
Tuesday, July 7, 2009
A Discussion on E-Learning Offered in Malaysia Universities: Pros and Cons from Students Perspective

Corporate Blogging: A New Marketing Communication Tool for Companies


Dell is an example of corporate blog, the company posts with a great conversational voice, often breaks news on their blog (which keep people coming back), and listens the responds from customers. Besides that, Dell has frequently upgraded their company news and encourages repeated visits. Second example is Adobe, it offers their employee to write blog at the same time assisting their company to promote company’s product for example posting tutorials, advice and reviews
In terms of measurement of performance of corporate blog, it is rather difficult to measure its success because marketers measure campaign success by drops at the end of the funnel through visits and registrations. The problem with blog is that social software success could take the form of comments, track backs and qualitative intangibles, but all this result could not represent whether the corporate blog is success or not.
Before the blog come to the end, we would like to provide you some tips on creating an effective corporate blog. When creating a corporate blog, the user must be aware that your blog is all about representing your brand and let readers know our company well. Then, keep each of your blogs focused to a single topic to ensure the readers get a clear message on your blog. Lastly, the blogger should focus on serving your readers more readily than pleasing your employee because customer satisfaction has more influential impact on our business.
Relevant Links:
E-Government in Malaysia:Its Implementation So Far and Citizen's Adoption Strategy

There are several advantages of using E-government. First of all, it provides efficient and fast delivery time of goods and services to citizens; besides it also provides convenience and is able to provide cost effectiveness to citizens and businesses. However, there is one common issue that we often concern about. It is the security of the citizen’s personal information when using E- government. This is the main factor that often stops people from involving in such activities even though the benefits of using it over weigh the setbacks. Therefore, the first step to encourage citizen to participate in E-government; Government should create tighter and more efficient security system.
Review a Local, Transactional E-Commerce Site
Lelong.com.my has been existed for over 10 years and had since founded in the year end of 1998 by the Interbase Resource Sdn.Bhd, a young company that has come long way from its humble beginning. With a mission statement of “serving the community and bringing a high standard of quality into homes and business by providing avenue for on-line trading at low cost”, the staff behind Malaysia’s premier auction site continually strive to improve the quality of the product and services and also develop its functionality without levying high cost.

The Application of Pre-Paid Cash card for Consumers


1) Purchase tickets online – Examples of tickets available through online would be flight tickets, public transport tickets such as bus or KTM, movie tickets, concert tickets and more.
2) Pay Bills - As for we students, the obvious one would be student bills. Others would be mobile phone bills, electric bills, water bills, and so on.
3) Shopping - Include online shopping on products such as clothes, books, Accessories, mobile phones and etc.
4) Hotel booking - Provides convenience for tourists who wished to book
their accommodation.
In conclusion, on top of the many applications that can be made by consumers; we find that the invention of prepaid cash cards is indeed very useful. Of course, first of all; it is much safer to carry a card around than cash. Secondly, it helps us to control our spending and therefore we do not have to worry about paying our credit card bills or going into debt. We also felt that it is suitable for students especially when using it to pay their university or college fees as they can easily reload the amount of money online, over the phone or at any ATM worldwide; rather than having to bring a huge amount of cash.
http://en.wikipedia.org/wiki/Debit_card#Prepaid_Debit_Card
Credit Card Debts: Causes and Prevention

What are the causes of credit card debts? There are many factors that can lead to credit card users to owe their respective credit card companies. This problem mainly arises from poor financial planning, where people would spend much more than they could earn. These people would then use their credit cards to purchase stuff that they might not have been able to purchase, and yes, credit cards are supposed to make our life easier but it can really backfire if used in a wrong way.

How do we prevent this from happening? Well, this is one case that our government have been highlighted and many prevention methods have been thought up to counter this problem. First of all, we have to understand the terms and conditions set by these credit cards.
Credit card is in fact very useful in our every day lives, but we must always strike a balance in everything we do and do not use credit card excessively that it could lead us into trouble like having debts. Therefore, we must always be aware of the dangers and be prepared to prevent it from happening.
Electronic Currency

Electronic currency composed by computer networks, the internet and digital stored value systems, for instances; electronic Funds Transfer (EFT) and direct deposits are examples of electronic currency. “EFT” is a computer-based system that is use to perform financial transactions electronically and the “direct deposit” is a banking term that uses a certain systems to transfer money.

As times goes by, there are several countries that has been starting to implement electronic currency system such as Hong Kong’s Octopus card system which was started out with a transit payment system and now has grown into a widely used electronic currency system; Singapore also has an electronic currency implementation for its public transportation system (commuter trains, bus, and etc) and Netherlands has been introducing the use of a “Chipknip” which is designed to make payments at parking machines, shop and etc through the payment collection terminal without requiring a network access.
Secondly, the consumer can withdraw electronic cash by logging the issuer’s website and presents proof of identity, like digital certificate issued by a certification authority, or a combination of a credit card number and a verifiable bank account number.
After the issuer verifies the consumer’s identity, they will deduct some amount from the consumer’s account which includes the charges of a small processing fee.
Next, the consumer can store the electronic cash into an electronic wallet (stored-value card). Finally, the consumer can authorize with third party (currency operator) to double check whether the payment is correct.
Therefore, money laundering happens by purchasing goods or services with ill-gotten electronic cash. The goods are then sold for physical cash at the public market. Besides, there are also some potential macroeconomic effects such as exchange rate instabilities and shortages of money supplies (total amount of digital cash versus total amount of real cash available), these issues may only be addressable by cyberspace regulations or laws that monitor the transactions and watch for signal of trouble.
Relevant links:
Mobile Payment Systems in Malaysia: Its Potential and Consumers' Adoption Strategies

Furthermore, we can use m-payment to purchase digital goods like ring tones, games, wallpaper for mobile and even booking cinema tickets. The payment can be made through SMS based transaction payments or mobile web payment (WAP).Wireless Application Protocol (WAP) is an open international standard that enable the application layer network to communicate in a wireless communication environment. It allows the cellular phone or PDA to access to the Mobile Web.
So, how does it work?
“Your mobile phone is your credit card”.
We can make our payments with just a simple click on our cell phone that acts as a Mobile Wallet that function as a payment service provider to enable us to make payment wireless for purchases of goods and services. Mobile Wallet users are required to reload their wallet account.
Just imagine, if one day we forgot to bring our wallet and yet we can still pay for our bus ride or buy a drink from a merchant that accept mobile payment. Mobile money, on the other hand, is a PIN-based mobile payment solution. It allows the registered users to pay for goods and services using only a mobile phone coupled with a 6 digit security PIN (Personal Identification Number) via SMS.
The mobile payment industry will continue to experience steady growth and is expected to increase in the future. The innovation of
1. Convenience. The user can easily pay up their bills, top up phone credit via the mobile phone. Although users do not have cash in hand, the can still pay up their bills by having their mobile wallet without having to search for nearest ATM machine.

2. Time saving. Users are more comfortable towards the use of
3. Data security. Mobile payment system assures the safety of data for users. The payment is secured by a strong pin fraud protection patent which provides security and blocking the activities of hacking the password of the user
1. Educate consumers on how to use mobile payment and learn the benefits of using it. This can be done by introducing mobile payment trough advertisements or posters.
2. Enhance security and confidence to mobile users. Security is the users’ main concern. The company should design an efficient security system to ensure the safety of the users’ personal information such as their password.
3. Maintain customer loyalty by rewarding the user if they reach a certain level of purchasing. For example, Hotlink company is adopting this strategy by giving extra credit to the user when their accumulate points.
In conclusion, despite the positive projections, the security concern and undefined areas in banking regulations remain as challenges for mobile payment. The company and the users of mobile payment have the responsibility to face the challenge and overcome the problem of mobile payment system. If the system can be managed in more effective-way, it will greatly improve our standard of living.
Monday, July 6, 2009
A review on a Post on Internet Security from My E-Commerce blog

The main focal point of this article is on the rising of cybercrimes prior to the opening ceremony of the Olympics. According to the spokesman for Symantec, Mr. Mallom; hackers and spammers have taken this opportunity to create booby-trapps for victims. The spokesman also urge the public not be tempted to open e-mails or click on links from unknown sources eventhough it offers many gold medals or awards.
Another expert, Rik Ferguson of Trend Micro said that usually attackers would target on sites related to games as these are the places where victims can be easily attacked because visitors would catch up with the sporting event.

Security firm Marshal claims that most of these malicious and junk messages emerging from Rustock botnet ( a collection of home computers that have been hijacked by a gang of hi-tech criminals who then put it to avariety of ends) were mainly about games.
This is the part of the article that we find it to be interesting. It is the part where the article highlighted the results found by Phil Hay, the lead analyst of Marshal on how these cybercriminals behind Rustock have been so successful in their attempt to fool recipients into infecting themselves. The results came out to be the rapid improvements of their appearance and the ability in creating more and more sophisticated messages. A real life issue on how advanced and sophisticated they have been given, whereby one of the current batch had appeared as the headline stories on CNN, with the attempt to lure people to click on the headlines and were asked to install a codec in order to be able to watch the CNN video report.
From what we have read from the article, the Security company MessageLabs had found out that the cybercriminals are not only targeting on the members of the public but also to those who are part of national sporting organisations or help train athletes because these e-mails would be crafted to look like they had been written by the International Olympic Commitee. It usually attaches with fake messages which requires users to install a booby-trapped Adobe PDF in order to be able to steal their data.
The article concludes itself by giving a few precaution steps to users of Windows PCs because attackers tend to target on these users . According to the senior security consultant at Sophos; Ms Carole Thierault advised users to make sure that their anti-virus software up to date. It is also advisable to use a fiewall and install updates to Windows as soon as they becomes available. “ Of course hackers will do their best to capitalised on this event, therefore the most effective way to avoid the pitfalls os to make your device an unattractive target.” said Ms Thierault.
All in all, we find this article useful and interesting as it provides an overview on how these cybercrimes came about, how it works, who do they targeted on, and what are the steps to be taken. It basically provides us the basic or fundamental information that we should have at least get to know. We felt that the article is fairly understandable, therefore we would recommend you to read on further if you are interested.
How to Safeguard Our Personal and Financial Data?

Create your password wisely
When creating a password, do not take it for granted by setting a weak one where it can be easily hacked with just a single guess. Try creating a secure, memorable password which is easy for you to remember but hard for others to guess. Go for a password with at least 8 characters long that includes
numbers, characters and symbols. Use different passwords for different accounts and try
changing the passwords regularly.
Install a firewall
A firewall is a part of a computer system or network which can be implemented in either hardware or software or a combination of both. It is designed to block unauthorized access to prevent personal and financial data from being stolen. Nowadays, computers have often come along with a firewall integrated into their operating systems. For those who also have a DSL or a cable modem can provide extra protection as these modems came along with another firewall.
More often than not, new computers often come along with trial versions of antivirus and antispyware programs which tend to expires within a short period of time. However, in many cases people tend to take it with a pinch of salt ignoring that fact that they are suppose to update their programs as they think that their existing programs are still protecting them, with the reason; “the program is still operating”. This is so not true because their computers are not protected from new viruses as the programs simply cannot detect these viruses. Currently, the popular antivirus programs would be AVG 8.5 version and Kaspersky Anti-virus 2009. If you think it is a little too costly, try Alwil Avast as it is free antivirus software with spyware protection.
Do Not Open Mystery Attachments
Recipients must be alert when receiving attachments especially it is being received from an unknown party. Do not simply open them as they contained viruses or links that lead recipients to dummy sites where they will ask for victims’ financial or personal information. In such a case, there is a high chance that personal data may be stolen.
Use your own computer
Try to avoid using public computers to access into your brokerage account as they may contain software that are able to steal your financial or personal information such as passwords. If you happened to be using one their computers, remember to delete your “Temporary Internet Files” as well as all of your “History” right after you have log off your account.
Be More Alert When Using Wireless Connections
Usually wireless connections may not provide as much security protection as do wired Internet connections especially those in public areas where the most common one would be Internet cafés and hotels. These places tend to even lesser security protection in order to ease users when accessing and using these wireless networks. Therefore, it is advisable to not access your online brokerage through wireless connections.
Get Confirmation First
If it ever happens to you where there is an unknown party who requests you to first send your information by mail over the phone, do not do as they told immediately as they may be fraudulent. Call up the organization to obtain the confirmation on such occurrence first. In another case, if you ever received telemarketing calls at home, and you want to put an end to it; you may file a complaint for free to the National Do Not Call registry. This is because most telemarketers are not allowed to call your number once it has been your registry for 31 days.
Limit Your Credit Card Usage
When you purchase stuff through mail-order, it is advisable to limit your credit card usage to prevent dishonest sales clerk or any other responsible person from stealing your personal credit card information. The same principle applies when you opt for online services in order to prevent thieves from racking up bills before hitting a wall.
Be More Alert when Using ATM Machine
While using the ATM, be more alert to your surroundings and you should look up and around every few seconds while transacting your business. Do not enter your PIN if there is someone else who can see your screen. You should first shield your PIN with your body from onlookers. Try not to use spouse, children, maiden or pet names for your PIN number. In our opinion, we think that our account will be a lot more secure if banks can also provide fingerprint or iris scanning as another step of verification.
Be careful Downloading
Be wary when downloading software programs especially free software or programs from an unknown source. This is because there may be a higher chance of you downloading harmful software programs on your computer or such software may contain other software such as spyware. Protect yourself from such programs by ensuring that you are using anti-spyware software and be sure to know the nature of the software, its source, and its functions before installing it.
In short, we advised all users to be alert and caution at all the times, do safeguard your personal and financial data properly; if you manage your properties well, then you will be safe. In our opinion, the first step to safeguard is to at least have a basic foundation on how cybercrimes works and occur. Then, from here; users can start analyzing on how to prevent them.