing and both of them draw funds from your bank account, usually a checking account. Meanwhile, &lt;span style="color:#006600;"&gt;pre-paid cash card always need a personal identification number&lt;/span&gt; to be keyed in for the transaction to be authorized. As such, unless you tell someone about your personal identification number, no one else can ever use your card. On the other words, if it is being &lt;span style="color:#ff6600;"&gt;stolen&lt;/span&gt; by others, we do &lt;span style="color:#ff6600;"&gt;&lt;span style="color:#ff6600;"&gt;not need to worry about losing of our money&lt;/span&gt;.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYnwUTpWWpC4gYdLhwcrwH3mEyeBS6atSogxJUkN3Tyayj_eq_46ZQ9qfprH4EmneqapvRc0I5sVwW27K83B11A5sJGtwfrD-gEB3sgKbPV__Th0lQfo6AgOZQyINpUKkn_SwUQXNsiaQ/s1600-h/4520471807.jpg"&gt;&lt;img id="BLOGGER_PHOTO_ID_5215126794404577426" style="FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 193px; CURSOR: hand; HEIGHT: 317px" height="229" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYnwUTpWWpC4gYdLhwcrwH3mEyeBS6atSogxJUkN3Tyayj_eq_46ZQ9qfprH4EmneqapvRc0I5sVwW27K83B11A5sJGtwfrD-gEB3sgKbPV__Th0lQfo6AgOZQyINpUKkn_SwUQXNsiaQ/s400/4520471807.jpg" width="187" border="0" /&gt;&lt;/a&gt;Since pre-paid cash cards are considered as the &lt;span style="color:#3333ff;"&gt;most secure and safe financial transaction cards&lt;/span&gt;, it is being widely used by the consumers. Consumers normally use it to make an-online purchases. Once the goods or services offered by a seller through a website are selected, the &lt;span style="color:#006600;"&gt;identification code&lt;/span&gt; would be provided to the seller who will then transmits it for verification. If the identification code is associated with the valid and active account as well as sufficient cash balance inside the account, an approval code is sent to the seller and the purchase price of the selective goods or services is debited from the cash balance of the account. In India, more and more people are now using pre-paid cash cards such as Itzcash cards, Done cards and Icash cards to book online train tickets against the earlier days when primarily credit and debit cards were used.&lt;br /&gt;&lt;br /&gt;Pre-paid cash cards are also particularly useful for consumers who are doing &lt;span style="color:#3333ff;"&gt;shopping at the mall or running errand out-station.&lt;/span&gt; Consumers generally use pre-paid cash cards like a portable access point to their checking account. They used their card at automated teller machines (ATM) to withdraw funds in cash, deposit funds and even make an inquiry regarding their checking account. This &lt;span style="color:#006600;"&gt;helps consumers from overspending and overdrawing their account&lt;/span&gt;.&lt;/span&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_3KH82qgdJPwIeqyNE3enzJ5z4ZN58UH-Xm8XdvjZXo6thlahw8752ANHOoTe2WULIHdZkgSM6RsHUpiFcOee9IOBQvug2O_057VC8hQd_1oylQ1OCIn1d6W2GD2ecSysjB7oV8sNhV4/s72-c/cash_parsys-0001-Image_0_0_0_ImageRef.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">6</thr:total></item><item><title>Post Review: Using Touch n Go card to buy fast food in Malaysia will be a reality</title><link>http://g6ecommerce.blogspot.com/2008/06/post-review-using-touch-n-go-card-to.html</link><category>e-payments</category><category>review</category><category>week5</category><author>noreply@blogger.com (UBAI3013 E-COMMERCE)</author><pubDate>Tue, 24 Jun 2008 00:09:00 +0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2088153267698402729.post-8336343078439696764</guid><description>&lt;span style="font-family:trebuchet ms;color:#000000;"&gt;(review source: &lt;a href="http://ecommerze.blogspot.com/search/label/e-Tailing"&gt;&lt;span style="color:#000099;"&gt;http://ecommerze.blogspot.com/search/label/e-Tailing&lt;/span&gt;&lt;/a&gt;)&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;strong&gt;&lt;span style="color:#00cccc;"&gt;&lt;span style="color:#ff0000;"&gt;Touch ‘n Go now with your favorite fast-food!&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;strong&gt;&lt;span style="color:#00cccc;"&gt;&lt;/span&gt;&lt;/strong&gt;&lt;a href="http://en.wikipedia.org/wiki/Touch_%27n_Go"&gt;&lt;img id="BLOGGER_PHOTO_ID_5215112256045447218" style="DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center" height="98" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGScjrJAfWWWGuXQRo44Do-zoiiXKapM3a7ceEXnu3lDFw29wF8ZbQcIMBaUpbngBpCyoTUotfAbJS3QaebejSWfjKSDHkgyEy7O0lZ2oTNyQo0CWxihn_Z_U96GIzKQOp6syA45gc1M8/s400/1.bmp" width="470" border="0" /&gt;&lt;/a&gt;Most of us have already recognized and familiar with &lt;strong&gt;&lt;a href="http://en.wikipedia.org/wiki/Touch_%27n_Go"&gt;&lt;span style="color:#000099;"&gt;Touch ’n Go&lt;/span&gt;&lt;/a&gt;&lt;/strong&gt;, a pre-paid cash card which is used generally for public transport, toll and parking fees. Now, we should start learn more about this card as it is also &lt;span style="color:#3333ff;"&gt;a food cash card&lt;/span&gt;!&lt;br /&gt;&lt;/span&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg04s-KZqMmR0HplB6js3jDFW7SA0jqcM4tEynAgjURmS_2hHGOjToELUK3Q5DZFytnrNdpeaSWepXVGZoVYhmUtLVWDhek0WhoQN0Bhm2hd9vW1ov0ZWaZYOHhOCru-QldsNT0zsBkVVw/s1600-h/2.bmp"&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;img id="BLOGGER_PHOTO_ID_5215110521395951250" style="FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg04s-KZqMmR0HplB6js3jDFW7SA0jqcM4tEynAgjURmS_2hHGOjToELUK3Q5DZFytnrNdpeaSWepXVGZoVYhmUtLVWDhek0WhoQN0Bhm2hd9vW1ov0ZWaZYOHhOCru-QldsNT0zsBkVVw/s400/2.bmp" border="0" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style="font-family:trebuchet ms;"&gt;This is&lt;span style="color:#6600cc;"&gt; &lt;strong&gt;great news for fast-food lovers&lt;/strong&gt;&lt;/span&gt; as well as cardholders as it now enables consumers to purchase fast-food using the card at 21 fast-food chains such as &lt;/span&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;span style="color:#3333ff;"&gt;Burger King, 7-Eleven, Dunkin Donuts, A&amp;amp;W, Carrefour hypermarket, Caltex convenience store and Cineleisure.&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;It is &lt;span style="color:#6633ff;"&gt;&lt;span style="color:#6600cc;"&gt;&lt;strong&gt;time to change&lt;/strong&gt;&lt;/span&gt; &lt;/span&gt;using &lt;strong&gt;&lt;a href="http://en.wikipedia.org/wiki/Touch_%27n_Go"&gt;&lt;span style="color:#000099;"&gt;Touch ’n Go&lt;/span&gt;&lt;/a&gt;&lt;/strong&gt; now rather than searching and counting coins as payment for your donuts.&lt;span style="color:#3333ff;"&gt; This card will do the math for you!&lt;/span&gt; So all we have to do is bring the card, go to the outlets that are equipped with &lt;strong&gt;&lt;a href="http://en.wikipedia.org/wiki/Touch_%27n_Go"&gt;&lt;span style="color:#000099;"&gt;Touch ’n Go&lt;/span&gt;&lt;/a&gt;&lt;/strong&gt; readers for the payment purposes, order your favorite fast-food set sit down and enjoy it. &lt;strong&gt;&lt;span style="color:#6600cc;"&gt;No extra charge&lt;/span&gt;&lt;/strong&gt; will be liable as what you order is what you pay.&lt;br /&gt;&lt;br /&gt;Not only that, we can &lt;strong&gt;&lt;span style="color:#6600cc;"&gt;enjoy privileges&lt;/span&gt;&lt;/strong&gt; and &lt;strong&gt;&lt;span style="color:#6600cc;"&gt;lots of freebies&lt;/span&gt;&lt;/strong&gt; if we pay with &lt;strong&gt;&lt;a href="http://en.wikipedia.org/wiki/Touch_%27n_Go"&gt;&lt;span style="color:#000099;"&gt;Touch ’n Go&lt;/span&gt;&lt;/a&gt;&lt;/strong&gt; card in those participating outlet. So I would not hesitate to choose &lt;strong&gt;&lt;a href="http://en.wikipedia.org/wiki/Touch_%27n_Go"&gt;&lt;span style="color:#000099;"&gt;Touch ’n Go&lt;/span&gt;&lt;/a&gt;&lt;/strong&gt; to pay for my lunch from now on and I would surely recommend this &lt;strong&gt;&lt;a href="http://en.wikipedia.org/wiki/Touch_%27n_Go"&gt;&lt;span style="color:#000099;"&gt;Touch ’n Go&lt;/span&gt;&lt;/a&gt;&lt;/strong&gt; card is a must own for everyone.&lt;/span&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGScjrJAfWWWGuXQRo44Do-zoiiXKapM3a7ceEXnu3lDFw29wF8ZbQcIMBaUpbngBpCyoTUotfAbJS3QaebejSWfjKSDHkgyEy7O0lZ2oTNyQo0CWxihn_Z_U96GIzKQOp6syA45gc1M8/s72-c/1.bmp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">4</thr:total></item><item><title>Credit Card Debts: Causes and Preventions</title><link>http://g6ecommerce.blogspot.com/2008/06/credit-card-debts-causes-and.html</link><category>e-payments</category><category>week5</category><author>noreply@blogger.com (UBAI3013 E-COMMERCE)</author><pubDate>Mon, 23 Jun 2008 23:54:00 +0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2088153267698402729.post-4844146544666456981</guid><description>&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh09RUW_eSMrJVXGEQsPuPrehxKwIMiGNsBvPUPoZTyoLCwrgsQJnyucQjteRGUQYdWDphI48if8z8DLnaDo-Hp87NxTazW4NgythyphenhyphenhcOLXUWlCIfT21NThKgfiKEDuUvHPIaLavktNxbs/s1600-h/1.bmp"&gt;&lt;img id="BLOGGER_PHOTO_ID_5215109281680087218" style="DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center" height="122" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh09RUW_eSMrJVXGEQsPuPrehxKwIMiGNsBvPUPoZTyoLCwrgsQJnyucQjteRGUQYdWDphI48if8z8DLnaDo-Hp87NxTazW4NgythyphenhyphenhcOLXUWlCIfT21NThKgfiKEDuUvHPIaLavktNxbs/s400/1.bmp" width="214" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiggK5Y399cAaJ00Jx11cen4Wjn2a6umjtbLW0l6sh4mrI08Eroa1QsVYTjp13GJASLrUHiFLMNlULGrNvxhfQgIenogCiiZzUCfn55gw9oS2U6ZyB2I8KGZbSWp3BWghJAb33iYbQQIXc/s1600-h/2.bmp"&gt;&lt;img id="BLOGGER_PHOTO_ID_5215108005798230594" style="FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 173px; CURSOR: hand; HEIGHT: 218px" height="220" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiggK5Y399cAaJ00Jx11cen4Wjn2a6umjtbLW0l6sh4mrI08Eroa1QsVYTjp13GJASLrUHiFLMNlULGrNvxhfQgIenogCiiZzUCfn55gw9oS2U6ZyB2I8KGZbSWp3BWghJAb33iYbQQIXc/s400/2.bmp" width="181" border="0" /&gt;&lt;/a&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;span style="color:#cc0000;"&gt;&lt;strong&gt;Credit card&lt;/strong&gt;&lt;/span&gt; is the most widely used “currency” in the world and they are accepted almost everywhere nowadays. This small plastic card works superbly in e-commerce as a secured payment medium and it is convenient as well as easy to use. However, they can lead to a tragic and stressful ending if you misuse them.&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;&lt;span style="font-family:trebuchet ms;"&gt;One of the &lt;span style="color:#6600cc;"&gt;reasons&lt;/span&gt; families accumulating lots of credit card debt is &lt;span style="color:#333399;"&gt;poor money management&lt;/span&gt;. This is because they do not have a proper monthly spending budget or spending without ever knowing is it really necessary. By the end of the day, they probably find themselves trapped as they need to pay the snowballing interest debt. As credit can be so easily obtainable nowadays, people often place their reliance on the credit card and starts to spend more than they could earned. For instance, if one saw things that he wanted so much but cannot afford with his income, he may rely on the credit card. If this happens repeatedly and when the time comes to paying the debt back, it is your debt and your responsibility.&lt;br /&gt;&lt;br /&gt;Another reason for credit card debts is &lt;span style="color:#333399;"&gt;unexpected unemployment&lt;/span&gt;. It can happen when the main breadwinner for the house loses job unexpectedly but yet, monthly household expenses are still needed to be incurred. As a result of zero income, families are forced to use credit card for groceries, utilities and others.&lt;br /&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhbyr5U-cdvYxlWcUbBLkvnk8oJFnhPVCHRH8PSzBdO3DCZscaRwBPDCgfh_n-vpSBaYYJM3Z6Uxr9knwoZ_ro2FA1fWWt9QPaBm7Hlwm7Lwj7ADQmT1003RB0KYFn-TQwuwlwnxkEzhyphenhyphen8/s1600-h/3.bmp"&gt;&lt;img id="BLOGGER_PHOTO_ID_5215108790408758322" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 151px; CURSOR: hand; HEIGHT: 151px" height="142" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhbyr5U-cdvYxlWcUbBLkvnk8oJFnhPVCHRH8PSzBdO3DCZscaRwBPDCgfh_n-vpSBaYYJM3Z6Uxr9knwoZ_ro2FA1fWWt9QPaBm7Hlwm7Lwj7ADQmT1003RB0KYFn-TQwuwlwnxkEzhyphenhyphen8/s400/3.bmp" width="174" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style="color:#333399;"&gt;E-commerce can contribute to credit card debts&lt;/span&gt; as most of the web merchant will recommend to pay via credit card since it would be a more secured payment. For example, although there will rebates if you buy online for Dell computer, but a computer might cost you over thousands on a credit card debt immediately. Huge medical expenses can also contribute to credit card debt as most of the time we are required to pay first for the medical treatment. If one neither has cash in hand nor enough savings in the bank, hence credit card would be the solution to pay for such expenses.&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtNhwwU_1YbsPqhkVTf1tGfS9mghCr1CWLM5OLA-V7OUDLEsRkpihlSDLaAmcGTZ1q_ezLfSKkNasqG6pQdsDpzoLC49mXf2ixg3ItquIIrwaF9yLhwO3BIHJHuf9wRdhDQouXsOqvAYc/s1600-h/4.bmp"&gt;&lt;img id="BLOGGER_PHOTO_ID_5215108008999190674" style="FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtNhwwU_1YbsPqhkVTf1tGfS9mghCr1CWLM5OLA-V7OUDLEsRkpihlSDLaAmcGTZ1q_ezLfSKkNasqG6pQdsDpzoLC49mXf2ixg3ItquIIrwaF9yLhwO3BIHJHuf9wRdhDQouXsOqvAYc/s400/4.bmp" border="0" /&gt;&lt;/a&gt;However, there are &lt;span style="color:#6600cc;"&gt;ways to prevent&lt;/span&gt; our lives being surrounded by debts. Wisely use the plastic card for &lt;span style="color:#333399;"&gt;cash advance feature&lt;/span&gt; or as a &lt;span style="color:#333399;"&gt;payment medium&lt;/span&gt; in case of emergencies but not to take advantage of the credit feature. It is also encouraged to &lt;span style="color:#333399;"&gt;stop using credit card&lt;/span&gt; to make every payment as the first step to clear ourselves out of debt.&lt;br /&gt;&lt;br /&gt;Besides that, credit card debts can be minimized if we make &lt;span style="color:#333399;"&gt;payments of the credit card bill on time&lt;/span&gt; every month If possible, we are also encouraged to pay more than the minimum required so we are not bound to pay more for the interest. Moreover, debts wouldn’t have gone skyrocketing if we &lt;span style="color:#333399;"&gt;control ourselves&lt;/span&gt; from the seduction of credit card. As a way to get ride of it, make &lt;span style="color:#333399;"&gt;planning&lt;/span&gt; for our money and &lt;span style="color:#333399;"&gt;save more&lt;/span&gt;. This can make our life easier and stress free from debts. &lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh09RUW_eSMrJVXGEQsPuPrehxKwIMiGNsBvPUPoZTyoLCwrgsQJnyucQjteRGUQYdWDphI48if8z8DLnaDo-Hp87NxTazW4NgythyphenhyphenhcOLXUWlCIfT21NThKgfiKEDuUvHPIaLavktNxbs/s72-c/1.bmp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">2</thr:total></item><item><title>Electronic currency</title><link>http://g6ecommerce.blogspot.com/2008/06/electronic-currency.html</link><category>e-payments</category><category>week5</category><author>noreply@blogger.com (UBAI3013 E-COMMERCE)</author><pubDate>Mon, 23 Jun 2008 23:34:00 +0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2088153267698402729.post-2566048383958262361</guid><description>&lt;span style="font-family:trebuchet ms;"&gt;&lt;span style="color:#cc0000;"&gt;Electronic currency&lt;/span&gt;, also known as electronic money, digital money, digital cash or digital currency; refers to money or scrip which is exchanged only electronically. This involves the use of computer networks, the internet and digital stored value systems. &lt;span style="color:#006600;"&gt;Electronic Fund Transfer&lt;/span&gt; (EFT) and &lt;span style="color:#006600;"&gt;direct deposit&lt;/span&gt; are examples of electronic currency. It is also a collective term for financial cryptography and technologies that enabling it. &lt;/span&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjeap1X2GmSuz9dQO1aRzo9NBd1I71OtKKVENuyc-gCYv3ntrnp7GWlwPa0psaq17dGrvYmr_0_omG09gZ9Zxpc-in13v9pIDhA1I17BUgHD79FsYDZVcn2gJjEul3HdM6EJMO2z6AmHuE/s1600-h/chipknip.gif"&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;img id="BLOGGER_PHOTO_ID_5215103568224904578" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; CURSOR: hand" height="156" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjeap1X2GmSuz9dQO1aRzo9NBd1I71OtKKVENuyc-gCYv3ntrnp7GWlwPa0psaq17dGrvYmr_0_omG09gZ9Zxpc-in13v9pIDhA1I17BUgHD79FsYDZVcn2gJjEul3HdM6EJMO2z6AmHuE/s400/chipknip.gif" width="119" border="0" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;br /&gt;To date, the use of digital cash has been at a relatively low-scale. One rare success has been Hong Kong's &lt;/span&gt;&lt;a title="Octopus card" href="http://en.wikipedia.org/wiki/Octopus_card"&gt;&lt;span style="font-family:trebuchet ms;color:#333399;"&gt;Octopus card&lt;/span&gt;&lt;/a&gt;&lt;span style="font-family:trebuchet ms;"&gt; system, which started as a transit &lt;/span&gt;&lt;a title="Payment system" href="http://en.wikipedia.org/wiki/Payment_system"&gt;&lt;span style="font-family:trebuchet ms;color:#333399;"&gt;payment system&lt;/span&gt;&lt;/a&gt;&lt;span style="font-family:trebuchet ms;"&gt; and has grown into a widely used electronic cash system. Singapore also has an electronic money implementation for its public transportation system (commuter trains, bus, etc), which is very similar to Hong Kong's Octopus card and based on the same type of card (&lt;/span&gt;&lt;a title="FeliCa" href="http://en.wikipedia.org/wiki/FeliCa"&gt;&lt;span style="font-family:trebuchet ms;color:#333399;"&gt;FeliCa&lt;/span&gt;&lt;/a&gt;&lt;span style="font-family:trebuchet ms;"&gt;). A very successful implementation of electronic currency can be found in Netherlands, known as &lt;/span&gt;&lt;a title="Chipknip" href="http://en.wikipedia.org/wiki/Chipknip"&gt;&lt;span style="font-family:trebuchet ms;color:#333399;"&gt;Chipknip&lt;/span&gt;&lt;/a&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;span style="color:#333399;"&gt;.&lt;/span&gt; (&lt;em&gt;source: Wikipedia&lt;/em&gt;)&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAi_E-crIu9d3JCUCZGcByCxXnIk5aqdIdxenFsU-LpOD_Wt4Dyl6xe9wOsw9gahmLDeLTJE0GBOlEOXKeL54xaMHMH7JZlsb8fBlm6xonGJTdL5JHJl6weMdV1bsczMVFfhL2SDP4Htc/s1600-h/pay-via.jpg"&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;img id="BLOGGER_PHOTO_ID_5215102503938189970" style="FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 114px; CURSOR: hand; HEIGHT: 140px" height="159" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAi_E-crIu9d3JCUCZGcByCxXnIk5aqdIdxenFsU-LpOD_Wt4Dyl6xe9wOsw9gahmLDeLTJE0GBOlEOXKeL54xaMHMH7JZlsb8fBlm6xonGJTdL5JHJl6weMdV1bsczMVFfhL2SDP4Htc/s400/pay-via.jpg" width="130" border="0" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style="font-family:trebuchet ms;"&gt;An example of electronic currency in Malaysia will be &lt;span style="color:#333399;"&gt;MEPS cash&lt;/span&gt;. MEPS Cash is an e-Purse application and is a convenient method for routine daily purchases. It is one of the multiple applications contained in Bankcard; allowing Bankcard cardholders to load electronic monetary value into the chip. MEPS Cash serves as a &lt;span style="color:#330099;"&gt;convenient payment method&lt;/span&gt; for transactions, eliminating the inconvenience of carrying large volume of cash as well as the hassle in handling coins. The transactions &lt;span style="color:#330099;"&gt;operate off-line&lt;/span&gt;, which allow a much &lt;span style="color:#330099;"&gt;speedier transactions.&lt;/span&gt; &lt;/span&gt;&lt;div&gt;&lt;div&gt;&lt;br /&gt;&lt;div&gt;&lt;span style="font-family:trebuchet ms;"&gt;Click &lt;strong&gt;&lt;a href="http://smartcard.uum.edu.my/index.php?option=com_content&amp;amp;task=view&amp;amp;id=18"&gt;&lt;u&gt;&lt;span style="color:#cc0000;"&gt;here&lt;/span&gt;&lt;/u&gt;&lt;/a&gt;&lt;/strong&gt;&lt;span style="color:#cc0000;"&gt; &lt;/span&gt;to get to know how shop with MEPS Cash.&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjeap1X2GmSuz9dQO1aRzo9NBd1I71OtKKVENuyc-gCYv3ntrnp7GWlwPa0psaq17dGrvYmr_0_omG09gZ9Zxpc-in13v9pIDhA1I17BUgHD79FsYDZVcn2gJjEul3HdM6EJMO2z6AmHuE/s72-c/chipknip.gif" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>Mobile Payment System in Malaysia: Its Potential and Customers' Adoption Strategies</title><link>http://g6ecommerce.blogspot.com/2008/06/mobile-payment-systems-in-malaysia-its.html</link><category>e-payments</category><category>week5</category><author>noreply@blogger.com (UBAI3013 E-COMMERCE)</author><pubDate>Mon, 23 Jun 2008 13:46:00 +0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2088153267698402729.post-7338613107114151883</guid><description>&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhe7UdwZhs0CXQ8kZ6jd3dwYcNI7xyj8tYyho6Oryi-0PR0ySePoi2oCLb8-OJrYP5bxVoYi_SNwagyUwVekgRamL29XVKfgqmuifIM0SUQniHyz5GB8PHOP1eRzy1k7yqm1NEsN0ZR8yg/s1600-h/Mobile+Money.jpg"&gt;&lt;strong&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;img id="BLOGGER_PHOTO_ID_5214955292406721810" style="FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhe7UdwZhs0CXQ8kZ6jd3dwYcNI7xyj8tYyho6Oryi-0PR0ySePoi2oCLb8-OJrYP5bxVoYi_SNwagyUwVekgRamL29XVKfgqmuifIM0SUQniHyz5GB8PHOP1eRzy1k7yqm1NEsN0ZR8yg/s400/Mobile+Money.jpg" border="0" /&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/strong&gt;&lt;p align="justify"&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;span style="color:#cc0000;"&gt;Mobile payment&lt;/span&gt; referred to mobile web payment or WAP billing. It is the collection of money from a consumer via mobile devices such as mobile phone, &lt;a href="http://en.wikipedia.org/wiki/Smart_phone"&gt;SmartPhone&lt;/a&gt;, &lt;a href="http://en.wikipedia.org/wiki/PDA"&gt;Personal Digital Assistant (PDA)&lt;/a&gt;, etc. It has been widely adopted by a wide range of leading companies, such as World Wrestling Entertainment, PayPal, Google Checkout and etc. However, in Malaysia, there are not much companies adopt mobile payment systems. &lt;span style="color:#006600;"&gt;CIMB&lt;/span&gt;, &lt;span style="color:#006600;"&gt;Maxis&lt;/span&gt;, and &lt;span style="color:#006600;"&gt;Neowave&lt;/span&gt; are the Malaysian companies which currently introduce mobile payment systems to its customers.&lt;br /&gt;&lt;br /&gt;Mobile payment systems address the limitations and bottlenecks created by cash, cheques and credit cards. It unlocks the power of the mobile phone to make payments, allowing registered users to &lt;span style="color:#000099;"&gt;pay for goods and services at anytime, anywhere&lt;/span&gt; using only a mobile phone coupled with a 6-digit security PIN via SMS. This gives the freedom to shoppers to buy products and pay the merchant using their mobile phone without being physically present at the store. Furthermore, when it comes to online selling, selecting a payment gateway is one of the major obstacles faced by the merchants in Malaysia. There are too few choices available, worse, none of these limited choices are cost effective. This problem has been addressed by mobile payment system, since it allows merchants to take online order &lt;span style="color:#000099;"&gt;without&lt;/span&gt; the need for online shopper to &lt;span style="color:#000099;"&gt;disclose&lt;/span&gt; their &lt;span style="color:#000099;"&gt;credit card information&lt;/span&gt;. As a result, it will encourage more consumers to shop online and this will definitely be a great boon to the e-commerce industry in Malaysia.&lt;br /&gt;&lt;br /&gt;Mobile payment systems provide a &lt;span style="color:#ff6600;"&gt;safe and secure&lt;/span&gt; condition for customers as well as merchants. With mobile payment, customers do not have to be concern of cash, cheque or credit card handling problems or fraud. The mobile payment system &lt;span style="color:#ff6600;"&gt;conforms to the stringent requirements&lt;/span&gt; set by Bank Negara Malaysia and the participating banks. In addition, mobile payment offers &lt;span style="color:#ff6600;"&gt;super fast settlement&lt;/span&gt; in T+2 Days. As compared to other payment systems, mobile payment system guarantees that the transactions are settled in 2 working days. Normal credit card or cheque will require at leat 3-4 days for clearance. As for Internet payment gateway, it normally takes between 2 to 4 weeks or more. &lt;/span&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhiSmNwBc2pL9B_toZ-wzBMzaftGLWDZNTP4lQzUdA6iiqmLygbM3b3uMjOYbEUN0F2X7ujC6VhjBfG3PsoNFl-R72-0hewAxdJ5O-71rNY2F3JUHodhPI16XCvL3jIkoef4zwdQ2NYZcE/s1600-h/mobile+payment.bmp"&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;img id="BLOGGER_PHOTO_ID_5214956583338047906" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; CURSOR: hand" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhiSmNwBc2pL9B_toZ-wzBMzaftGLWDZNTP4lQzUdA6iiqmLygbM3b3uMjOYbEUN0F2X7ujC6VhjBfG3PsoNFl-R72-0hewAxdJ5O-71rNY2F3JUHodhPI16XCvL3jIkoef4zwdQ2NYZcE/s400/mobile+payment.bmp" border="0" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;br /&gt;&lt;br /&gt;In conclusion, mobile payment systems in Malaysia have offered a great deal of promotions to encourage customers or merchants to adopt the newly introduced payment system. It is inevitable that mobile phone will become a &lt;span style="color:#cc33cc;"&gt;payment tool&lt;/span&gt;. Mobile payment enables the mobile phone to function like a &lt;span style="color:#cc33cc;"&gt;credit card&lt;/span&gt; and allows users to &lt;span style="color:#cc33cc;"&gt;pay from wherever&lt;/span&gt; they may be.&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;&lt;div align="justify"&gt;&lt;strong&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhe7UdwZhs0CXQ8kZ6jd3dwYcNI7xyj8tYyho6Oryi-0PR0ySePoi2oCLb8-OJrYP5bxVoYi_SNwagyUwVekgRamL29XVKfgqmuifIM0SUQniHyz5GB8PHOP1eRzy1k7yqm1NEsN0ZR8yg/s72-c/Mobile+Money.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>How to Safeguard Our Personal and Financial Data</title><link>http://g6ecommerce.blogspot.com/2008/06/how-to-safeguard-our-personal-and.html</link><category>securities</category><category>week4</category><author>noreply@blogger.com (UBAI3013 E-COMMERCE)</author><pubDate>Sun, 22 Jun 2008 13:46:00 +0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2088153267698402729.post-8553665887396308477</guid><description>&lt;span style="font-family:trebuchet ms;"&gt;With just a few clicks on the mouse, E-Commerce allows us to shop online at over thousands of online stores, more options together with detailed description of the product. We can buy almost anything he wants such as books, airline tickets and many more. This is a fun, practical and economic way to shop but sometimes, &lt;span style="color:#ff0000;"&gt;things may go wrong shopping online&lt;/span&gt;. For example, e-mail address being sold to third parties and personal or financial information being stolen. Thus, in order to &lt;span style="color:#3333ff;"&gt;shop safely&lt;/span&gt; and &lt;span style="color:#3333ff;"&gt;wisely online&lt;/span&gt;, we should &lt;span style="color:#ff0000;"&gt;take the following sensible precautions.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8j-mudgRFBZX6xrQV62ylr_ViYpNbQpGV_d3eE9nC0tB2vGh7CKhV48pyV7UFbUp_Cv5DN234vDKM12Pn4STU_giP-EupZocHcEQauFyZqNLJWYN3YdiGZK8jXxYLIX67LYAxPBgbV18/s1600-h/hackers_05.jpg"&gt;&lt;img id="BLOGGER_PHOTO_ID_5214581826274666882" style="FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8j-mudgRFBZX6xrQV62ylr_ViYpNbQpGV_d3eE9nC0tB2vGh7CKhV48pyV7UFbUp_Cv5DN234vDKM12Pn4STU_giP-EupZocHcEQauFyZqNLJWYN3YdiGZK8jXxYLIX67LYAxPBgbV18/s400/hackers_05.jpg" border="0" /&gt;&lt;/a&gt;We should &lt;span style="color:#006600;"&gt;always use a true credit card&lt;/span&gt; rather than a debit card, check card, or an ATM card to pay for the purchase. This is because if something goes wrong such as someone has used the credit card without authorization, we are protected under federal law for a limited charge to $50. Debit and ATM cards are not protected by the federal law to the extent that credit cards are.&lt;br /&gt;&lt;br /&gt;Nowadays, most E-Commerce websites would require us to log-in before placing an order. &lt;span style="color:#006600;"&gt;Keep the log-in password&lt;/span&gt; private and never reveal it to anyone. Besides that, we should not use commonly known information such as our social security number, birthdate as a security question in case of forgotten password. This may prevent someone log-in to our account and perform unwanted transaction.&lt;br /&gt;&lt;br /&gt;It is encouraged to&lt;span style="color:#006600;"&gt; shop online at secure websites&lt;/span&gt; as they use encryption technology to transfer information from our computer to the online merchant’s computer. This technology provides more secure of our personal and financial data such as credit card number for the reason that it scrambles the information in order to prevent hackers from obtaining it. Only authorities with legitimate access privileges have the ability to unscramble the code.&lt;br /&gt;&lt;br /&gt;It is a must procedure to provide certain information such as name and address to the web merchant when placing an order. But sometimes, they may ask further information such as occupation, annual income, and leisure lifestyle. This kind of information is used to target us for marketing purposes which can lead to spam, direct mail and telephone solicitations. Therefore,&lt;span style="color:#006600;"&gt; disclose only the bare facts&lt;/span&gt; when ordering or leave the site if it insisted for such information.&lt;br /&gt;&lt;br /&gt;Additionally, we should &lt;span style="color:#006600;"&gt;never give out our social security number&lt;/span&gt; to the web merchant. This is definitely neither a requirement for placing an order at an E-Commerce website nor they have the need and rights to ask for it. By doing so, we can prevent our identities being stolen by imposters. For instance, imposters may use victims’ social security number to apply for new credit cards.&lt;br /&gt;&lt;/span&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8j-mudgRFBZX6xrQV62ylr_ViYpNbQpGV_d3eE9nC0tB2vGh7CKhV48pyV7UFbUp_Cv5DN234vDKM12Pn4STU_giP-EupZocHcEQauFyZqNLJWYN3YdiGZK8jXxYLIX67LYAxPBgbV18/s72-c/hackers_05.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">2</thr:total></item><item><title>Threat of online security-How safe is our data?</title><link>http://g6ecommerce.blogspot.com/2008/06/threat-of-online-security-how-safe-is.html</link><category>securities</category><category>week4</category><author>noreply@blogger.com (UBAI3013 E-COMMERCE)</author><pubDate>Sat, 21 Jun 2008 13:07:00 +0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2088153267698402729.post-184933917929995120</guid><description>&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjF4mru-zNAB2DxHtkFqxbPvGJOth0WvynbmiCUMzqI8mTMm8j88Q-BIBAP52B4rQMOzZuswESoJlXnGRbohFEvmBAtLv3cXYW4IaSAnL8jv3THoh-VTRXWOBid910UVfr37v8jZcioHxw/s1600-h/worm_chomping_on_computer_hg_wht.gif"&gt;&lt;img id="BLOGGER_PHOTO_ID_5214237853579751394" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 256px; CURSOR: hand; HEIGHT: 211px" height="210" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjF4mru-zNAB2DxHtkFqxbPvGJOth0WvynbmiCUMzqI8mTMm8j88Q-BIBAP52B4rQMOzZuswESoJlXnGRbohFEvmBAtLv3cXYW4IaSAnL8jv3THoh-VTRXWOBid910UVfr37v8jZcioHxw/s400/worm_chomping_on_computer_hg_wht.gif" width="295" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;span style="color:#ff6600;"&gt;Threat to online security&lt;/span&gt; has become a problem in today’s online businesses, especially e-commerce. Data sent over the internet will be open to potential threats if measurable safety is not taken.&lt;br /&gt;Among the major threats include:-&lt;br /&gt;&lt;br /&gt;&lt;em&gt;&lt;span style="color:#6633ff;"&gt;&lt;a href="http://en.wikipedia.org/wiki/Trojan_horse_%28computing%29"&gt;Trojans&lt;/a&gt; and &lt;a href="http://en.wikipedia.org/wiki/System_monitor"&gt;system monitors&lt;/a&gt;&lt;/span&gt;&lt;/em&gt;- Once inside a computer, Trojans will &lt;span style="color:#3366ff;"&gt;open a communications port&lt;/span&gt; and &lt;span style="color:#3366ff;"&gt;report back to a computer through the Internet&lt;/span&gt;. The Trojan itself may include &lt;span style="color:#ff0000;"&gt;&lt;a href="http://en.wikipedia.org/wiki/Keylogger"&gt;keylogger&lt;/a&gt;&lt;/span&gt;, or might be use to &lt;span style="color:#ff0000;"&gt;download a &lt;a href="http://en.wikipedia.org/wiki/Keylogger"&gt;keylogger&lt;/a&gt; program&lt;/span&gt;. This system monitors will track everything that the computer’s owner does, include collecting passwords, credit card numbers and other sensitive data. The information is then stored in a file where it can be retrieved from the internet. To protect our computer, we will just need to install a &lt;a href="http://en.wikipedia.org/wiki/Firewall"&gt;firewall&lt;/a&gt; and antivirus program. Both of theses programs will keep the Trojans from entering into our computers illegally. &lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;em&gt;&lt;span style="color:#6600cc;"&gt;&lt;span style="color:#6633ff;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgEew7pM1xSROun9POYLTHobu8KwKsRocJa-qxUVAhzb_zDFuDP3Ix5SSXRCwvht_1Fr2nEbVq6D_YSCjSe_fmT75JjEuvgFfADbCUX-8zIsubhMDXuD9x6hfwGbYwaMD2cMVMGpp7YPjY/s1600-h/spyware-709821.jpg"&gt;&lt;img id="BLOGGER_PHOTO_ID_5214238065510334514" style="FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 237px; CURSOR: hand; HEIGHT: 313px" height="315" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgEew7pM1xSROun9POYLTHobu8KwKsRocJa-qxUVAhzb_zDFuDP3Ix5SSXRCwvht_1Fr2nEbVq6D_YSCjSe_fmT75JjEuvgFfADbCUX-8zIsubhMDXuD9x6hfwGbYwaMD2cMVMGpp7YPjY/s400/spyware-709821.jpg" width="212" border="0" /&gt;&lt;/a&gt;&lt;a href="http://en.wikipedia.org/wiki/Spyware"&gt;Spyware&lt;/a&gt;&lt;/span&gt;-&lt;/span&gt;&lt;/em&gt; A &lt;a href="http://en.wikipedia.org/wiki/Spyware"&gt;spyware&lt;/a&gt; is a program that &lt;span style="color:#3366ff;"&gt;runs in the background on a user computer without the user even knowing it is there&lt;/span&gt;. These types of threats generally &lt;span style="color:#3366ff;"&gt;collect data&lt;/span&gt; from the infected machine and through that machines internet connection, the data collected will be &lt;span style="color:#3366ff;"&gt;transmit to a third party&lt;/span&gt;. Such threats can be installed from visited websites and in many cases is bundled with software and is installed without the end users knowledge during the software's install process. We can install anti-spyware program which can detected all the spywares inside our computer and then deleted them. &lt;/span&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjF4mru-zNAB2DxHtkFqxbPvGJOth0WvynbmiCUMzqI8mTMm8j88Q-BIBAP52B4rQMOzZuswESoJlXnGRbohFEvmBAtLv3cXYW4IaSAnL8jv3THoh-VTRXWOBid910UVfr37v8jZcioHxw/s72-c/worm_chomping_on_computer_hg_wht.gif" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">2</thr:total></item><item><title>The application of 3rd party certification programme in Malaysia</title><link>http://g6ecommerce.blogspot.com/2008/06/application-of-3rd-party-certification.html</link><category>securities</category><category>week4</category><author>noreply@blogger.com (UBAI3013 E-COMMERCE)</author><pubDate>Sat, 21 Jun 2008 12:56:00 +0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2088153267698402729.post-6098259820672834416</guid><description>&lt;span style="font-family:trebuchet ms;"&gt;The growth in e-commerce brings with an increase in the variety of fraudulent web activities conducted by the unscrupulous. &lt;span style="color:#ff6600;"&gt;3rd party certification&lt;/span&gt; is a way of &lt;span style="color:#009900;"&gt;providing assurance&lt;/span&gt; to both business and consumer where the assurance is actually achieved by displaying an independent organization’s trust mark or seal on an approved participant’s web site. Nevertheless, trust marks can only be considered reliable if the party providing the assurance employs globally accepted criteria and standards in its website evaluation process.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDNYj536kxRtnn1eudeKmeyQIP7AvgXR2jIx0rJtnsVtqm3qCxdHHVyMpz7fmY24l-kiA47Rer_GvCgag4gwJ3pBgtK3qoWxFKQHrNlrHsMjNUjRwee6unfyKPyoQQkasVlmMVgf04w6M/s1600-h/logo_verisign_fr.gif"&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;/a&gt;&lt;/span&gt;&lt;a href="http://en.wikipedia.org/wiki/Verisign"&gt;&lt;img id="BLOGGER_PHOTO_ID_5214194887427595554" style="FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDNYj536kxRtnn1eudeKmeyQIP7AvgXR2jIx0rJtnsVtqm3qCxdHHVyMpz7fmY24l-kiA47Rer_GvCgag4gwJ3pBgtK3qoWxFKQHrNlrHsMjNUjRwee6unfyKPyoQQkasVlmMVgf04w6M/s400/logo_verisign_fr.gif" border="0" /&gt;&lt;/a&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;span style="color:#000099;"&gt;Secure Sockets Layer (SSL) Certificates&lt;/span&gt; is one of the 3rd party certification programmes which being applied in Malaysia. SSL secures website by &lt;span style="color:#003300;"&gt;encrypting information and providing authentication&lt;/span&gt; which allowing customers to connect over a secure &lt;a href="http://en.wikipedia.org/wiki/Https"&gt;&lt;u&gt;HTTPS&lt;/u&gt;&lt;/a&gt; connection. It provides businesses and consumers with the confidence that private data sent to a website, such as credit card numbers, are kept confidential. In Malaysia, SSL is widely being applied in businesses which have an online store or accept online orders and credits cards; have to process sensitive data such as address, birth date, license, or ID numbers; and need to comply with privacy and security requirements. &lt;span style="color:#009900;"&gt;&lt;a href="http://www.mph.com.my/"&gt;&lt;u&gt;Mphonline.com&lt;/u&gt;&lt;/a&gt;&lt;/span&gt; is &lt;a href="http://en.wikipedia.org/wiki/Verisign"&gt;&lt;u&gt;VeriSign SSL certified&lt;/u&gt;&lt;/a&gt; where there is a logo being attached on the website.&lt;br /&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQZgiTKg4GaPAp8pT6h5z1_FkvwgfHEZFy_IBygVPa75MSJObLHId2sIfxiIH6lU7zFtR-cg7eLL0FfWIzq2z2xvR3VDlIrLPK289jYRknlx7pwZrUJzzC3yeH0n8QOGE2RDr5S6QJWQw/s1600-h/truste_seal.gif"&gt;&lt;a href="http://en.wikipedia.org/wiki/Trust_e"&gt;&lt;img id="BLOGGER_PHOTO_ID_5214196207040976050" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; CURSOR: hand" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQZgiTKg4GaPAp8pT6h5z1_FkvwgfHEZFy_IBygVPa75MSJObLHId2sIfxiIH6lU7zFtR-cg7eLL0FfWIzq2z2xvR3VDlIrLPK289jYRknlx7pwZrUJzzC3yeH0n8QOGE2RDr5S6QJWQw/s400/truste_seal.gif" border="0" /&gt;&lt;/a&gt;&lt;/a&gt;&lt;br /&gt;Another 3rd party certification programme being applied in Malaysia is &lt;span style="color:#000099;"&gt;&lt;a href="http://en.wikipedia.org/wiki/Trust_e"&gt;&lt;u&gt;Trust-E Web Privacy Seal.&lt;/u&gt;&lt;/a&gt;&lt;/span&gt; It merely serve for the purpose of &lt;span style="color:#003300;"&gt;building confidence with consumers and driving revenue&lt;/span&gt; of the business by letting customers know that they can trust about the business with their personal information. In protecting privacy of jobseeker on posting online resumes, &lt;span style="color:#009900;"&gt;&lt;a href="http://www.jobstreet.com/"&gt;&lt;u&gt;Jobstreet.com&lt;/u&gt;&lt;/a&gt;&lt;/span&gt; has the &lt;a href="http://en.wikipedia.org/wiki/Trust_e"&gt;Trust-E&lt;/a&gt; seal which guarantees privacy and confidentiality for registered resumes. As such, the jobseeker has the final say on who to send the resume to or who shall have access to its contents.&lt;/span&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDNYj536kxRtnn1eudeKmeyQIP7AvgXR2jIx0rJtnsVtqm3qCxdHHVyMpz7fmY24l-kiA47Rer_GvCgag4gwJ3pBgtK3qoWxFKQHrNlrHsMjNUjRwee6unfyKPyoQQkasVlmMVgf04w6M/s72-c/logo_verisign_fr.gif" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Review on Post: "Growing threat from mobile malware"</title><link>http://g6ecommerce.blogspot.com/2008/06/review-on-post-growing-threat-from.html</link><category>review</category><category>securities</category><category>week4</category><author>noreply@blogger.com (UBAI3013 E-COMMERCE)</author><pubDate>Sat, 21 Jun 2008 12:39:00 +0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2088153267698402729.post-6358620075798873042</guid><description>&lt;span style="font-family:trebuchet ms;"&gt;(review source: &lt;/span&gt;&lt;a href="http://ecommerze.blogspot.com/search/label/Internet%20Security"&gt;&lt;span style="font-family:trebuchet ms;color:#000099;"&gt;http://ecommerze.blogspot.com/search/label/Internet%20Security&lt;/span&gt;&lt;/a&gt;&lt;span style="font-family:trebuchet ms;"&gt;)&lt;/span&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPodDZ_9UhTNLkSvHKEGQpcPesF1a2CMMpGTV0OKE2dPMd3nlg0wD5fgrM8Jk9NNB37g32dGu10gHbhphZ-xkvn3YGcKZ8LOaTpNVqdt9IYBPxVaB2FSNiZ4xAhVZJLMWn0UroH5ysJzM/s1600-h/mobile-malware-virus-lg1.jpg"&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href="http://en.wikipedia.org/wiki/Mobile_virus"&gt;&lt;img id="BLOGGER_PHOTO_ID_5214191400881687522" style="DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPodDZ_9UhTNLkSvHKEGQpcPesF1a2CMMpGTV0OKE2dPMd3nlg0wD5fgrM8Jk9NNB37g32dGu10gHbhphZ-xkvn3YGcKZ8LOaTpNVqdt9IYBPxVaB2FSNiZ4xAhVZJLMWn0UroH5ysJzM/s400/mobile-malware-virus-lg1.jpg" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;a href="http://en.wikipedia.org/wiki/Mobile_virus"&gt;&lt;span style="color:#3333ff;"&gt;&lt;u&gt;Mobile malware&lt;/u&gt;&lt;/span&gt;&lt;/a&gt; is indeed a threat for mobile users, even though the malware is not so threatening compare to computer malware. The mobile malwares “are around 20 years behind those plaguing PCs now, according to a security company chief” (&lt;span style="color:#6600cc;"&gt;CNET News.com, September 2007&lt;/span&gt;).&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;span style="font-family:trebuchet ms;"&gt;The history of mobile malware generally started from &lt;span style="color:#333399;"&gt;June 2004&lt;/span&gt; with the release of &lt;a href="http://en.wikipedia.org/wiki/Caribe_%28computer_worm%29"&gt;&lt;span style="color:#3333ff;"&gt;&lt;u&gt;Cabir&lt;/u&gt;&lt;/span&gt;&lt;/a&gt;. Since that time, the rate of growth has consistently sent the message that &lt;a href="http://en.wikipedia.org/wiki/Mobile_virus"&gt;&lt;span style="color:#3333ff;"&gt;&lt;u&gt;mobile malware&lt;/u&gt;&lt;/span&gt;&lt;/a&gt; is emerging as a legitimate threat. To date, most of the malware targeting mobile devices has been proof of concept code written to call attention to potential threats. However, there are a few examples of code written to cause serious damage, &lt;span style="color:#330099;"&gt;stealing of data, eavesdrop on conversations&lt;/span&gt;, and &lt;span style="color:#330099;"&gt;incurring additional charges on customer accounts&lt;/span&gt;.&lt;br /&gt;In September 2007, McAfee's Avert Labs released a whitepaper discussing the ways hackers might attack Windows Mobile-based smartphones. The &lt;span style="color:#ff0000;"&gt;greatest threats&lt;/span&gt; lie in 7 areas:&lt;br /&gt;&lt;span style="color:#333399;"&gt;-Text messages&lt;br /&gt;-Contacts&lt;br /&gt;-Video&lt;br /&gt;-Phone transcriptions&lt;br /&gt;-Call records&lt;br /&gt;-Documentation&lt;br /&gt;-Buffer overflows&lt;/span&gt;&lt;br /&gt;For more information, go to&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;u&gt;&lt;a href="http://www.windowsfordevices.com/news/NS4876519484.html"&gt;&lt;span style="font-family:trebuchet ms;color:#333399;"&gt;&lt;u&gt;http://www.windowsfordevices.com/news/NS4876519484.html&lt;/u&gt;&lt;/span&gt;&lt;/a&gt;&lt;/u&gt;&lt;br /&gt;&lt;/div&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;/span&gt;&lt;br /&gt;&lt;div&gt;&lt;span style="font-family:trebuchet ms;"&gt;Most analysts predict that the growing power, functionality, and popularity of smartphones &lt;span style="color:#333399;"&gt;may make mobile platforms an irresistible target for malware authors&lt;/span&gt; by the end of 2007. The increasing threat will need to be solved even though it is still not so threatening. But in a few years, &lt;span style="color:#333399;"&gt;mobile malware may evolve&lt;/span&gt;, and may turn into like those affecting computers. The wireless industry can begin defending against mobile threats now by creating resilient infrastructures which are content aware, educating users, and implementing technical safeguards on mobile devices.&lt;/span&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPodDZ_9UhTNLkSvHKEGQpcPesF1a2CMMpGTV0OKE2dPMd3nlg0wD5fgrM8Jk9NNB37g32dGu10gHbhphZ-xkvn3YGcKZ8LOaTpNVqdt9IYBPxVaB2FSNiZ4xAhVZJLMWn0UroH5ysJzM/s72-c/mobile-malware-virus-lg1.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Phishing - Examples and Its Prevention Methods</title><link>http://g6ecommerce.blogspot.com/2008/06/phishing-example-and-prevention-methods.html</link><category>securities</category><category>week4</category><author>noreply@blogger.com (UBAI3013 E-COMMERCE)</author><pubDate>Wed, 18 Jun 2008 16:49:00 +0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2088153267698402729.post-778160320744529701</guid><description>&lt;div align="justify"&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;span style="color:#000000;"&gt;&lt;span style="color:#cc0000;"&gt;Phishing&lt;/span&gt; is one of the most damaging&lt;span style="color:#cc0000;"&gt; &lt;u&gt;online security threats&lt;/u&gt;&lt;/span&gt;. It is an email fraud method in which the fraudster sends out legitimate-looking email in an attempt to extract &lt;em&gt;&lt;span style="color:#cc0000;"&gt;confidential information&lt;/span&gt;&lt;/em&gt; such usernames, passwords and credit card details from recipients. Typically, the messages appear to come from well known and trustworthy websites, eg: &lt;em&gt;&lt;span style="color:#000099;"&gt;PayPal&lt;/span&gt;, &lt;span style="color:#000099;"&gt;eBay&lt;/span&gt;, &lt;span style="color:#000099;"&gt;MSN&lt;/span&gt;, &lt;span style="color:#000099;"&gt;Yahoo&lt;/span&gt;, &lt;span style="color:#000099;"&gt;BestBuy&lt;/span&gt;&lt;/em&gt; and &lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;span style="color:#000000;"&gt;&lt;em&gt;&lt;span style="color:#000099;"&gt;America Online&lt;/span&gt;.&lt;br /&gt;&lt;/em&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:trebuchet ms;color:#000000;"&gt;Phishers use a number of different social engineering and email spoofing ploys to try to trick their victims. There is a &lt;span style="color:#cc0000;"&gt;case&lt;/span&gt; where a 17-year-old male sent out messages purporting to be from America Online that said there had been a billing problem with recipients’ AOL accounts. The fraudster’s email used AOL logos and contained legitimate links. If recipients clicked on the “AOL Billing Center” link, they were taken to a spoofed AOL webpage that asked for personal information, including credit card numbers, personal identification numbers, social security numbers, banking numbers, and passwords. This information was used for identify theft.&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;span style="font-family:trebuchet ms;color:#000000;"&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;br /&gt;&lt;span style="color:#000000;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;span style="font-family:trebuchet ms;color:#000000;"&gt;Another &lt;span style="color:#cc0000;"&gt;example&lt;/span&gt; of phishing email is as follow:&lt;/span&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;br /&gt;&lt;span style="color:#000000;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;span style="font-family:trebuchet ms;color:#000000;"&gt;&lt;img id="BLOGGER_PHOTO_ID_5213141777789880162" style="DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnIyj1SNWii4V5eCXg3KKrDWXGXa3ulAr-dhmjF88yRpfVdi6kcnEtS6G3fuRXzUDwbNsHd2vwfOlfoGN8kQ04ANB_nlGS4Wnw0kMpTpbVbUSAaHoTk3k7yaKVVu5703Ho4zrXeMa0pR8/s400/example_phish.gif" border="0" /&gt;&lt;/span&gt;&lt;/div&gt;&lt;p align="justify"&gt;&lt;span style="font-family:trebuchet ms;color:#000000;"&gt;There are &lt;span style="color:#cc0000;"&gt;several technical or non-technical ways to &lt;u&gt;prevent&lt;/u&gt; phishing attacks&lt;/span&gt;. &lt;em&gt;&lt;span style="color:#009900;"&gt;Firstly&lt;/span&gt;&lt;/em&gt;, educate users to understand how phishing attacks work and be alert when phishing-alike emails are received. &lt;em&gt;&lt;span style="color:#009900;"&gt;Secondly&lt;/span&gt;&lt;/em&gt;, use legal methods to punish phishing attackers. &lt;em&gt;&lt;span style="color:#009900;"&gt;Thirdly&lt;/span&gt;&lt;/em&gt;, use technical methods to stop phishing attackers. These may include detect and block the phishing website in time, enhance the security of the websites, and block the phishing emails by various spam filters.&lt;/span&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnIyj1SNWii4V5eCXg3KKrDWXGXa3ulAr-dhmjF88yRpfVdi6kcnEtS6G3fuRXzUDwbNsHd2vwfOlfoGN8kQ04ANB_nlGS4Wnw0kMpTpbVbUSAaHoTk3k7yaKVVu5703Ho4zrXeMa0pR8/s72-c/example_phish.gif" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>Revenue Model for GOOGLE, AMAZON.COM &amp; EBAY</title><link>http://g6ecommerce.blogspot.com/2008/06/revenue-model-for-google-amazoncom-ebay.html</link><category>e-commerce</category><category>week3</category><author>noreply@blogger.com (UBAI3013 E-COMMERCE)</author><pubDate>Thu, 12 Jun 2008 17:14:00 +0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2088153267698402729.post-777577942982610227</guid><description>&lt;div align="justify"&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;span style="color:#663366;"&gt;&lt;u&gt;Revenue model&lt;/u&gt;&lt;/span&gt; is a description of how the company or an e-commerce project will earn revenue. Basically, revenue of a company can be generated through &lt;span style="color:#663366;"&gt;sales, transaction fees, subscription fees, advertising fees, affiliate fees&lt;/span&gt;, and other revenue sources.&lt;br /&gt;&lt;/span&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpbA9d0tJPUpwhCbD15nn0TFUk9totxzOXO_52EU_q_Is_9zyI9HDBYeDyxvDXB66WK3LMwdCSBBVn01kUjXGoA8Dkn8aESh35pQPRyrOSRcBHqREgwLtMDdJYh_25zzGOUAQFYaL74Bk/s1600-h/google.jpg"&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;img id="BLOGGER_PHOTO_ID_5210955176166708674" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 310px; CURSOR: hand; HEIGHT: 156px" height="157" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpbA9d0tJPUpwhCbD15nn0TFUk9totxzOXO_52EU_q_Is_9zyI9HDBYeDyxvDXB66WK3LMwdCSBBVn01kUjXGoA8Dkn8aESh35pQPRyrOSRcBHqREgwLtMDdJYh_25zzGOUAQFYaL74Bk/s400/google.jpg" width="298" border="0" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;br /&gt;Google Inc.’s revenue for the year ended 31 December, 2007 was US$ 16,593,986,000. This included advertising revenue for Google websites (approximately US$ 10,624,700,000 or 64%) and Google Network websites (approximately US$ 5,787,900,000 or 35%). Another 1% of the revenue model was from licensing and other revenue (approximately US$ 181,400,000). &lt;/span&gt;&lt;/div&gt;&lt;div align="left"&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;span style="color:#330033;"&gt;Links&lt;/span&gt;:&lt;span style="color:#339999;"&gt; &lt;/span&gt;&lt;a href="http://investor.google.com/pdf/2007_Google_AnnualReport.pdf"&gt;&lt;em&gt;&lt;span style="color:#336666;"&gt;&lt;span style="color:#3366ff;"&gt;&lt;u&gt;G&lt;/u&gt;&lt;u&gt;oogle's Annual Report 2007&lt;/u&gt;&lt;/span&gt; &lt;/span&gt;&lt;/em&gt;&lt;/a&gt;&lt;/span&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;/span&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;div align="justify"&gt;&lt;br /&gt;&lt;/div&gt;&lt;/span&gt;&lt;div align="justify"&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;img id="BLOGGER_PHOTO_ID_5210954442256783074" style="DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh12KGYEh-B7L4oRPoFMKi7ou1qeEBy53wHj2Rsal8d_LLyM03OLjiP15DTqxpGtOtN6v4nsWzaYb857KBlyBqFW3dCJJ3tsR-vIlktHn25lzgHt9gZCVBer6ciVGCTa9mvWFUy-ixirwc/s400/GOOGLE.bmp" border="0" /&gt;&lt;br /&gt;&lt;/span&gt;&lt;div align="justify"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_wFEQMF1fbagXKKqQNZu39ey0mHDu9_1EabnHP-g8XMn5beiCgwMO-39CoKlJSeuCXkk1uvf0d4zm3v-FOYvFaPE7ymZoUeutaPz3xuC9MzQKs_tzDYCAOx9iOYo8tdmKQ8_sAP7TLzg/s1600-h/amazon-logo.jpg"&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;img id="BLOGGER_PHOTO_ID_5210955708713086738" style="FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 311px; CURSOR: hand; HEIGHT: 160px" height="159" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_wFEQMF1fbagXKKqQNZu39ey0mHDu9_1EabnHP-g8XMn5beiCgwMO-39CoKlJSeuCXkk1uvf0d4zm3v-FOYvFaPE7ymZoUeutaPz3xuC9MzQKs_tzDYCAOx9iOYo8tdmKQ8_sAP7TLzg/s400/amazon-logo.jpg" width="329" border="0" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style="font-family:trebuchet ms;"&gt;As for Amazon.Com, the revenue models are primarily generated from sales. For the year ended 31 December 2007, the total net sales were US$ 14,835,000,000. This sales amount could be classified into two geographical areas which are North America and International. The net sales for North America were US$ 8,095,000,000 whereas the net sales for International were US$ 6,740,000,000. Now, Amazon.Com also takes the opportunities of using advertising fees as a passive income for advertisers to promote their advertisements to earn extra income. &lt;/span&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;span style="color:#330033;"&gt;Links: &lt;a href="http://nasdaq.ar.wilink.com/getpdf.asp?session_ID=FA4638E4A4B04A4D&amp;amp;virtual=V0000080254"&gt;&lt;em&gt;&lt;span style="color:#3366ff;"&gt;&lt;u&gt;Amazon's Annual Report 2007&lt;/u&gt;&lt;/span&gt;&lt;/em&gt;&lt;/a&gt;&lt;/span&gt; &lt;/span&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;/span&gt;&lt;div align="justify"&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;img id="BLOGGER_PHOTO_ID_5210954436061237234" style="DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWvm5j4exlz8i1yA3xNkMpgwDukehVAjqfzmDnZksoWdFPDUjlc9jVWQHYYVQQGYqYj8_UWculS_DbXpJVKvZk20vYDUjWIIhWUOAdcC4AWhyPtCjjaLrPudI_9bmnCAGfIGjF-OfTtws/s400/AMAZON.bmp" border="0" /&gt;&lt;/span&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKltNJEZNmaxjQ2syuTtfIlvCAWco2Cs5iOgUGCgtqPdd_jZx1v4nBBj4c5WlIPZd-xqxjHTrRq0wcGxGLofaBXyD9vfrewum1KbQfM5CeIHDyoLhwkTHgx4OYhKTiBX36Q4ygMwsmKxo/s1600-h/ebay.png"&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;img id="BLOGGER_PHOTO_ID_5210957413046872754" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; CURSOR: hand" height="164" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKltNJEZNmaxjQ2syuTtfIlvCAWco2Cs5iOgUGCgtqPdd_jZx1v4nBBj4c5WlIPZd-xqxjHTrRq0wcGxGLofaBXyD9vfrewum1KbQfM5CeIHDyoLhwkTHgx4OYhKTiBX36Q4ygMwsmKxo/s400/ebay.png" width="347" border="0" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style="font-family:trebuchet ms;"&gt;On the other hand, the total net revenue for eBay Inc. for the year ended 31 December, 2007 was US$ 5,969,741,000. The revenue of eBay Inc. mainly generated through transaction fees. The total net transaction revenue was recorded as US$ 5,797,920,000 or in other words, the transaction revenue was 97.1% of the total net revenue. The total net transaction revenue could be further breakdown into Marketplaces net transaction revenue (US$ 4,203,340,000 or 70.4%), Payments net transaction revenue (US$ 1,401,824,000 or 23.5%) and Communications net transaction revenue (US$ 192,756,000 or 3.2%). The other portions of the total net revenue were advertising and other net revenue, which stated as US$ 171,821,000 or 2.9%. &lt;/span&gt;&lt;/div&gt;&lt;div align="left"&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;span style="color:#330033;"&gt;Links: &lt;a href="http://files.shareholder.com/downloads/ebay/341530398x0x192977/08eaa22c-c31c-41ad-b4d3-0a954354566f/ar2007.pdf"&gt;&lt;em&gt;&lt;span style="color:#3366ff;"&gt;&lt;u&gt;eBay's Annual Report 2007&lt;/u&gt;&lt;/span&gt; &lt;/em&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align="left"&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;img id="BLOGGER_PHOTO_ID_5210954434659514434" style="DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwzD0zjAO06R-quoMZQ9kB9H0K1UzDOzvjPdIISQA21fOE7bJZIwizRu3JZmN97YfrGRzLzrujrNgOODEBa1nQgmwbHiUNpLmdRROFw4TCNtUnL1DNKJ2AMzliqbPCN9AVoWDxOt2e2uE/s400/EBAY.bmp" border="0" /&gt; &lt;/span&gt;&lt;div align="justify"&gt;&lt;span style="font-family:trebuchet ms;"&gt;In summary, &lt;span style="color:#cc0000;"&gt;Google Inc.&lt;/span&gt; earning revenue from advertising related to its Internet search, web-based email, online mapping, office productivity, social networking, and video sharing as well as selling advertising-free version of the same technologies. Its principal products and services include &lt;span style="color:#ff0000;"&gt;Google AdWords&lt;/span&gt; and &lt;span style="color:#ff0000;"&gt;Google AdSense&lt;/span&gt;. In contrast, &lt;span style="color:#3333ff;"&gt;Amazon.Com&lt;/span&gt; started as an online bookstore, but soon diversified to product lines of VHS, DVD, music CDs, MP3 format, computer software, video games, electronics, apparel, furniture, food, toys, etc. Its primary products include &lt;span style="color:#3333ff;"&gt;A9.com, Alexa Internet&lt;/span&gt;, and &lt;span style="color:#3333ff;"&gt;IMDb&lt;/span&gt;. On the contrary, &lt;span style="color:#666600;"&gt;eBay Inc.&lt;/span&gt; earning revenue through online auction and shopping website in which people and businesses buy and sell goods and services worldwide. Its major products and services include online auction hosting, electronic commerce, shopping mall, &lt;span style="color:#666600;"&gt;PayPal, Skype, Gumtree, and Kijiji&lt;/span&gt;.&lt;/span&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpbA9d0tJPUpwhCbD15nn0TFUk9totxzOXO_52EU_q_Is_9zyI9HDBYeDyxvDXB66WK3LMwdCSBBVn01kUjXGoA8Dkn8aESh35pQPRyrOSRcBHqREgwLtMDdJYh_25zzGOUAQFYaL74Bk/s72-c/google.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>How E-Commerce can reduce cycle time, improve employees’ empowerment and facilitate customer support?</title><link>http://g6ecommerce.blogspot.com/2008/06/how-e-commerce-can-reduce-cycle-time.html</link><category>e-commerce</category><category>week3</category><author>noreply@blogger.com (UBAI3013 E-COMMERCE)</author><pubDate>Thu, 12 Jun 2008 17:03:00 +0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2088153267698402729.post-5419640480917496095</guid><description>&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuQC6-SIV29dHtCExMuRfF6IP3h4U5KiauLUMiMfn9dG7m6UMRdIMiMn0ojaVnB9YoAEAkJymI18ZqEhLhiqCxz3ncSEHl_2n0bLU37GznbWWC6Wa9lY9h4tZO7AIXEYJ8wL0cgmmwxGU/s1600-h/clock.bmp"&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;img id="BLOGGER_PHOTO_ID_5210926263405288210" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 262px; CURSOR: hand; HEIGHT: 178px" height="194" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuQC6-SIV29dHtCExMuRfF6IP3h4U5KiauLUMiMfn9dG7m6UMRdIMiMn0ojaVnB9YoAEAkJymI18ZqEhLhiqCxz3ncSEHl_2n0bLU37GznbWWC6Wa9lY9h4tZO7AIXEYJ8wL0cgmmwxGU/s320/clock.bmp" width="270" border="0" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;span style="color:#3366ff;"&gt;Cycle time&lt;/span&gt; is the amount of time between a &lt;/span&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyd9DqviLyJ-OsDlLHNuZeorZ7yiadimPtdAaxPutlPFYRYP2PugT3qycpH5oLohxrOJW2VbfYhY0bNZeBNmorg2Y30Bn6LdeG9An3fYz7DYEOmvVdMm5q_DHhFXFd66CZuCfIUh-hG7w/s1600-h/clock.bmp"&gt;&lt;/a&gt;&lt;span style="font-family:trebuchet ms;"&gt;customer placing order and receiving the goods. With an online store website, customers can enjoy the benefit to do all the business transaction, including making payment one-off through this website. It helps customers particularly business people to &lt;span style="color:#cc6600;"&gt;save a lot of precious time&lt;/span&gt;, especially in term of queue time. Dell is one of the examples which delivered business to customer through E-Commerce helps in &lt;span style="color:#ff6600;"&gt;reducing customer cycle times for ordering approval and payment&lt;/span&gt;.&lt;br /&gt;&lt;br /&gt;Others than that, E-Commerce can also &lt;span style="color:#333399;"&gt;improve employees’ empowerment&lt;/span&gt;. Central database is a tool being used by E-Commerce online store website in managing their business within the organization. With central database, employees in different department can &lt;span style="color:#ff6600;"&gt;easily access to any information needed regarding to the products, customers or even business transactions instantaneously&lt;/span&gt;. It granted power to employees in dealing with the process of capturing, researching and leveraging the business information.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCWt-qL5FpX0SBBRET0FJKEBSl-gfYXSS4EnMhzhCCWIy3MhXaHK5oUlIDXckYxGgBFLNnbbl3apRrcwhzqx_qaZTFcWgNkmUtc3z2R5uumra_gEpxsRnm5MLAo4K1z5V4iuV-y47BWTY/s1600-h/purchase.bmp"&gt;&lt;/a&gt;&lt;span style="font-family:trebuchet ms;"&gt;Besides that, E-Commerce can also &lt;span style="color:#333399;"&gt;facilitate customer support&lt;/span&gt; by providing a wide range of technological solutions and communication opportunities. E-&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgY8vZ7kW8f3Vb-z99Tlijdw0KZuf7DFKb2FRVEC0AblyRiBPJeD6D0JmeDxTKFYmcU6oe5UIClNy2FX1cX2HyMDD3X04KqcTNuiUQaHB3Tr2XjVtjOC5nN4fvPqi-nOgF88v8Oms-mTAg/s1600-h/purchase.bmp"&gt;&lt;img id="BLOGGER_PHOTO_ID_5214575469153645154" style="FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 211px; CURSOR: hand; HEIGHT: 257px" height="287" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgY8vZ7kW8f3Vb-z99Tlijdw0KZuf7DFKb2FRVEC0AblyRiBPJeD6D0JmeDxTKFYmcU6oe5UIClNy2FX1cX2HyMDD3X04KqcTNuiUQaHB3Tr2XjVtjOC5nN4fvPqi-nOgF88v8Oms-mTAg/s400/purchase.bmp" width="211" border="0" /&gt;&lt;/a&gt;Commerce creates an &lt;span style="color:#3333ff;"&gt;easier means for customers to purchases goods and services&lt;/span&gt; and offers a unique way to display and describe about the products in an &lt;span style="color:#ff6600;"&gt;informative, visual and interactive&lt;/span&gt; way through an online store website. As such, customers will be able to have &lt;span style="color:#ff6600;"&gt;direct access to products information, new products updates, promotions, product discounts&lt;/span&gt; and much more information by just visiting the online store website day or night whenever they like as the E-Commerce opens for business 24 hours. In addition, some of the online store website provides customer support chat tool enabling seller make friendly and personable contact with visitor comes to their retail website. It can be indirectly improve customer satisfaction and even visitor loyalty.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEkzfzxt214CnEhOAdT_PaKu9jPTIyhT_C-koDikF5gHrG369ky2_tsrp5Bs4-PlswBaVXYwUSrVej9Jc9F1HVXqaJPJahJZsXGij2lPEMfnODfV2LW730OkgC1eAUo4RqUkK4H_gUIgA/s1600-h/purchase.bmp"&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;/span&gt;&lt;/a&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuQC6-SIV29dHtCExMuRfF6IP3h4U5KiauLUMiMfn9dG7m6UMRdIMiMn0ojaVnB9YoAEAkJymI18ZqEhLhiqCxz3ncSEHl_2n0bLU37GznbWWC6Wa9lY9h4tZO7AIXEYJ8wL0cgmmwxGU/s72-c/clock.bmp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>An example of an E-Commerce failure and its causes</title><link>http://g6ecommerce.blogspot.com/2008/06/example-of-e-commerce-failure-and-its.html</link><category>e-commerce</category><category>history</category><category>week3</category><author>noreply@blogger.com (UBAI3013 E-COMMERCE)</author><pubDate>Thu, 12 Jun 2008 16:58:00 +0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2088153267698402729.post-426985459821900665</guid><description>&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiL6wiaDNorFUot4Cg7E_lGeXdGbdcicmABXF4kihxIrBYT7uQF5c9wfPnox1_8lUzAIKgzQMUyPlwH_-un9hwm61JhVG-qLkRvKT25hkks4yFtfiyjBAlMduBpOZYEpw_c11Zelx9gLtA/s1600-h/failure.JPG"&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;img id="BLOGGER_PHOTO_ID_5210931151078071154" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; CURSOR: hand" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiL6wiaDNorFUot4Cg7E_lGeXdGbdcicmABXF4kihxIrBYT7uQF5c9wfPnox1_8lUzAIKgzQMUyPlwH_-un9hwm61JhVG-qLkRvKT25hkks4yFtfiyjBAlMduBpOZYEpw_c11Zelx9gLtA/s200/failure.JPG" border="0" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;div&gt;&lt;span style="font-family:trebuchet ms;"&gt;MCI’s short lived &lt;span style="color:#ff6600;"&gt;1-800-Music Now &lt;/span&gt;for example, is a music store that permits both telephone and online ordering of music CD’s. The telephone service is a toll-free service where users can hear the free samples of the music first and then make selection whether to purchase the music to an operator. On the other hand, the online order will be without human assistance. The business was introduced as one of the first ever serious attempts at an e-commerce music store. The money-losing ventures started in &lt;span style="color:#ff0000;"&gt;1995 &lt;/span&gt;and cost MCI about $40 million investment in the project. Only one year after it was launched, it has already cost a total lost close to &lt;span style="color:#ff0000;"&gt;$50 million &lt;/span&gt;on that project and finally shut down in December &lt;span style="color:#ff0000;"&gt;1996&lt;/span&gt;. The failure of MCI’s investment in the e-commerce business, 1-800-Music Now was recognized in the press to a variety of factors. This includes:&lt;br /&gt;&lt;br /&gt;1) &lt;span style="color:#6600cc;"&gt;Weaknesses in music industry&lt;/span&gt; in that year, leading to deep discounting by retailers.&lt;br /&gt;2) Many called the &lt;span style="color:#6600cc;"&gt;toll-free service&lt;/span&gt; just to listen for free music sampling, and finally not signing up to make any purchases.&lt;br /&gt;3) Compared to the traditional ways of purchasing music CD’s in the music store, the &lt;span style="color:#6600cc;"&gt;price were higher&lt;/span&gt; due to expensive advertisement to be played on MTV.&lt;br /&gt;4) At those times, &lt;span style="color:#6600cc;"&gt;online ordering was not sufficiently popular&lt;/span&gt; among peoples, the site were seemed not easy to use compared to ordering through traditional stores.&lt;br /&gt;5) Managers of the Internet group for MCI responsible for the project was &lt;span style="color:#6600cc;"&gt;not dedicated&lt;/span&gt; and reported they were just hanging around while stock was sinking into a deep discount.&lt;/span&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiL6wiaDNorFUot4Cg7E_lGeXdGbdcicmABXF4kihxIrBYT7uQF5c9wfPnox1_8lUzAIKgzQMUyPlwH_-un9hwm61JhVG-qLkRvKT25hkks4yFtfiyjBAlMduBpOZYEpw_c11Zelx9gLtA/s72-c/failure.JPG" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>An example of an E-Commerce success and its causes</title><link>http://g6ecommerce.blogspot.com/2008/06/example-of-e-commerce-success-and-its.html</link><category>e-commerce</category><category>history</category><category>week3</category><author>noreply@blogger.com (UBAI3013 E-COMMERCE)</author><pubDate>Thu, 12 Jun 2008 16:46:00 +0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2088153267698402729.post-5501448932207384769</guid><description>&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlQ8COPNYV6Bdqa73MwPynLSJdedkT2q3Qk9Cf55M2BndA5W22JMt2MWPjSYhVxLDsPXcRFT7sJ_hwCiYfI-O966P4SLOu6SEe_kKCQdZYl0bYpT06Vflg3nQPOV4QN5ow81FdDwVgmh0/s1600-h/amazon-logo.gif"&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;img id="BLOGGER_PHOTO_ID_5210925382936992498" style="FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 202px; CURSOR: hand; HEIGHT: 146px" height="195" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlQ8COPNYV6Bdqa73MwPynLSJdedkT2q3Qk9Cf55M2BndA5W22JMt2MWPjSYhVxLDsPXcRFT7sJ_hwCiYfI-O966P4SLOu6SEe_kKCQdZYl0bYpT06Vflg3nQPOV4QN5ow81FdDwVgmh0/s320/amazon-logo.gif" width="200" border="0" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;div&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;span style="color:#000000;"&gt;E-commerce success can be seen in &lt;span style="color:#ff0000;"&gt;Amazon.com&lt;/span&gt;, Inc&lt;/span&gt;, one of the first major companies to sell goods through the internet. Amazon.com is an online book retailer, which later also involve in selling other products, such as DVDs, electronics, toys, games, home improvement items, software and video games. The success of Amazon.com is due to three strategies that have been used, including &lt;span style="color:#ff0000;"&gt;cost-leadership, customer differentiation and focus strategies&lt;/span&gt; (&lt;strong&gt;&lt;em&gt;Saunders, 2001, pp.122-123&lt;/em&gt;&lt;/strong&gt;).&lt;br /&gt;&lt;br /&gt;Amazon.com used the &lt;span style="color:#000000;"&gt;&lt;strong&gt;cost-leadership&lt;/strong&gt; strategy&lt;/span&gt; by differentiating itself primarily on the basis of price. It offers a considerably lower price with the same quality products when compared to other companies. Their second strategy is &lt;span style="color:#000000;"&gt;&lt;strong&gt;customer differentiation&lt;/strong&gt;&lt;/span&gt;. Amazon.com provides current and prospective customers with differentiation of design, quality and convenience.Amazon.com always selects a differentiator that is different among the competitor and this enable their consumers to recognize and differentiate its product from other competitors. The third strategy, &lt;span style="color:#000000;"&gt;&lt;strong&gt;focus strategy&lt;/strong&gt;&lt;/span&gt;, takes one of the two earlier strategies and applies it to a small area of trade within a market. Amazon.com focuses on outstanding customer service as a portion but not the whole market as each portion of the market has its own demand and requirement.&lt;br /&gt;&lt;br /&gt;With these three strategies, Amazon.com is able to stand as one of the pioneer in e-commerce.&lt;/span&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlQ8COPNYV6Bdqa73MwPynLSJdedkT2q3Qk9Cf55M2BndA5W22JMt2MWPjSYhVxLDsPXcRFT7sJ_hwCiYfI-O966P4SLOu6SEe_kKCQdZYl0bYpT06Vflg3nQPOV4QN5ow81FdDwVgmh0/s72-c/amazon-logo.gif" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>The History and Evolution of E-commerce</title><link>http://g6ecommerce.blogspot.com/2008/06/history-and-evolution-of-e-commerce.html</link><category>history</category><category>week3</category><author>noreply@blogger.com (UBAI3013 E-COMMERCE)</author><pubDate>Thu, 12 Jun 2008 16:36:00 +0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2088153267698402729.post-8041749704928307069</guid><description>&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMZiFeI8-18YZMYy-AVllChY6knYQte2bzHmzUMHSwD7doFd2lOaNHPsVAcDU7fh0YLgSNzQRkbkNl8P8SN8DL6iRjhOVwl-9IhyphenhyphenEYEB6qxq7JJIGaIh0zBLTN5jTqlhvdndnuOOBp__0/s1600-h/QUESTION.jpg"&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;img id="BLOGGER_PHOTO_ID_5210964625018415522" style="FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMZiFeI8-18YZMYy-AVllChY6knYQte2bzHmzUMHSwD7doFd2lOaNHPsVAcDU7fh0YLgSNzQRkbkNl8P8SN8DL6iRjhOVwl-9IhyphenhyphenEYEB6qxq7JJIGaIh0zBLTN5jTqlhvdndnuOOBp__0/s320/QUESTION.jpg" border="0" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;div align="justify"&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;span style="color:#33cc00;"&gt;&lt;u&gt;What is e-commerce?&lt;/u&gt;&lt;/span&gt; E-commerce (Electronic Commerce) can be defined as &lt;span style="color:#663300;"&gt;&lt;u&gt;buying&lt;/u&gt;&lt;/span&gt; and &lt;span style="color:#663300;"&gt;&lt;u&gt;selling&lt;/u&gt;&lt;/span&gt; of products or services over electronic systems such as the Internet and other computer networks. The meaning of e-commerce has changed over the last 30 years. In the late &lt;span style="color:#ff0000;"&gt;1970s&lt;/span&gt;, e-commerce facilitated commercial transactions by using technology such as &lt;span style="color:#000066;"&gt;Electronic Data Interchange&lt;/span&gt; (EDI) and &lt;span style="color:#000066;"&gt;Electronic Funds Transfer&lt;/span&gt; (EFT), to allow businesses to send commercial documents electronically (eg: purchase orders, invoices).&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;p align="justify"&gt;&lt;span style="font-family:trebuchet ms;"&gt;In the &lt;span style="color:#ff0000;"&gt;1980s&lt;/span&gt;, the growth and acceptance of credit cards, automated teller machines and telephone banking were also forms of e-commerce. Since &lt;span style="color:#ff0000;"&gt;1990&lt;/span&gt;, e-commerce would additionally include &lt;span style="color:#000066;"&gt;enterprise resource planning systems &lt;/span&gt;(ERP), data mining and data warehousing. In year &lt;span style="color:#ff0000;"&gt;1992&lt;/span&gt;, &lt;em&gt;CompuServe&lt;/em&gt; offers online retail products to its customers. This gives people the first chance to buy things off their computer. In year &lt;span style="color:#ff0000;"&gt;1994&lt;/span&gt;, &lt;em&gt;Netscape&lt;/em&gt; arrived and released the Navigator browser under the code name &lt;em&gt;Mozilla&lt;/em&gt;. Netscape providing users a simple browser to surf the Internet and a safe online transaction technology called &lt;span style="color:#000066;"&gt;Secure Sockets Layer&lt;/span&gt; (SSL). Since Netscape released, the first &lt;span style="color:#000066;"&gt;online bank&lt;/span&gt; opened, &lt;span style="color:#000066;"&gt;Pizza Hut&lt;/span&gt; offered pizza ordering on its Webpage and it attempts to offer &lt;span style="color:#000066;"&gt;flower delivery&lt;/span&gt; and &lt;span style="color:#000066;"&gt;magazine subscriptions&lt;/span&gt; online. &lt;/span&gt;&lt;/p&gt;&lt;div align="justify"&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;p align="justify"&gt;&lt;span style="font-family:trebuchet ms;"&gt;In year &lt;span style="color:#ff0000;"&gt;1995&lt;/span&gt;, two of the biggest names in e-commerce are launched. They are &lt;span style="color:#cc33cc;"&gt;&lt;em&gt;Amazon.com&lt;/em&gt;&lt;/span&gt; by Jeff Bezos and &lt;span style="color:#cc66cc;"&gt;&lt;em&gt;eBay&lt;/em&gt;&lt;/span&gt; by computer programmer Pierre Omidyar as AuctionWeb. Besides that, the first &lt;em&gt;commercial-free 24 hour&lt;/em&gt;, &lt;em&gt;internet-only radio stations&lt;/em&gt;, &lt;em&gt;Radio HK&lt;/em&gt; and &lt;em&gt;NetRadio&lt;/em&gt; started broadcasting.&lt;span style="color:#000066;"&gt; Dell&lt;/span&gt; and &lt;span style="color:#000066;"&gt;Cisco &lt;/span&gt;began to aggressively use Internet for commercial transactions. From year &lt;span style="color:#ff0000;"&gt;1998&lt;/span&gt; onwards, electronic postal stamps can be purchased and downloaded for printing from the Web. According to &lt;em&gt;&lt;span style="color:#000066;"&gt;Business.com&lt;/span&gt;&lt;/em&gt;, in year &lt;span style="color:#ff0000;"&gt;1999&lt;/span&gt;, retail spending over the Internet reaches $20 billion. In addition, the peer-to-peer file-sharing software Napster was launched too. Furthermore, the &lt;em&gt;&lt;span style="color:#000066;"&gt;dot-com&lt;/span&gt;&lt;/em&gt; bust in year &lt;span style="color:#ff0000;"&gt;2000&lt;/span&gt;. Meanwhile, the U.S. government extended the moratorium on Internet taxes until at least &lt;span style="color:#000000;"&gt;2005&lt;/span&gt;. In year &lt;span style="color:#ff0000;"&gt;2003&lt;/span&gt;, Amazon.com had its first year with a full year of profit.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;&lt;div align="center"&gt;&lt;br /&gt;&lt;span style="font-family:trebuchet ms;"&gt;&lt;object height="344" width="425"&gt;&lt;param name="movie" value="http://www.youtube.com/v/LW4X3b_j0eE&amp;amp;hl=en"&gt;&lt;embed src="http://www.youtube.com/v/LW4X3b_j0eE&amp;hl=en" type="application/x-shockwave-flash" width="425" height="344"&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;</description><enclosure length="0" type="video/mp4" url="http://www.blogger.com/video-play.mp4?contentId=be3449e467a7e7c&amp;type=video%2Fmp4"/><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMZiFeI8-18YZMYy-AVllChY6knYQte2bzHmzUMHSwD7doFd2lOaNHPsVAcDU7fh0YLgSNzQRkbkNl8P8SN8DL6iRjhOVwl-9IhyphenhyphenEYEB6qxq7JJIGaIh0zBLTN5jTqlhvdndnuOOBp__0/s72-c/QUESTION.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item></channel></rss>