Nowadays, many people are relying on the Internet to connect and communicate with each other throughout the world and this is why Internet is said to be world without borders. While we want to become the member of some websites or to subscribe the services provided by them, this website will require us to register some of our personal information such as name, age, gender, date of birth, email address, password and etc. Besides, when we are accessing the online buying, we need to fill in our financial data like names, addresses, phone numbers, bank and credit card account numbers and etc. Information transmitted over the Internet has a higher degree of security risk than internal networks because Internet are open to anyone. So in order to protect our personal and financial data, we suggest some of the prevention methods:
a. Install a firewall
A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system. It is also a device or set of devices configured to permit, deny, encrypt, decrypt, or proxy all computer traffic between different security domains based upon a set of rules and other criteria
b. Password protect
Create a strong password or pass-phrase to files or hardware that we use to store our personal and financial data. In creating the password, we should use a reliability security system on the files or hardware so that it wouldn't be hacked easily. Furthermore, we should not create a password which can be easily guess by others. Besides, do not reveal any personal information or particularly passwords to anyone.
c. Trusted site
When the Internet users want to make online purchase, they are advised to make purchase only at trusted site, well-known, or sites that are using reputable payment processors such as Paypal or Google Checkout. To prevent our valuable information been stolen by the hackers, we need to check for padlock icon that verify the particular website is safe before we make the purchase. Thus this can ensure that our personal and financial data will be protected and remain confidential.
d. Avoid accessing private information in public
You are advise not to access your private information when using the public wireless. Besides, when you are accessing your private information in cyber cafe, make sure you log out completely and never choose to save login information such as user name and password on computers. If the users want to do such activities, they are advise to do it at home using their private computer.
Thursday, January 22, 2009
The application of 3rd party certification programme in Malaysia
Third-party certification is a scientific process by which a product or service is reviewed by a reputable and unbiased third party to verify that a set of criteria, claims or standards are being met. Certification Authority (CA) is a trusted third party in a public key security system is responsible for vouchsafing the identity of users and issuing them with certificates that bind the public key to their identities.The most famous application of 3rd party certification program in Malaysia is provided by the MSC Trustgate.com Sdn Bhd. MSC Trustgate.com Sdn Bhd was incorporated in 1999 and is a licensed Certification Authority (CA) under the operation of the Multimedia Super Corridor. Certification Authority is the body given the license to operate as a trusted third party in the issuance of digital certificates.
Trustgate provides trusted and encryption technology that secure your online communication, hence protect your vital business information from prying eyes. Trustgate is the first Malaysian Internet trust solutions company authorized to offer 128-bit SSL Server ID that is now used in financial institutions, insurance companies, e-government, healthcare organizations and other online trading.
Besides, Trustgate also provided other services such as Managed PKI, SSL Certificate, Managed Security Services,Personal ID, MyTRUST, MyKAD ID, SSL VPN, VeriSign Certified Training and Application Development.
Wednesday, January 21, 2009
The threat of online security: How safe is our data?
First of all, i would like to share with all the reader a video clip which i have watch in youtube.com.
Nowadays, people rely on computers to create, store and manage critical information. Consequently, it is important for users to aware that computer security plays a major role in protecting their data from loss, damage, and misuse. Similarly, online security has been online trader’s main concern in protecting their websites from potential threats.
Nowadays, people rely on computers to create, store and manage critical information. Consequently, it is important for users to aware that computer security plays a major role in protecting their data from loss, damage, and misuse. Similarly, online security has been online trader’s main concern in protecting their websites from potential threats.
These threats are:
- MALICIOUS ATTACKS
Attacks that specifically aim to do harm are known as premeditated or malicious attacks. They can be further broken down into attacks caused by malicious code and those caused by intentional misrepresentation. Misrepresentation is most often seen with regard to on line fraud and identity theft (see below). Malicious code, on the other hand, is at the root of so-called "crackings" and "hackings" - notable examples of which include computer viruses, data theft, and Denial of Service (DOS) attacks
Phishing: Examples and its prevention methods
What is Phishing??
1.PayPal phishing example

Phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites such as PayPal, eBay,Facebook and YouTube are commonly used to lure the unsuspecting. Phishing is typically carried out by e-mail or instant messaging and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Even when using server authentication it requires skill to detect that the website is fake. Phishing is an example of social engineering techniques used to fool users and exploits the poor usability of current web security technologies.
1.PayPal phishing example
In an example PayPal phish, spelling mistakes in the e-mail and the presence of an IP address in the link are both clues that this is a phishing attempt. Another giveaway is the lack of a personal greeting, although the presence of personal details would not be a guarantee of legitimacy. A legitimate Paypal communication will always greet the user with his or her real name and not just with a generic greeting like,"Dear Accountholder." Other signs that the message is a fraud are misspellings of simple words, bad grammar and the threat of consequences such as account suspension if the recipient fails to comply with the message's requests.

2.TrustedBank phishing email
An example of a phishing e-mail, disguised as an official e-mail from a (fictional) bank. The sender is attempting to trick the recipient into revealing secure information by "confirming" it at the phisher's website.
Phishing prevention method
Nowaday,phishing case keep increasing from year to year.However, there are few method to prevent phishing.1st of all, the user ownself should alway be aware and alert of any email regarding changing personal information. Do not reply to any suspicious email. The user ownself should not too depend on clicking link that you're unsure of. For example, if you receive an email from Ebay requesting personal information such as your user name or password, visit Ebay directly by typing http://www.ebay.com/ into your browser to check on your account status. By doing so, the user can avoided from being leaded to a fake website through link. Besides, an antivirus,anti-spyware and firewall is very useful in order to prevent any unauthorised access to your personal information. Make sure the antivirus is alway up-to-date.Besides that, you must read the message carefully whether there are any errors on it. It is because the errors found can determine whether the message is sent by the particular institution or the phisher.Be cautious about opening any attachment or downloading any files from emails you receive, regardless of who sent them. These files can contain viruses or other software that can weaken your computer's security.
Monday, January 19, 2009
An example of an E-Commerce failure and its causes

The problem of establishing successful e-commerce is clearly evident in all areas of the fashion industry, including apparel, accessories, shoes, home furnishing, and fabrics. The demise of boo.com, a British-based Website, provides a good example. Boo.com was a British Internet company founded by Swedes Ernst Malmsten, Kajsa Leander and Patrik Hedelin that famously went bust following the dot-com boom of the late 1990s. Boo.com launched in the Autumn of 1999 selling branded fashion apparel with blazing technology designs over the Internet; however, after spending $135 million of venture capital in just 18 months, it was placed into receivership on 18 May 2000 and liquidated.
The reason why the Boo.com failed because got problems with the user experience. The boo.com website was widely criticized as poorly designed for its target audience, going against many usability conventions. The site relied heavily on JavaScript and Flash technology to display pseudo-3D views of wares as well as Miss Boo, a sales-assistant-style avatar.
The first publicly released version of the site was fairly hefty—the home page alone was several hundred kilobytes which meant that the vast majority of users had to wait minutes for the site to load (as broadband technologies were still not widely available at that time). The site's front page did contain the warning, "this site is designed for 56K modems and above". It created an expensive online magazine only faintly linked to the shopping experience. It committed itself to "entertaining" users, on the oft-followed premise (no doubt compelling to ageing baby-boomers) that people under 30 would delight at receiving pale online imitations of TV.
The complicated design required the site to be displayed in a fixed size window, which limited the space available to display product information to the customer. Navigation techniques changed as the customer moved around the site, which appealed to those who were visiting to see the website but frustrated those who simply wanted to buy clothes.
Its interface was also complex with a hierarchical system that required the user to answer four or five different questions before revealing that there were no products in stock in a particular sub-section. The same basic questions then had to be answered again until results were found.
Important product information was given about 1 inch square to describe the product (about 15 words) and users had to use non-standard scrolling mechanisms to view the next 15 words. Unless users knew exactly how to use the menus, the site was not forgiving for novices. Boo also made great use of tiny icons and horizontal scrolling, both disastrous on the web. Boo also used unfamiliar words such as the boobag rather than shopping cart. Boo committed the sort of rolled-gold usability screw-ups that every half-sentient student of Web usability could identify
The reason why the Boo.com failed because got problems with the user experience. The boo.com website was widely criticized as poorly designed for its target audience, going against many usability conventions. The site relied heavily on JavaScript and Flash technology to display pseudo-3D views of wares as well as Miss Boo, a sales-assistant-style avatar.
The first publicly released version of the site was fairly hefty—the home page alone was several hundred kilobytes which meant that the vast majority of users had to wait minutes for the site to load (as broadband technologies were still not widely available at that time). The site's front page did contain the warning, "this site is designed for 56K modems and above". It created an expensive online magazine only faintly linked to the shopping experience. It committed itself to "entertaining" users, on the oft-followed premise (no doubt compelling to ageing baby-boomers) that people under 30 would delight at receiving pale online imitations of TV.The complicated design required the site to be displayed in a fixed size window, which limited the space available to display product information to the customer. Navigation techniques changed as the customer moved around the site, which appealed to those who were visiting to see the website but frustrated those who simply wanted to buy clothes.
Its interface was also complex with a hierarchical system that required the user to answer four or five different questions before revealing that there were no products in stock in a particular sub-section. The same basic questions then had to be answered again until results were found.
Important product information was given about 1 inch square to describe the product (about 15 words) and users had to use non-standard scrolling mechanisms to view the next 15 words. Unless users knew exactly how to use the menus, the site was not forgiving for novices. Boo also made great use of tiny icons and horizontal scrolling, both disastrous on the web. Boo also used unfamiliar words such as the boobag rather than shopping cart. Boo committed the sort of rolled-gold usability screw-ups that every half-sentient student of Web usability could identify
Discuss how E-Commerce can reduce cycle time, improve employees’ empowerment and facilitate customer support.
REDUCING CYCLE TIME
What is cycle time?It defined as the total time that it takes to complete a recurring task—usually one essential to the business's output.E-Commerce can reduce the cycle time by eliminates the traditional purchase approach, which is time-consuming and labor-intensive.Eliminating steps in business process and take a shorter time to complete a business transaction. E-commerce allows people to carry out businesses without the barriers of time or distance. The process of middle man and intermediaries will be eliminated and the suppliers or producers of certain products can send products directly to customers. By this, the company can reduce unnecessary cost and gain competitive advantages towards other companies. For example Dell and FED-EX.

IMPROVES EMPLOYEES' EMPOWERMENT
Empowerment is the process of enabling or authorizing an individual to think, behave, take action, and control work and decision making in autonomous ways. It is the state of feeling self-empowered to take control of one's own destiny.E-commerce can improve employees’ empowerment by allowing the decentralization of decision making and authority via collaborative commerce. It grants power to employees in dealing with process of capturing, researching and leveraging business information. Employee empowerment divided into 3 levels. The first level is encouraging. It encourages employees to play more active roles in their work. Second level is involving which gives employees responsibility for improving the way that things are done. Third level is the enabling the employees bigger decisions making power without referring to seniors or managers. As a result, it will benefit organization in term of getting closer to customers, improving service quality, innovating continuously, increasing productivity and gaining the competitive edge.
Facilitate customer support
E-commerce also facilitates customer support by providing a wide range of technological solutions and communication opportunity.Besides, it can provide unlimited shopping hours for customers to place their order as it is run on a 24 hours basis.It also provides electronic bulletin for customer in order to report fault and dissatisfaction. Customer has direct access to product information updates, and other promotion by visiting the online stores. Through online, it creates an interactive and more easier way for customer to buy the products that they need compared to the traditional stores.
Sunday, January 18, 2009
An example of an E-Commerce success and its causes
Amazon.com, a successful example of an e-commerce, which is an American electronic commerce (e-commerce) company in Seattle, Washington. It is America's largest online retailer, with nearly three times the internet sales revenue of runner up Staples, Inc. Why Amazon.com is a successful E-commerce business?There are several reason:
- Develop a searching system
Amazon.com opened with a searchable database of over one million titles. Customers could enter search information, prompting the system to sift through the company database and find the desired titles. The program then displayed information about the selection on a customer's computer screen, and gave the customer the option to order the books with a credit card and have the books shipped in a just a few days. - Carry few stock in hand
Unlike its large competitors, such as Barnes & Noble and Borders, Amazon.com carried only about 2,000 titles in stock in its Seattle warehouse. Most orders through Amazon.com were placed directly through wholesalers and publishers, so no warehouse was needed. Amazon.com would simply receive the books from the other sources, then ship them to the customer. - Broaden the company's distribution capabilities.
Amazon.com broaden the company's distribution capabilities, and to ease the strain on the existing distribution center that came from such a high volume of orders, in September 1997 Bezos announced that Amazon.com would be opening an East Coast distribution center in New Castle, Delaware. There was also a 70 percent expansion of the company's Seattle center. The improvements increased the company's stocking and shipping capabilities and reduced the time it took to fill customers' orders. The Delaware site not only got Amazon.com closer to East Coast customers, but also to East Coast publishers, which decreased Amazon.com's receiving time. With the new centers in place, Bezos set a goal for the company of 95 percent same-day shipping of in-stock orders, getting orders to the customers much faster than before. - "Associate" program
"Associate" program allowed individuals with their own web sites to choose books of interest and place advertising for them on their own sites, allowing visitors to purchase those books. The customer was linked to Amazon.com, which took care of all the orders. Associates were sent reports on their sales and made a 3 to 8 percent commission from books sold on their sites. The Associates program really began to take off in mid-1997, when Amazon.com formed partnerships with Yahoo, Inc. and America Online, Inc. Both companies agreed to give Amazon.com broad promotional capabilities on their sites, two of the most visited sites on the Web. As the success continued, Amazon also struck deals with many other popular sites, including Netscape, GeoCities, Excite, and AltaVista. - Other services
Amazon.com also provided many services such as optional gift wrapping of packages, and the "eye" notification service, which sent customers e-mails alerting them when a new book in their favorite subject or by their favorite author came into stock. The site also offered the ability for customers not only to write their comments about different books and have them published on the site, but to read other customers' comments about books they were interested in buying.
The history and evolution of E-commerce
The meaning of electronic commerce has changed over the last 30 years. Originally, electronic commerce meant the facilitation of commercial transactions electronically, using technology such as Electronic Data Interchange (EDI) and Electronic Funds Transfer (EFT). These were both introduced in the late 1970s, allowing businesses to send commercial documents like purchase orders or invoices electronically. The growth and acceptance of credit cards, automated teller machines (ATM) and telephone banking in the 1980s were also forms of electronic commerce. Another form of e-commerce was the airline reservation system typified by Sabre in the USA and Travicom in the UK. Online shopping was invented in the UK in 1979 by Michael Aldrich and during the 1980s it was used extensively particularly by auto manufacturers such as Ford,Peugeot-Talbot, General Motors and Nissan. From the 1990s onwards, electronic commerce would additionally include enterprise resource planning systems (ERP), data mining and data warehousing.
Perhaps it is introduced from the Telephone Exchange Office, or maybe not.The earliest example of many-to-many electronic commerce in physical goods was the Boston Computer Exchange, a marketplace for used computers launched in 1982. The first online information marketplace, including online consulting, was likely the American Information Exchange, another pre-Internet online system introduced in 1991.
Although the Internet became popular worldwide in 1994, it took about five years to introduce security protocols and DSL allowing continual connection to the Internet. And by the end of 2000, a lot of European and American business companies offered their services through the World Wide Web. Since then people began to associate a word "ecommerce" with the ability of purchasing various goods through the Internet using secure protocols and electronic payment services.
According to all available data, e-commerce sales continued to grow in the next few years and, by the end of 2007, ecommerce sales accounted for 3.4 percent of total sales.Ecommerce has a great deal of advantages over “brick and mortar” stores and mail order catalogs. Consumers can easily search through a large database of products and services. They can see actual prices, build an order over several days and email it as a “wish list” hoping that someone will pay for their selected goods. Customers can compare prices with a click of the mouse and buy the selected product at best prices.
As the conclusion, i have added the following table to show the evolution of e-commerce.
Friday, January 16, 2009
Our Secret - All about Us
Hi! All my friends, my name is Chin Han Sheng. I'm from Penang and i'm 20 years old. I'm not tall as yao ming but not consider short. This is not the 1st time I'm writing blogs. i have my own blog since I'm 16 years old. My hobbies are playing computer games, playing basketball, playing badminton, playing volleyball, writing blogs and etc. Why i love blogs as well? It is because i can write whatever i want in my world, release pressure and having a blog i can meet more friends all over the world.Visiting http://www.friendster.com/, http://www.coool.com/, http://www.yahoo.com/, http://www.hotmail.com/, http://www.facebook.com/ are becoming the routine activities in my lifes. These are the 5 most website i love to visit everyday. I can search information that will be used on my assignment and checking mails from hotmail to yahoo. Besides, I can meet new friends and playing mini games together by using java from friendster to facebook. And the last one, coool.com. This website is a forum which is in Chinese language. I can learn more extra information at the forum. I love this 5 website and keep visiting them everyday
Hey, nice to meet you all. This is my first time I'm writing a blog. The reasons why i writing this blog because i want more people to know about me as well as making new friends from around the world. So let me briefly introduce myself. My name is Lim Seng Kaei. My friend usually call me Kenny. I'm 22 years old now and I'm come from Kedah. Now i'm continuing my study at University Tunku Abdul Rahman. My hobbies are listening to the music, reading and playing badminton with my friends when I'm free. Besides, i also like to surfing to the Internet. The most favourite websites that i like to visit are http://www.yahoo.com/, http://www.wikipedia.com/, http://www.chinapress.com.my/, www.haoting.com and www.friendster.com. I used yahoo and wikipedia as my search engine to search for useful information which will enlarge my general knowledge as well as when I'm doing my assignment. chinapress is a E-Newspapers website, so it's becoming the routine website that i need to visit every day because i want to know the latest news that happened around the world. When i want to listen to the latest songs, i will use haoting for that purpose. In order to stay contact with my old friends i will used friendster for that purpose.
Hey, how do you do? I so glad that you visit our blog. First of all, my name is Chong Yew Shem, 23years old, from Seremban, Negeri Sembilan. Nowadays, blog is very usefulness because via blog i can know more friends, sharing my happiness, sadness and etc. During my free time, I like sport especially playing badminton with my best friends. Besides, I like to sing songs while playing the guitar. Watching movies and playing computer games are my hobbies too. Moreover, most of my free time, i like to surf the websites such as www.cforum1.cari.com.my, www.friendster.com, www.utar.edu.my, www.gougou.com and www.pps.tv to search information for the education purposes or just for entertainment.
Hi everyone,I'm chee seng. I'm 23 years old.I live in petaling jaya.Now I'm studying at Universiti Tunku Abdul Rahman, UTAR and this year is my final year of my universiti life. The begining of this year is so special for me, because i have started my own business which is selling CNY biscuits. Although it is consider as a small business, but i proud of myself because i had used all the knowledge that i had learn from the Universiti in handling my business such as, how to manage a business, how to motivate my employee, how to serve my customers and etc. Besides, I feel this is an oppotunity to train myself to become a sucessful entrepreneur on future. My hobbies are playing badminton, playing basketball, singing and shopping. I will visit Green Box once a month with my buddy to pratice my singing skill. Besides, i love shooping during weekend, with my beloved girlfriend. Opps, forget to tell you'll im already have girlfriend. For those who admire me, I have to say sorry to u'll, hahaha. I'm feel very happy to have a group of buddy, which is my groupmate, in my university lifes. They bring me a lot of happiness and unforgetable memory.
Subscribe to:
Comments (Atom)





