E-Commerce

UBAI 3013 E-Commerce

The term 'transaction processing' in an ecommerce environment, is the process of an ecommerce or online shopping website accepting and processing a customer’s debit or credit card payment online and in real-time, in return for services or goods. Nowadays, there are several transactional e-commerce sites in Malaysia. One of the most famous transactional e-commerce sites is Golden Screen Cinema (GSC) which can find in http://www.gsc.com.my/.




The website design is simple to understand and their layout are very attractive. There are many events about new movies which users can find it easily like new hot offer and events, movie now showing, movie show time, reservation for tickets, e-payment or even e-payment tutorial are provided for new users. Moreover, the website will provide users with all the cinema location maps.




The conveniences of GSC is to provide information for its about their favorite movie synopsis. What they have to do is just simply click on the movie name then the synopsis will pop up. Besides that, users can also know other details such as new movies release date, running time and directors of movies. Most of the movie fans like to know about the story of the movie that they watch. Sometimes, GSC also provide some promotion to its users such as buy one tickets free one tickets with some conditions and EON Bank Card-The Ultimate Movie Card cardholders can get up to 50% off ticket with purchase up to RM100.




Moreover, users can enjoy reservation or purchase of tickets on this website through e-ticketing. Through e-ticket, users no need to queue up for buying tickets especially on weekends. However, users have to register to become members of GSC in the first place. For each transaction, users only need to sign in by entering their ID and password, and then they can select the cinema, movie, date and show time and the method of payment. User can pay by e-payment. All Internet purchases are confirmed bookings and no refunds, exchanges or cancellations will be allowed even if the tickets are not collected. There will be a RM0.50 booking fee and RM1.00 for Gold Class charge at RM1.00 per ticket for each successful transaction. When make payment the screen will show the total charge, users only need to enter their user name, IC/Passport No., e-mail confirmation and payment modes.


However there are some limitations faces by users when using services provided by GSC. One of them is when users using e-payments service, their card personal information maybe stolen. Second, not everyone can purchase e-ticket unless they are registered GSC members. Third, when we want to purchase on the spot we can’t buy tickets online. Fourth, information published on the website maybe insufficient for users in booking for tickets.


Although there are some drawbacks of services provided by GSC, conveniences provided are still more than its drawbacks. So, hopefully services provided by GSC can be improved to attract more users to enjoy its services.




Electronic Government is generally known as e-government. It refers to the use of information and communication technology for the purpose of improving government services, transactions and interactions and other aims of government with its citizens, business and industry.

In the year 1997, e-government initiative was launched as one of the seven flagships of the Multimedia Super Corridor (MSC) initiative in Malaysia by the former Malaysian Prime Minister, Tun Dr. Mahathir.

The 7 main pilot projects that identified as the core of the e-government application including:
1. Generic Office Environment (GOE)
2. Electronic Procurement (eP)
3. Human Resources Management Information System (HRMIS)
4. Project Monitoring System (PMS)
5. Electronic Services Delivery (eServices)
6. Electronic Labor Exchange (ELX)
7. E-Syariah




E-government has provided a convenience environment for its users. They can access to the services anytime by their own personal computer. However, citizens are still not familiar with e-government. Users are still lack of knowledge on how to use e-government and IT, they are also worry about the security and privacy of their private information will be know by others. In order to encourage more citizens to use e-government, government can promote such services to its citizens through media devices such as TV, newspaper or radio to enable the user more comfortable with the service and understand the services more. Besides that, campaigns to educate people how to use the services should also be conduct to ensure that users can use its services easily. Moreover, the website should also developed in multiple languages such as Chinese, English, Tamil and especially national language (Malay) to facilitate different users. In addition, the website of e-government should also be well designed to meet users’ requirement.


Since e-government had implemented, citizen are encouraged to use and enjoy the service available.




Related Link:
http://www.mait.com/admin/enews_images/MAIT%20Country%20Intelligence%20eNews96_37.pdf
http://dspace.fsktm.um.edu.my/xmlui/bitstream/handle/1812/79/Roslind%20Kaur.pdf?sequence=1
http://en.wikipedia.org/wiki/E-Government
http://www.mait.com/admin/enews_images/MAIT%20Country%20Intelligence%20eNews96_37.pdf

Nowadays, competitions among companies are becoming intense. To remain success in market, a firm must ensure that it always provide top quality of goods and services to its customers. One of the ways is to have a closer contact with its customers and it can be done through Corporate Blogging.

A corporate blog is published and used by a company in achieving its organizational goals. Basically, there are two types of corporate blog which are:

Internal Blog
- A blog which can be accessed by employees in a company through its intranet
- It helps to improve its communication and culture in a company

External Blog
- A publicly published blog where company employees, teams or spokesperson can access to it
- It deals with marketing, branding or public relations purposes

Uses of a corporate blog may include the followings:

1. Helps company to achieve its business goals
A company can publish its information such as its recent promotion or future project on its corporate blog and public are allowed to comment on its blog entries. Then, person-in-charge will respond to comments given. This may become a factor to retain existing customers and attract more new customers because they will feel that they are valuable when company respond to their comments or requirements. Hence, achieve its business goals which are increase profits and new market for products.

2. Extend company image in marketplace
Company can publish some attractive advertisement about its latest activities, products or services in their blogs. It may attract blog visitors’ attention on its recent news and build a deep impression in them.

3. Provide a two-way channel between employees and customers
To remain competitive, a company must always ensure that there is a good communication between employees and customers. Blogs can help company by establishing mutual lines of communication, understanding, acceptance and corporation between a company and its customers through keep informed on and responsive to its customers’ interest.





An example in Malaysia would be the blog by Dato’ Tony Fernandes, the CEO of AirAsia. This blog provides a chance for the public to communicate with Dato’ and as well as updated news of AirAsia.





Besides that, AirAsia also provide a blog site where its customers to express their comments or share their experiences with AirAsia. With the effort in caring and satisfying customers, it can meet its goals established in setting corporate blog, achieve customers’ loyalty and hence its ultimate goal- increase of profits.

Although there are usefulness in corporate blogging, risks still exist and company has to take into consideration in creating a corporate blog. Examples of risks may consist of negative comments from its visitors, loss of control over messages and neglect in handling blog. Thus, companies have to avoid these risks in order to achieve its best possible result as a marketing communication tool.


Related Links:
http://en.wikipedia.org/wiki/Corporate_blog
http://www.conversationagent.com/2008/02/corporate-blogs.html
http://wiki.media-culture.org.au/index.php/Blogs_-_Corporate_Blogging_-_New_Communications_Media
http://www.tonyfernandesblog.com/
http://blog.airasia.com/



Electronic learning (or E-learning) is a type of technology that used to support a learning process. Malaysian Universities have given the sense that they are committed to e-learning as a teaching method. Students are required to participate in an Online Forum using Learning Management System and discussed among each others and with their tutors on their subject matters or assignment. The commitment of Malaysian Universities has ensured that e-learning technologies have become a permanent feature of the tertiary sector in Malaysia.

There are some pros when using e-learning compared to traditional face-to-face courses and lectures. Students can learn at their own place, study at their convenience and get desired resources anywhere as long as they can access to a computer and Internet connection. It can also reduce travel time and costs for off-campus student and no additional travel costs to add to their family budget. Besides, e-learning also encourage more interaction among students and instructors than in large lecture rooms and students can have flexibility in joining discussions in the bulletin board threaded discussion areas at any hour, or visit with others and instructors distantly in chat rooms.

Although e-learning offer some advantages, it also provides some cons as well. Without routine structures of a traditional class, students may get lost or confused about course activities such as deadlines for their assignments. Besides, instructor may not always be available when their students are studying or need their helps. More important is that low motivation or bad study habits will fall behind students especially for students with beginner-level computer skills.

The pros and cons of e-learning vary depending on the main target group for whom the e-courses were designed in the first place. But it is unarguable that e-learning is rapidly growing as a form of training delivery and most are finding that clear benefits to e-learning will guarantee it in their overall learning strategy.

Related links:
http://eprints.utm.my/4507/1/A_Comparative_Study_of_E_Learning_at_Malaysian_Private_Universities.pdf
http://www.about-elearning.com/e-learning-advantages-and-disadvantages.html




Mobile Payment System is a new payment method where we can make payment using mobile devices (e.g. Cell phone) instead of with cash, credit cards or cheques. Mobile payments provide quite a number of advantages for its users such as:
1. Security - Two-factor authentication between merchant and buyers to prevent fraud.
2. Convenience - Consumers need not to hold huge amount of cash during shopping
3. Easy & Fast - Buyers only need to integrate their mobile phone to the device and transaction can be done in short time


In Malaysia, mobile payments are being used in various areas:
- Music, Videos, Online Games and other Digital Products
- Transportation Fares and Toll Fees
- Books, Magazines, Tickets and other Hard Goods
- Make payment for phone bills. e.g. Digi





One of the famous Mobile Payments applications in Malaysia is Mobile Money. It provides convenience to buyers where they can buy product online and make payment without having to present at a physical store. Registered users can pay for merchandises bought by only sending a 6-digit security PIN via SMS using a mobile phone.


Besides that, Visa payWave is another example that provides mobile payment services. Technology used is Near Field Communication (NFC), a short range wireless technology that allows communication between devices at close range. Users only need to get their mobile phone close to a tiny computer chip which sends payment information to a card reader via short-range radio frequency waves. The San Francisco Coffee outlet at KLCC is an example that uses Visa payWave.


Study showed that almost 88% of Malaysian populations are subscribing to mobile phone services but there is only 1.8% from them are subscribed for mobile banking and payment services. This result shows only small portion of Malaysian mobile phone users are being exploited to use of mobile payments. Thus, some strategies should be adopted to attract more users to mobile payment. For examples,

1. Educate Consumers about Usefulness and Functions of Mobile Payment
Merchants that provide mobile payment services can introduce method of using and its advantages to its customers via their official websites.

2. Enhance Security of Payments
Merchants can adopt certification program such as VeriSign to increase consumer’s confidence in securing their confidential information when making mobile payments.

3. Well Designed Payment Process
Mobile payment systems should be designed in an easy and simple model so that users are more willing to adopt mobile payments which are still new to them.

4. Collaborate with More Banks and Companies
This can help to enhance customers’ satisfaction when they are able to pay using mobile payment in a wider range of services.


Related Links:
http://en.wikipedia.org/wiki/Mobile_payment
https://www.digi.com.my/whatshot/promotions/hppaybill/faq.do
http://www.mobile-money.com.my/
http://www.theedgemalaysia.com/technology/16929-visa-rings-in-on-mobile-payment-space.html
http://www.bernama.com/bernama/v5/newsindex.php?id=337023


Electronic currency also known as electronic money, electronic cash, digital currency, digital money, or digital cash. It refers to money which is exchanged only electronically. Typically, this involves use of computer networks, the Internet and digital stored value systems. This is a system of debits and credits, used to exchange value, within another system, or itself as a stand alone system, online and offline. Electronic Funds Transfer (EFT) and direct deposit are examples of electronic currency.

The online form of electronic cash allows for the completion of all types of Internet transactions. While offline form is a digitally encoded card that could be used for many of the same transactions. The primary function of electronic currency is to facilitate transactions on the Internet and its reality is slightly more complicated and makes transactions both secure and private. Electronic currency truly globalizes the economy as users can download money into their cyber-wallet in any currency desired. A merchant can accept any currency and convert it to local currency when the cyber cash is uploaded to the bank account.

An extraordinary success that took place in Hong Kong (Octopus Card), which started as a transit payment system and has grown into widely used electronic cash system. Deposits work of this Octopus Card is similar to banks’. After Octopus Card Limited receives money for deposit from users, the money is deposited into banks, which is similar to debit-card-issuing banks redepositing money at central banks.

Singapore also has an electronic currency implementation for its public transportation system (commuter trains, bus, etc), which is very similar to Hong Kong’s Octopus Card and based on the same type of card.

Digital coins are like travelers checks. It is also called “e-money” and “e-cash”, it is downloaded as “digital coins” from a participating bank into user’s computer, or an account is set up within the bank. Either the digital coins or the transactions that debit the account are transmitted to the merchant for payment. All the transactions are encrypted.

As conclusion, electronic currency combines the benefits of other transaction mediums and allows individuals to conduct transactions among each other.

Related links:

http://en.wikipedia.org/wiki/Electronic%20currency
http://www.anderson.ucla.edu/faculty/jason.frand/teacher/technologies/goshtigian/define.htm

In this new millennium, it is becoming less for consumers to pay for their expenses by cash. People now are mostly use credit cards to purchase clothes in their closets and to insert petrol for their cars. The unfortunate consequence of this shift in behavior is that credit card debt is become higher. Eliminating this type of debt can be difficult as many people are only able to pay a minimum monthly payment each month and the interest rates are extremely high. Under these conditions, it can take years to pay off even the smallest credit card balance. This is the general consensus of consumer groups on the alarming number of credit card users below the age of 30 who were blacklisted and later declared bankrupt due to credit card debts. So, it is better for us to take some prevention method on the credit card debts.


Causes of Credit Card Debts

1. Financial Illiteracy
May be you are not been taught in schools or your parents may not explained to you. It doesn't matter. You are responsible for your life and your money anyway. Financial mistakes are increasingly expensive and complicated to resolve. It is because many people don't understand how to save money and invest for a rainy day, or even why they should balance their checkbook.

2. Underemployment
You might deserve a break but actually it is not a good time. People who experienced under employment may continue to think of it as only temporary or if they are coming off unemployment feel a false sense of relief.
Get those expenses in line with your current income. Down the road if you increase your income due to more hours, a better job, or a second job, then it is the time to start adding in some of the previous spending before you become underemployed.

3. Banking and Windfall
Spending tomorrow's money today is very attractive. Especially if you believe that tomorrow the money will come no matter what. A planned job bonus may not be a confirm thing. The inheritance that you believe will come your way may not. The lesson is don’t spend the money until the check clears.

4. Poor Money Management
You may spending hundred of dollars for unnecessary thing for each month.A monthly spending plan is essential. Without one you have no idea where your money is going. Planning is no more difficult, it is just writing down your expenses and income and reconciling the two. You will be surprised at how powerful you'll feel when you are making thoughtful decisions about when and where to spend your money.

5. Medical Expenses
Gaps in coverage, lapsed policies and increasingly costly alternatives make this a popular category. If you think a credit card is very convenient, think again. The medical industry wants to get paid at the time service is rendered. They know that if they don’t, the chances of their getting paid drops. This means more debt for you, less for them.





Prevention of Credit Card Debts

1. Credit Counseling and Debt Settlement
This helps clients by educating them in ways to get out of debt and stay that way, but approaches are significantly different. The objective of credit counseling is to pay off debts in full by negotiating lower interest rates, while debt settlement companies pay off debts faster by negotiating reductions in amounts owed.

2. Choose a Credit Card which Offer the Lowest Interest Rate
Photocopy the credit card offer, including the interest rate and terms. Create a letter to your credit card companies stating that you are thinking of switching to their competitor because they are offering a far more reasonable interest rate. Credit card companies do not want to lose your business. Therefore, they will try to offer you a more desirable interest rate.

3. Manage Your Finances
Starting with a strategy will help keep you on track before you ever even pull out the credit card. Determining your monthly income and needed expenses. As part of these monthly expenses, figure in 5-10% of your income to set aside for emergencies, long range savings such as a retirement account, and short term savings. If you have some savings then you can avoid from putting large amounts of debt on a credit card in times of a crisis.



Related Links:

http://www.mmail.com.my/content/credit-card-debt-and-you-many-unaware-effects-bankruptcy
http://www.nurido.at/news/credit-card-debt-consolidation-loans-require-an-attention-to-detail-124017.html
http://www.nurido.at/news/best-relief-for-credit-card-debt-credit-counseling-or-debt-settlement-123740.html
http://www.bankrate.com/brm/news/debt/debt_manage_2004/top-10-causes.asp
http://www.mozdex.com/prevent-credit-card-debt/
http://www.cardratings.com/howtoavoidcreditcarddebt.html

Prepaid cash card is similar to debit card, with a card number, signature and company branding. It enables holder to purchase and make payment using an amount preloaded by the holder or someone else. However, it is not like debit card services which links to a bank account with an overdraft facility. Prepaid cash card users are only allowed to use the credit preloaded by them.


It is convenience to keep and use. Users can use it as a substitute for cheques and cash. For example, if prepaid cash card is a MasterCard, VISA or Maestro card, users can use it to make purchases anywhere around the world where those cards are accepted and it is more secure as it can be blocked if it’s lost or stolen.

Users are allowed to use prepaid cash card to buy things at shops, or for telephone shopping, mail order shopping or Internet shopping. Moreover, there are some other prepaid cards such as Touch ‘n Go (TnG) smart card. Users of TnG can use their preloaded cards to pay for highway tolls, Light Rail Transit(LRT) or bus tickets and even car park fees.

Next, Octopus card used in Hong Kong is also one of the examples of prepaid cash cards. This is a smart card that used to transfer electronic payment in online or offline systems. Users can use it for public transport in Hong Kong, payment at supermarkets, convenience stores, on-street parking meters, car parks, fast-food restaurant, and other point-of-sale.

Users of prepaid cards are free from debts as they have no chance to spend exceeding the preloaded amount. This is different from credit cards which require repayments after purchases. Debts are easy to create as credit card users can exceed budget easily.

Besides that, there is no interest charged onprepaid cash cards and it is easy to apply because no credits check is needed. It helps users to control and limit their money spending. They can only spend with the money that is loaded onto the card and spending can be checked via the Internet.

Prepaid cash cards have brought many benefits. People should be encouraged to utilize it in making their purchase transactions.




Images:
(Master Card and VISA Card)


(Touch 'n Go Card)


(Octopus Card)




Nowadays, people rely on the Internet to do their daily work. Although Internet has brought a lot of advantages to the users, but no doubt, there is also threat of online security increasing day to day.

There are few categories of threat:

1. Accidental actions
This category encompasses problems arising from basic lack of knowledge about online security concepts and includes issues such as poor password choices, accidental or erroneous business transactions, accidental disclosure, and erroneous or outdated software.
Related problems occur as a result of misconfigured security products and information leakage resulting from insecure information transfers.


2.Malicious attacks

  • Attack that specifically aims harm computers.
  • Types of Malicious attacks:

a.Computer Virus:

-It is the most common form of malicious code.
-It is a program that attaches itself to other program.
-Major types of virus:
i. File Infectors
ii. System or boot-record infectors
iii. Macro Viruses
iv. Multi-part

-Example of computer virus:
I.

Melissa” virus/worm - It will cause computer show down and face frequent failure.
II.

I Love You” virus - A small piece of code attached to electronic mail which will cause an e-mail send to everyone in an address book, then damaging victims' machines.

III.Trojan horse - Personal information will be stolen as Trojan track into the computer.


b.Denial of Service Attacks (DoS)

  • It is an attack on a web site that uses specialized software to send a flood of data packets to the target computer with the intention of overloading its resources and cause the network shut down.

c.Distributed denial-of-service attack (DDoS)

  • A DoS attacks that gains illegal administrative access to as many computers on the internet as possible and uses these multiple computers to send a flood of data pockets to the target computer.


3.Online fraud

  • It is a broad term covering Internet transactions that involve falsified information.
  • Types of Online fraud:

a.Identity Theft

-Electronic commerce information can be intercepted as a result of vulnerabilities in computer security. Thieves can then take information such as credit card numbers and misuse on it.

b.Data Theft

-A term used to describe not only the theft of information but also unauthorized perusal or manipulation of private data.


Ways to help prevent Threats of online security:

  • Use and update anti-virus software, anti spyware software and firewall frequently.
  • Be aware of email attachments from unknown sources.
  • Develop a strong password and change them frequently.
  • Do not download free software unless you have verified that it is legitimate.
  • Stay away from 'questionable' websites.
  • Be cautious of pop-ups.
  • Back up your data frequently.
  • Always delete cookies in the computer to prevent track on the history/password.

In conclusion, we should prepare well before online to secure us being threat of online security.

Related Links: http://www.bsagovernment.com/downloads/MajorOnlineThreats.pdf http://www.vermontpcsolutions.com/articles/10-free-ways-to-help-prevent-malware-threats.html

Phishing is a new word produced from ‘fishing’, it refers to a new type of network attack where the attacker creates a replica of an existing Web page to fool users (e.g., by using specially designed e-mails or instant messages) into submitting personal, financial, or password by masquerading as a trustworthy person or business in an electronic communication. This information then can be used for future target advertisements or even identity theft attacks (e.g., transfer money from victims’ bank account).

Example 1: Phishing email / Phishing website


A frequently used attack method is to send phishing e-mails to potential victims, which seemed to be sent by banks, online organizations, or ISPs. In these e-mails, they will makeup some causes such as password of your credit card had been mis-entered for many times, or they are providing upgrading services, to allure you visit their Web site to conform or modify your account number and password through the hyperlink provided in the e-mail. You will then be linked to a counterfeited Web site after clicking those links. Legitimate organizations would never request this information of you via email.



Example 2: JavaScript Obfuscation

There is a trend in phishing today to make an attempt to further fooling a victim in believing he/she is on a trusted page, at say, Netbank. Unmodified, a copied Netbank site will look like this on the phisher’s hosting server:



The location bar, which takes up approximately 2% of the screen height, accounts for virtually that all of the indication that a Web site is genuine. This is easily circumvented with a well known JavaScript vulnerability posted on the Bugtraq security mailing list in May of 2004, which uses a floating pop-up frame to change the address bar to the familiar:



The ability to produce “chromeless” frames outside the browser window using the window open JavaScript function continues to be available to Web developers, but thankfully, are now blocked by recent versions of Internet Explorer’s and Mozilla Firefox’s built-in “pop-up blockers,”.

Here is a quick checklist to bear in mind during our surfing, we should alert to the risks of phishing:
1. If you receive a mail that asks you to take immediate action, such as "to restore access to your bank account…." please don't click the link. Never has the bank will ask you to give them your user ID and password online. If in suspect something, speak with the bank directly to find out the truth.
2. Be alert in all Internet activities. Therefore be aware that there are unscrupulous elements out there trying to extract your personal details for their nefarious uses.
3. Check whether anything all right by log in to your account regularly.
4. Ensure your web browser is the latest version with all security patches updated to help you to detect and block the phishing. Web sites by using various spam filters to enhance the security of the web sites.
5. Do not filling out forms in email messages, especially if the form requires you to fill in personal detail information.
6. Never leave personal accounts unattended for long period of time (even for a month). Make it a habit to check your debit/credit of account and if you notice anything unusual, get clarification immediately.

7. Never reveal your personal information to anyone; however although genuine or trustful requester may sound. Personal details should only know by you and is your personal asset. It is better to be careful a bite.

Related links:
http://internet.suite101.com/article.cfm/avoid_phishing_attempts

http://research.microsoft.com/en-us/um/people/chguo/phishing.pdf

http://y2u.co.uk/Knowledge_Information/Technology/RN_Computer_Phishing_Scam.htm

http://www.phishtank.com/what_is_phishing.php

http://www.planbsecurity.net/wp/503167001_PhishingDetectionandPrevention.pdf


Are you taking steps to protect your personal and financial information? How do you safeguard? Nowadays, we will rely on computer to save our personal data and doing financial transactions such as e-banking by using computer in order to save our time. After all, if the information falls into person with bad intention, it can lead to fraud or identity theft. Therefore, do you think that safeguards that you done are sufficient enough to protect your personal and financial information?

There are some ways to safeguard our personal and financial data:


1. User ID
Avoid identifying information in user IDs, such as first initial and full last name. We should use a substitute name that avoids any reference to your name, job or other personal attributes can make tracking more difficult. Besides, we shall not use the same ID across multiple services.

2. Encryption and password security
Whenever we are transmitting data over private or public networks, we should assume that somebody could be eavesdropping on the packet data that we sent and receive. Therefore, when we transmitting sensitive data, we should use some form of encryption to protect our data. Besides, we should use stronger password to protect our access data. For example, use longer password or a combination of numeric and alphabet passwords. By using encryption and password security, we can ensure that no unauthorized people can view our data if they can physically access it.

3. Install and update antivirus and antispyware programs
Make sure antivirus and antispyware programs are well installed to protect our computer against viruses and Trojan horse from stealing or modifying our data on computer. In addition, we also need to keep our virus definitions up to date. Besides, we should regularly scan our computer system for spyware because spyware may affect performance of our computer.

4. Avoid accessing financial information in public
We should not access financial information and do any financial transaction in public such as coffee shop or cyber café that offers wireless access. It is because we do not know whether there have been installed spyware in their computer and hacker can easily get our information if there is no a strong firewall.


Related Links:
http://technorati.com/tag/personal-data
http://www.msisac.org/awareness/news/2007-03.cfm

3rd party certification program is used to ensure that the original content of an electronic document is safeguarded from being changed by unauthorized person. Certificate Authorities (CAs) are third parties that issue digital certificates which used to authenticate websites, individuals and software companies.



MSC Trustgate is a licensed Certification Authority (CA) in Malaysia since 1999. They offer security solutions that are needed by individuals, enterprises, government, and e-commerce service providers using digital certificates, digital signatures, encryption and decryption.

It’s very important for an organization to ensure the security of their confidential data. Therefore, they can use certificates to secure their data and manage identification credentials from users and computers within and outside your organization. Examples of the certificates are:

Public Key Infrastructure (PKI)
PKI is a combination of software, encryption technologies, processes and services which safeguard communications and business transaction. It is done by exchanging digital certificates between authenticated users and trusted resources. By using PKI, an organization can achieve its objective of Confidentiality, Integrity, Authenticity and Non-repudiation of data.

Digital ID
Everyday, there are millions of transactions being carried out over the unsecured network. These transactions normally contain information such as customer’s details, company’s pricing decision and other highly confidential information. Such information can be easily altered if not properly encrypted. Examples of Digital ID are CryptoSuite and Secured E-mail.

Therefore, Digital ID provides protection to this information so that such information remains private in its transferring process by signing and encrypting transaction. It uses private key and public key performs following operations that supplement PKI:

Authentication
  • Verification of real identity of an individual, computer, computer program & E-Commerce websites.
Privacy
  • Assurance of confidential data remains private

Authorization

  • Assurance that only authorized users have rights access to private data

Integrity

  • Assurance that stored data have not been amended without authorization

Non-repudiation

  • Assurance that online users cannot falsely deny or repudiate their transaction

VeriSign



Furthermore, VeriSign is also one of the programs used by organization in Malaysia. MSC Trustgate is the first company in Asia which appointed as VeriSign Authorized Training Centre. VeriSign provides various types of security products such as digital certificates, payment processing, managed firewalls to mobile call roaming, toll free call database queries and downloadable digital content for mobile devices.


MyKey




Besides Organization, Malaysian Government is also applying 3rd party certification program in National Identity Card (MyKad) of every citizen. MyKey is the PKI solution that works with our MyKad which allows us to conduct several Internet activities such as online submission of tax return, online banking and digitally sign documents.

E-Commerce is also known as ecommerce, electronic commerce or E-Business. Unlike the traditional method of commerce, E-Commerce is the act and science of buying, selling or exchanging products, services and information over the internet. Internet shopping has become one of the popular activities around us. With E-commerce, everyone can shop at anytime they want.

The meaning of E-commerce has changed over the 30 years. In 1970s Electronic Date Interchange (EDI) and Electronic Funds Transfer (EFT) were first developed. EDI and EFT allowed business companies to exchange business information, do transaction, and send commercial documents electronically. Next, e-commerce also formed in 1980s in the growth and acceptance of credit cards, automated teller machine (ATM) and telephone banking.

In 1990, World Wide Web(WWW), which was proposed by Tim Berners had became more commercialized and anyone in the world started taking part in it. After that, Mosaic web-browser became the first ‘point and click’ browser and it was quickly adapted into a downloadable browser. In 1994s, a simple browser to surf the internet and a safe online transaction technology called Secure Socket Layer (SSL) was provided by Netscape.

Amazon (http://www.amazon.com/) and eBay (http://www.ebay.com/) were the first Internet companies to allow electronic transaction. The two websites are launched in 1995s. Besides that, DSL was also developed in 1998s and allowed quicker access and a persistent connection to internet. For addition, the development of Red Hat Linux was also another major step in e-commerce growth.

In 2000s, people began to define the term ecommerce as the process of purchasing of goods and services available over the Internet using secure connections and electronic payment services. There were a great number of business companies in United States and Western Europe represented their services in the world wide web (WWW).

Evolution of ecommerce is a history of a new, virtual world which is evolving according to the customer advantage. It is a world which we are all building together brick by brick, laying a secure foundation for the future generations. I strongly believe that e-commerce will keep on developing popular stages until anyone can just buy thing and shop from home.


In my opinion, an example of e-commerce success is eBay which is a famous website visited by many people. The eBay was born over Labor Day weekend in 1995, when Pierre Omidyar, a computer programmer, wrote the code for an auction website that he ran from his home computer. Today, Omidyar's hobby is known as eBay, the world's largest online marketplace - where practically anyone can practically sell anything at any time. With a presence in 39 markets, including the U.S., and approximately 84 million active users worldwide, eBay has changed the face of Internet commerce.

eBay might be the first example where a commerce site has actually been built around a community where people are exchanging information and exchanging goods, services and merchandise. It is a software program that allows people, in one spot, to list down items of various interest and various degrees. It also allows people to be able to come to that very same site and look at what are available for sale and bid and buy those items. It uses the auction process as the method for establishing how merchandise is valued and eventually how it is exchanged between buyer and seller.

All eBay users can browse through listed items in a fully autamated way. The items are arranged according to topics, where each type of auction has its own category. They are having both steamlined and globalised traditional person-to-person trading. Their facilities are easy for buyers to explore and enable sellers list item for sale immediately within minutes of registering, the binding contracts of the auction is between the winning bidder and the seller only.

The causes the make eBay success is that it allows people to often times connect to some very fond and special early childhood memories. It allows people to make that connection and relive a lot of very vivid and very fond memories that they had from an earlier period of time. It could be anything from collecting baseball cards to toy soldiers to Barbie dolls to doll houses, and so on.

Another factor to consider is, people enjoy with the experience of the shopping bazaar. They enjoy the hunt, looking around for merchandise and they really enjoy the competition of the bidding process. Everybody likes to get a bargain, I think, in some way, shape, or form, likes to haggle a little bit over the price. The eBay auction format allows users to do that. The other thing is that as it has grown, it has become a very practical place to buy and sell collectibles or commoditie.


Related links:
http://www.ecommercetimes.com/story/2127.html
http://www.ebay.com/
http://news.ebay.com/about.cfm
http://www.scribd.com/doc/1020018/Seven-Secrets-to-eBay-Success


eToys.com (1997-2001)
I was reading the Dot.com failures website. I notice that eToys.com is one of the top 10 dot-com flops. eToys.com is a retail website which sells toys via e-commerce. eToys was launched in October 1997, with funding from Sequoia Capital, Highland Capital Partners and Idealab. Like many other dot-com companies, the company that owned the eToys site filed for chapter 11 protection toward the end of the Internet bubble on March 7, 2001. At the same time, KayBee Toys (KB Toys) acquired the bulk of eToys’ remaining assets for $5million. The eToys.com website was eventually reopened by eToys Direct Inc., a descendant of Internet startup and KB Toys partner Brainplay.com, and a subsidiary of Parent Company. It continues to market toys by mail order under eToys name through both the website and printed catalogs. On 22 December 2008 eToys Direct filed for Chapter 11 bankruptcy and it was acquired by Toys “R” Us in February 2009.

There are some reasons why eToys has failed:
1. Disrespecting competitors
One eToys senior manager reportedly boasted at the height of the Internet boom. What eToys forgot on the way to bankruptcy is that Toys “R” Us had even more powerful advantages, such as established customers, experienced in the toy business, and the heft to ensure supplies of hard-to-get hot toys. As eToys learned, disrespect is the first step to disaster.

2. B2C E-Business failures
eToys failed to appreciate the fact that theirs was a new service to the customers. The management must carefully handle both the front and the back-end of their businesses efficiently and effectively. During the 1999 holiday season, eToys was accused of falling short of one of its initial goals-speedy and reliable customer service. Thousands of customers complained that their orders were either late in arriving at their destination or contained the wrong merchandise.

3. Expensive advertising campaigns
Marketing tactics are what helped make eToys strong. It became a household name for unique, yet very pricey, print advertisements and commercials, which appealed to both parents and children. This resulted in eToys not being able to adequately meet the needs of its customers.

Members of www.wowwowecommerce.blogspot.com

Members of www.wowwowecommerce.blogspot.com