.blog

Saturday, February 28, 2009

Review a local e-commerce site



TGV Cinemas Sdn Bhd owns and operates the largest multiplex circuit in the country. TGV has 100 screens in 13 multiplexes. Its vision is to enhance the "ultimate cinema-going experience" to the discerning public by providing choice, comfort and convenience, as all-in-one package. TGV offers numerous facilities and conveniences, such as stadium seating, sophisticated digital sound and projection systems, and facilities for the handicapped including special wheelchair lifts.


TGV is the market leader in cinema design and technology. It continues to bring the latest in movie-going to the Malaysian public. TGV Cinemas Sdn Bhd (TGV) is a wholly owned subsidiary of Tanjong public listed company. It is a click-and-mortar organization which conducting some e-commerce activities such as E-payment ticketing and provide online advertising, but TGV do its primary business in the physical shop (cinemas).


In the TGV website, it provides public to search the show times of movies in each of the cinemas. Public can check the movies show times before they go to cinemas. Besides that, the site provides a lot of benefits to its members. For instance, TGV’s members may receive e-newsletters with the latest movie updates and promotions, participate in online contest and win great prizes, send e-greetings or e-card to loved ones and friends to invite them to watch a movie, and allow reserving their favorite movie tickets online.


Moviegoers who planning to catch the latest favorite movies can purchase their movie tickets on-line via TGV’s E-Ticketing System. E-Ticketing is currently only available for cinemas in the Klang Valley.

Besides of using E-Ticketing System, public can make their reservation through mobile phone by using a flash-Lite application. This application provides the info about dates, show time, and synopsis of the movies from TGV website. This application is Free of Charge. Absolutely FREE. The only thing that might need to pay is the data transfer cost. Public may want to utilize this application on Free Wi-Fi Spot such as Sunway Pyramid, cafes and any outlets.

In conclusion, TGV is definitely one of the many other sites that made it right through the market because of E-commerce advancement. Overall, TGV is giving good sight to their consumer on the usage of the Internet to do business.

For more information about TGV Cinemas Sdn Bhd, please visits www.tgv.com.my.
References:
www.tgv.com.my

posted by Ivy_low at 0 Comments

Monday, February 23, 2009

E-Government in Malaysia

Previously, the interaction between a business entity or citizen and a government agency has been taken place in the government office. Hence, a lot of complaints and annoyances have been raised up due to the inefficiency of services provided. Nevertheless, with the emerging information and communication technologies in this new era, E-Government makes it possible to locate service centers closer to the clients and resolves part of that problems.


E-Government is defined as the use by government agencies of information technologies that have the ability to transform relations with businesses, citizens, and other arms of government. Analogous to e-commerce, there are four primary delivery models and activities of e-government that aims to make the interaction between government and citizens (G2C), government and business enterprises (G2B), inter-agency relationships (G2G), and government with its employees (G2E) more friendly, convenient, transparent, and inexpensive.

E-government is adopted since the initiation of Multimedia Super Corridor (MSC) by the Malaysian Government in 1996. This initiative was launched with two objectives: (i) improve government internal operations i.e. the speed and quality of policy produced, coordinated, enforced and implemented. (ii) enhance the convenience and accessibility of the interactions between government and citizens, and between government and businesses. Basically, there are seven main projects under e-government flagship which were identified to be the core of e-government applications. They include:


1. Electronic Procurement
This project is integrated with ePerolehan in order to streamlines government procurement activities and improves the quality of service it provides. All suppliers are able to obtain tender documents and submit bids through the Internet. The suppliers are equipped with smartcards that enable them to transact with the ePerolehan system.

2. Project Monitoring System (PMS)
It is implemented together with various government agencies and statutory bodies i.e. from project application to approval to implementation, mid-term review and completion. It also provides a platform for exchanging ideas and demonstrating best practices in project implementation.


3. Electronic Services Delivery (eServices)

This pilot project allows Malaysian to engage in transactions with government and utilities payments such as telephone and electricity bill, police summons, Road and Transport Department (RTD) services. The eServices can be accessed through three websites, namely www.eservices.com.my, www.rilek.com.my and www.myeg.com.my



4. Human Resource Management Information System (HRMIS)

It provides a single interface for government employees to perform human resource management functions efficiently and effectively in an integrated environment. It helps to standardize human resource processes for federal, state, statutory body and local authority services. HRMIS also provide transactional function such as leave application, loan processing, competency management, recruitment and selection of employees.


5. Generic Office Environment (GOE)

GOE aims to introduce a fully integrated, distributed and scalable office environment that leverages use of multimedia information technology. This will enable efficient communication and allow collaboration among all workers. It leads to right information reaching the right people in a timely manner.


6. Electronic Labour Exchange (ELX)

This project helps to improve mobilization of human resource and optimize workforce utilization via systematic matching of job seekers to job vacancies. So, Ministry of Human Resource is to be a one-stop centre that contains labor market information accessible to the public.



7. E-Syariah

The main objective of implementing E-Syariah is to improve the quality of service in Syariah courts. Via the system, the Syariah judges are able to have access to past cases and all the relevant information needed for a particular case quicker than before.


Citizen Adoption Strategies

Citizens expect and demand governmental services with a high degree of quality, quantity, and availability in a 24/7 and year-round fashion. The success of E-government depends upon the capability and self-confidence of citizens in performing e-transactions, as well as their trust and confidence in the protection of their personal and confidential data within an open and accountable government. The ease of use, compatibility, and trustworthiness are significant predictors of citizens’ intention to use e-Services and that perceived reactive advantage, perceived image, perceived compatibility, perceived usefulness, and relative advantage are significant elements of e-Government adoption.


~ References ~



posted by mei_huei at 0 Comments

Tuesday, February 17, 2009

Things to take note to prevent e-auction fraud when a consumer participating in an e-auction.

An auction is a process of buying and selling goods or services by offering them up for bid, taking bids, and then selling the item to the winning bidder. In economic theory, an auction may refer to any mechanism or set of trading rules for exchange. Any item that needs liquidation or a quick sale can be disposed rapidly by auction. They offer trading opportunities for both buyers and sellers that are not available in conventional channels and they ensure cautious execution of contracts.


The numbers of internet auction fraud is growing rapidly, as online shopping has grown significantly every. Most internet auction fraud cases involve straightforward scams where consumers allegedly win merchandise by being the highest bidder. All sounds good until they send the payment and never receive the merchandise. However, people can lower their risk by knowing what auction fraud is, and how to prevent falling for it.


Stated below are some tips on keeping your risk at a minimum when purchasing items from an online auction website.


























References

http://www.crimcheck.com/background-check-news/whats-internet-auction-fraud-and-how-do-i-prevent-it


http://amazingcommerce.wordpress.com/2008/06/26/things-to-take-note-to-prevent-e-auction-fraud-when-a-consumer-participating-in-an-e-auction/


http://en.wikipedia.org/wiki/Auction

posted by BerniceLau at 0 Comments

Friday, February 13, 2009

Corporate Blogging: A NeW MarKEting COMmunicaTIon TOol For companiES







A corporate weblog is published and used by an organization to reach its organizational goals. An external blog is a publicly available weblog where company employees, teams, or spokespersons share their views. It also allows a window to the company culture and is often treated more informally than traditional press releases. Nowadays due to the competitive environment, companies are struggle for customer share and need to shore up their corporate message in any way they can to survival. Corporate blogging is another useful communications and marketing channel. It has the opportunity to reach thousands of interested people without large advertising budget, yet can significantly strengthen company’s client- customer relationship.
Many businesses, large and small, are setting up corporate blogging or business blogs due to some of these BENEFITS of corporate blogging as below:
1. Corporate blogs are a way to disseminate important and timely information to your visitors and customers about your company, before that information is sent out by someone and more directly than using a press release alone.
2. Blogs offer benefits over other social mediums of connecting with a target audience due to the fact that over post and comment approvals are in the hands of the company.
3. A corporate blog allows the company to be officially represented by an authority individual, for instance CEO, other executive.
4. Blogs are a natural networking tool, allowing a company and its owner to network with others in their industry. Furthermore, Blogs are usually updated fairly often. Through a search engine, a well optimized blog can help to draw in additional search engine traffic that might be interested in what the company has to offer.
Since there is lots of benefit on corporate blogging, here are some effective tips on how to start a blog:


a. Identify your target audience. In other words, who do you expect to be reading your blog? And, whoever that may be, be sure to write in a way that identifies with them.
b. Research your competitors. Do they have a blog? What are they writing about? What is their tone?
c. Establish an Editorial calendar. Make sure your editorial calendar is up to date with ideas for the blog for the next two months out. This will ensure adequate and timely posts without having to stress out at the last minute.
d. Use Wordpress. It’s very easy to install and manage. Plus, there are a ton of plugins you can install to make life easier for you.
e. Optimize the blog. Make it convenient for your readers to subscribe via bookmark and email to a friend. This will help your content travel across the internet with no real effort on your part.
f. Participate. Join social networks (MyBlogLog, Facebook, etc.) and use services like Twitter. This will help gain more readership to your blog.
g. Be transparent. Don’t fake it till’ you make it. Be real and speak with an authentic voice. You will build credibility and establish trust with your readers.
h. Respond to comments. Blogs are meant for conversations. Be sure to respond to most if not all comments left on the blog.
i. Build Community. Focus on growing and nurturing the community first, then monetize.
j. Monetize. This should be done after the blog has been established with a sizable community. You can monetize with Google Adsense or join a publishing network, etc.





posted by HoOI fEN^fAnny^ at 0 Comments

Wednesday, February 11, 2009

Mobile payment systems in Malaysia: Its potentials and consumers' adoption strategies


Since mobile technologies are becoming more advanced and mobile devices are making a big impact on daily life, a new type of payment system named mobile payment (m-payment) has emerged, it enabling users to pay from their wireless devices especially mobile phones wherever they go.

Mobile payment system is a system that involves collection of money payment from a consumer through a mobile device such as his/her mobile phone, smart phone, personal digital assistant (PDA), cellular telephone or other similar devices.



Instead of paying with cash, check or credit cards, a consumer can use a mobile phone to pay for wide range of services and goods such as music, videos, ring tones, online game, wallpapers, transportation fare, books, tickets and etc. Besides that, by using a mobile payment system, a person with a wireless device could pay for items in a store or settle a restaurant bill without interacting with any staff member.



With such advanced payment system, it does bring advantages to the world of e-commerce and it is relatively growing in Malaysia as well. Examples of mobile payments system available in Malaysia are Mobile Exec and Mobile Money. Both are using the concept of making payment transactions just through a mobile device to pay for goods and services anytime without having cash on hand, cheques or even physically present a store.


Mobile Money International Sdn Bhd is one of the biggest mobile payment service providers in Malaysia. It is an innovative mobile payment system that gives you the convenience of cash-free and card-free shopping as well as making remote payments. In this situation, mobile device acts like a wallet but it does not hold any cash. It holds the value that you have in your registered savings, current or credit card account with participating banks.


Mobile Money (MM) payment system complies with the regulator's stringent requirements. MM Mobile Payment platform allows everyone to pay anyone, at anytime from anywhere with just one SMS. It also allows receiving money from anyone, from anywhere, at anytime. MM Mobile Payment system is very secure and it is a closed loop payment system. The charter of Mobile Money is to provide Merchants and Consumers with a convenient and secure Mobile Payment and Mobile Commerce platform.

POTENTIALS:

1. M-payment application is user friendly with little learning curve to the customer.

2. M-payments service is universality, it provide for transactions between one customer to another customer (C2C), or from a business to a customer (B2C) or between businesses (B2B). The coverage includes domestic, regional and global environments.

3. Customers no need to carry money or credit card to make transactions.

4. M-payment services eliminate the hassle to queue up just to pay your miscellaneous bills.

This mobile payment system is still new and developing in Malaysia. It will continue to grow as the consumer’s confidence on mobile payment increased.


STRATEGIES to encourage consumers to adopt M-payment systems:

1. Enhance consumer confidence toward security, safety and reliability of the systems
2. Enhance payment instrument availability

3. Enhance trust in M-payment service providers, e.g. Banks
4. Educate consumers through seminar or advertisement about the function and the usage of mobile payment system

5. Ensure M-payment can be use when lack of other payment instruments
6. Increase the number of company that can accept mobile payment system

In conclusion, Mobile payments services indeed have a great potential and advantage. It is predicted to have a bright future because it can be used for all types of payments in anywhere and any time. Consumers are more comfortable with this low-value transaction over such non-traditional means. It is useful especially when consumers are urgent need of cash but doesn’t have any in hand. When this problem arises, mobile payments can help us to resolve it.
References:
http://en.wikipedia.org/wiki/Mobile_payment
http://mobile-money.com/
http://egnge.blogspot.com/2008/06/mobile-payment-system-in-malaysia-its.html


posted by Ivy_low at 0 Comments

Monday, February 9, 2009

The application of pre-paid cash card for consumers.

A cash card is a plastic card that provides an easier way to make payment during purchases. It is also known as an electronic cheque, as the fund is withdrawn directly from the bank account or from the remaining balance on the card. In some cases, the card was specially designed for use on the internet during online purchases, and therefore there is no physical card.

The use of cash card has become widespread in many countries and it has slowly overtaken the cheque. It is widely used for telephone and internet purchases. Besides making payment through internet, cash card also allow for instant withdrawal of cash, just like the ATM card. Merchants can also offer "cashback"/"cashout" facilities to customers, where a customer can withdraw cash along with their purchase.



There are two types of debit cards:


• "On-line" debit cards: These cards usually are enhanced ATM (automated teller machine) cards which work the same as they would in an ATM transaction. It is an immediate electronic transfer of money from your bank account to the merchant's bank account.

• "Off-line" debit cards: These cards usually look like a credit card and resemble a credit card transaction. The merchant's terminal reads your card, identifies it as a debit rather than a credit card, and creates a debit against your bank account. However, instead of debiting your account immediately, it stores the debit for processing later -- usually within 2-3 days.

What we should know about debit cards:

• Using a debit card instead of writing cheques saves us from showing identification or giving out personal information at the time of the transaction.

• Using a debit card frees us from carrying cash or a cheque book.

• Using a debit card means we no longer have to stock up on traveler's cheques or cash when you travel.

• Debit cards may be more readily accepted by merchants than cheques, especially in other states or countries wherever our card brand is accepted.

• The debit card is a quick, "pay now" product, giving us no grace period.


The Visa Reloadable Prepaid Card is an example of prepaid cash card. It is a Visa card you load with your own money to make purchases everywhere Visa debit cards are accepted. It's safer than carrying cash and can help you manage your finances.





Another example is MasterCard Debit Card. It offers the ultimate in convenience and financial control by combining the worldwide acceptance and benefits of MasterCard cards, with an immediate deduction of funds from your checking account.



References


http://en.wikipedia.org/wiki/Debit_card

http://www.nclnet.org/debitbro.htm#intro
http://www.mastercard.com/us/personal/en/aboutourcards/debit/index.html
http://usa.visa.com/personal/cards/prepaid/reloadable_prepaid_card.html

posted by BerniceLau at 0 Comments

Credit Card Debts: Causes and Prevention









  • Credit card can be defined as any card that many be used repeatedly to borrow money or buy products and services on credit. It is a plastic card having magnetic strip which issued by a bank or business authorizing the holder to buy goods or services on credit. Credit card also called charge card.
    Credit cards allow us to shop online and provide a cushion in case of emergencies. However there are negative consequences of using credit card, people who overspend by using credit card have a hard time making ends meet and trouble saving for future. Credit card debt is an example of unsecured consumer debt. Debts accumulates and increases via interest and penalties when the consumer does not pay the money he or she has spent.

    Causes of credit card debts:
    1. Poor money management: A monthly spending plan is essential. Planning is no more difficult than writing down your expenses and income and reconciling the two. Without money management, we have no idea where the money is going. Poor money management is one of the best reasons that why so many families have accumulated many credit card debts. It is because people are unaware to conduct a monthly spending plan and do not keep track of monthly bills.
    2. Less income, more expenses: This happens when the household loses his job but monthly expenses are not cut down in line with the reduction in income. The family is forced to use their credit cards for their expenses in term of less cash in hand. If did not adjust your new reality, may appear overspent and the credit card debts also exist in this case.
    3. Saving too little or not at all: Saving is the most important element for us to have a stable lifestyle. And the simplest way to avoid unwanted debt is to prepare for unexpected expenses by saving 3 to 6 months of living expenses. The consequence of saving too little is to having debts by using credit cards since credit cards have the advantage of provide a cushion in case of emergencies.
    4. Excessive medical expenses: The cost of obtaining cures and medicine is increasing and almost all doctors accept credit cards nowadays. If one of your family members suffers serious illness and the health insurance cannot cover the medical bills, then you will use your credit card because you do not have enough savings in the bank or cash in hand.
    5. Gambling: Nowadays gambling has become part of entertainments in our life. It is hard to stop when is becomes addictive. Thus, it will surely lead to a financial disaster because loans are freely available and can also borrow money through credit card. Besides that, gambling establishments may be the only place you can mortgage your house while intoxicated.

    Prevention of credit card debts:
    1. Limit the plastic in your wallet: Every credit card comes with its own set of terms and conditions including varying interest rates, penalties, fees and due dates. The more credit cards we have the more money we will spend. It is much easier to make payments on time, remember which card has the lowest, and save you from making a mistake that will affect your credit history if you only have to keep track of one or two cards. We can self control to avoid overspend through limited credit cards in wallet.
    2. Pay the balance in full and pay on time: Before using a credit card for a purchase, ask yourself( Do I have the funds to pay for this?) This is important in keeping control of your credit cards. Do not always carry a credit balance to it. If have enough money should pay the balance in full to avoid more and more accumulated debts. Furthermore, never make a late payment to anyone including car and house payments. Because of the universal default clause in credit cards’ terms and conditions, credit card companies can raise your interest rate if you are late paying any creditor or even your utility company.
    3. Making a budget: People have to create clear budget and stick on it that includes monthly bills, food, entertainment and miscellaneous expenses will prevent from overspending and fall under deeper debt load. Setting up a budget is not always easy, so if you want come help Consolidated Credit Counseling Services offers free budget counseling. You can also consult your phone book to see if your community has a local office of Consumer Credit Counseling Service.
    4. Avoid extra expenses and extra products: Sometimes there are little extra expenses that sneak up on you before you even know it. Thus need saving money to cover those extra expenses. However, if those extra expenses are within our control, we need to avoid it. Besides that, credit card companies will try to get you to purchase additional products such as fraud protection and insurance. The truth of the matter is you usually don’t need it. So, think seriously before do any decision.
    5. Early Education: The best method for prevention is teaching our youngest generation all about money before they even qualify for a credit card. Fortunately many wonderful resources exist for parents and educators. Those resources are to teach them all about the importance of saving and developing good money habits. The earlier children learn how to manage finances the less likely they will be to fall into credit card and debts problems as an adult.

    As conclude, we should aware of the causes and prevention of credit card debts and starts to spend less in order to stay with well financial situation.


    References...
    http://loss1987.blogspot.com/2008/06/credit-card-debts-causes-and-prevention.html
    http://ecomspace.blogspot.com/2008/06/credit-card-debts-causes-and-prevention.html
    http://www.bankrate.com/brm/news/debt/debt_manage_2004/top-10-causes.asp
    http://www.3debtconsolidation.com/top10-causes.html
    http://www.cardratings.com/howtoavoidcreditcarddebt.html
    http://www.mozdex.com/prevent-credit-card-debt/

posted by HoOI fEN^fAnny^ at 0 Comments

Sunday, February 8, 2009

ELECTRONIC CURRENCY

Electronic Currency refers to the involvement of computer networks, either Internet or digital stored value systems, engages in exchanging money or scrip electronically. It is sometimes known as e-money, electronic cash, digital money and so forth. Typical examples of electronic currency are Electronic Fund Transfer (EFT) and direct deposit. Electronic currency allows Internet-based purchase and sales transactions involving almost anything to be safely conducted at lightning speed rather than conventional means of payment in the non-cyber world.


Hereon, a lot of systems will sell their electronic currency directly to the end user, such as Paypal and WebMoney. Contrary, the other systems such as e-gold, will sell their currency through third party digital currency exchanger. E-gold is classified as the most widely use and accepted currency exchanger today on the Internet.


In the rough, there are two distinct types of electronic currency, i.e. identified e-money and anonymous e-money or known as digital cash. Identified e-money contains information divulging the identity of the person who originally withdrew money from the bank and enables banks to track m
ovement of the money as it goes around the economy. On the other hand, anonymous e-money is spent or given away without leaving any transaction trail once it is withdrawn because it works just like real paper cash. Moreover, each type of the e-money mentioned above can be transacted in two ways: online e-money and offline e-money. Online means interaction with a bank (via modem or network) is required in order to conduct a transaction with third party. The latter refers to conducting a transaction without having to directly involve a bank.


The Electronic Currency Trading System (ECTS)

An electronic currency trading investment platform that provides its client a better way to trade foreign currencies against the strength and weakness of the US dollar. With the utilization of its database of historical price patterns and technical indicators, the system allows for the recognition of entry positions with maximum profit potential. The six major currencies traded by ECTS include Euro, Yen, Australian $, Canadian $, Swiss Franc and the British Pound.


Pros and Cons

With the use of Electronic currency, there are some benefits provided to the users such as convenience and privacy, increased efficiency of transactions, lower transaction fees, and new business opportunities with the expansion of economic activities on the Internet. Nevertheless, there are also some potential issues raises by the used of electronic currency. The transfer of digital currencies triggers local issues such as how taxes should be levied or the possible ease of money laundering. Furthermore, the effects bring along with macroeconomic include exchange rate instabilities due to fluctuation and shortage of money supplies (the possibility that total digital cash exceeds the real cash available).

In short, E-currency has become the first bonanza of the 21st century which provides much more safeguards than conventional means of payment. However, some cyberspace regulations should be applied in order to address those potential issues that arise from e-currency.


~ References ~

posted by mei_huei at 0 Comments

Saturday, February 7, 2009

The threat of online security: How safe is our data?

Internet is a "network of networks" that consists of millions of smaller domestic, academic, business, and government networks, which together carry various information and services, such as electronic mail, online chat, file transfer, and the interlinked web pages and other resources of the World Wide Web (WWW). It is the largest network ever created. Its large size makes many people feel safe, due to the prevailing psychology of ‘safety in numbers.’ While the Internet may be safe for many uses, it can be dangerous when it comes to commerce. The Internet is insecure for several reasons:

1. The client computer is usually insecure.
2. LANs are easy to eavesdrop on.
3. The intermediate networks comprising the Internet are public and open.
4. Web server may be insecure due to its operating system or lack of effective management.

Virtually every link in the connection between a client and a server is open to attack. Every time you use your credit card at a restaurant, gas station or mail-order house, you run the risk of having the card number stolen and misused.

Nowadays, Internet Security is something that has grown to be a main concern among society. It is important for users to aware that computer security plays a major role in protecting their data from loss, damage, and misuse. With the advancement of technology today, there are various online security systems or software could safeguard our data. However, there are also numerous of online threats that could attack our computer system, personal data and privacy anytime without our attention while we access the websites.


Some of the main online security threats that appear in the Internet are:
(1)Virus

Virus is a Malicious software that attaches itself to other software. For example, a patched software application. It’s a computer program that can replicate itself in some form and infect a computer without permission or knowledge of the user. Viruses can infect the boot portion of a secondary storage device and any type of file that can have a macro attached such as word processing and spreadsheet files. Besides that, virus also can easily spread by a user sending it over a network on the Internet or by carrying it on a removable medium such as floppy disk, CD, SB drive. For example, the May 2000 “I Love You” virus was a simple and small piece of code attached to e-mail which cause e-mail servers to overload and business to shut down email. It ever caused over $100million in US damages and over $1 billion in worldwide losses.
(2)Worm
Worm is a program that copies itself repeatedly. The repeatedly copied files would use up the available space and slow down a computer operating speed. It is a software application designed to propagate through a network rather than through a single computer. When your computer is infecting of worm, computer will slow starting or slow running. It will also face unexpected or frequent system failures.


(3)Trojan Horse
Trojan Horse is a software hidden in other software that is being distributed as a useful program. The Trojan horse may be a virus or a worm, or it may be surveillance software, such as a cookie, which communicates information back to a perpetrator. A Trojan horse will not execute unless the user runs the “covering” software in which it is hidden. Trojans will track into your computer and steal your personal information such as password of your e-banking account, email account and etc.


(4)Spyware

Spyware is any technology that aids in gathering information about a person or organization without their knowledge. On the Internet, spyware is programming that is put in someones computer to secretly gather information about the user and spread it to advertisers or other interested parties.




(5)Denial of service (DOS) attacks

Denial of service attacks is another form of malicious code, are carefully crafted and executed. Denial of Service Attacks is not new, yet they are growing in sophistication. Traditional DOS attacks usually involve one computer attacking another, but the use of multiple computers in a highly organized attack is becoming increasingly common. Such attacks, known as Distributed Denial of Service attacks (DDOS), were witnessed in a number of large corporate computer shutdowns in 2000.



Those online security threats will try to steal your information from your computer through the Internet. It is very danger if our computer online without any Internet security system such as anti-virus. Therefore, safeguards developed must be always up to date to enhance the defenses against online security threat. There are five golden rules that we can do to prevent Internet threats which consists of:

1. Make sure you have the latest security updates & patches
2. Install anti-virus software
3. Use personal firewalls
4. Read our password advice
5. Use an anti-spyware program

By following these rules you will greatly increase your PCs protection when you use the Internet generally.

References:
  1. James, B., & Shi, N. (2001). Essential Technologies for E-Commerce: Security Foundation. Pearson Education Asia Pte Ltd.
  2. Timothy Braithwaite. (2002). Securing E-Business System: security weakness in E-Business Infrastructure and “Best Practices” Security. New York: John Wiley & Sons, Inc.

















posted by Ivy_low at 0 Comments

Thursday, February 5, 2009

Phishing - Examples and Its Prevention Methods

A growing Internet scam that has caused many people in divulging their valuable confidential information has been given the name called “ Phishing ”. Generally, this type of scam simulates to be from a legitimate source such as financial institution, sending out phony emails to trick people into showing up confidential or personal information, e.g. credit card numbers, account usernames and passwords.

Phishing has typically been carried out not only in the form of email or instant messaging by directing users to a particular website, but also messages that claimed to be from a bank requiring users to dial a phone number regarding a problem with their bank account.

How does it work?

Normally, you will be asked to verify your account by an email specifying that verification is needed to be done. Once you clicking on the link in the email, you are asked to update or confirm your personal information. Information regarding to users is revealing to other party under this circumstances.

How does it look like?

Example of a Phishing e-mail message, including a deceptive URL address linking to a scam Web site.





Prevention Methods

1. Bypass the link of suspected phishing message
Users are encouraged to contact the company in order to check out legitimacy of the email if verification is needed once. Moreover, users may type in a trusted web address for the company’s website into the address bar of their browser so that linkage to unnecessary website could be avoided.

2. Advert to generic greeting
Most of the companies will address their valued customers by their username in emails or financial institutions (banks or credit card companies) will often include partial account numbers while delivering emails. Therefore, users should be aware if an email is addressing in a generic manner, it is likely to be an attempt at phishing.

3. Report to the relevant authorities

Users might report to MyCert or CyberSecurity at the right time to prevent the phishing message from spreading continuously.

~ References ~

posted by mei_huei at 0 Comments

How to safeguard our personal and financial data?



Computer and Internet are very common for us. We use both of them not only save our personal data and also use it for online financial services to do financial transactions. Even so, most of people will consider that internet is not a safety place for us nowadays. By reason of hackers can easily hack into our password and do any unauthorized transactions. Protecting ourselves from theft and hacker on the internet is very important to prevent our privacy information from exposure. Have you do some safeguard to protect your personal and financial data?





Here are some ways to secure your personal and financial data that I have found.



1. Critical element to avoid online fraud: Prevention is the most critical element. Here are three important preventions:
(i) Prevent simply to throw financial documents and paperwok with personal information.
(ii) Prevent to give out personal information on the phone, through mail, or over the Internet.
(iii) Prevent to ordering online and review reports, files through unsecure web pages.

2. Choose your PIN wisely: When you want to set PIN that you will remember, by the way you need to consider that the PIN is a clever hacker could not figure out. The combination of numbers and symbols may more security. We should avoid choosing our date of birth or IC numbers as our PIN.

3. Protect your computer’s security: Use as many tools as you can to guard your computer information from any intrusion and destruction. Tools that we can use are anti-virus software, spyware, firewalls and etc. If you have downloaded files, documents or free mp3 music online, you are at risk due to these programs have the ability to track our Internet usage habits and even steal such personal information. Protecting your computer’s security is the basic and much more important way.

4. Secure Your Network: If you have a wireless network at home or work, make sure that you secure it. Hacker can gain access to anything you do over an unsecured network in a matter of seconds. If you look at the documentation for your wireless router, you'll be able to find out how to lock your router and encrypt your information. It won't affect the way you use your wireless network, but it will keep intruders from getting a hold of your information.

5. Avoid hackers and thefts through E-mail: E-mail is not only one of the most popular and effective online tools, it can also be one of the most dangerous. Never read and respond for unsolicited E-mail, no matter how legitimate they appear to be. And never share your E-mail account password and forward an unsolicited E-mail.

6. Secure transmissions through Secure Socket Layer (SSL):We can use encryption technology to transmit information between sender and receiver. This protects data in 3 ways which are Authentication, Encryption and Data Integrity. Authentication ensures that our conversation is with the right party and prevents another computer from impersonating us. Encryption scrambles transferred data so it cannot be read by unauthorized parties. Data integrity verifies that the information we send is not altered during the transfer.


References….

posted by HoOI fEN^fAnny^ at 0 Comments

The application of 3rd party certification programme in Malaysia

A 3rd party Certificate Authority (CA) issues Digital Certificates which are used for identity verification and are used in a variety of scenarios, such as e-mail protection, secure websites and online shopping carts and more. For instance, when a customer is making a payment online, they are required to provide their credit card information and they will need to be assured that their confidential information is secure. Digital Certificate that are issued by trusted 3rd party CAs provide verification that your Website does indeed represent your company, thereby verifying your company's identity.



MSC Trustgate.com Sdn Bhd is a licensed Certification Authority (CA) operating within the Multimedia Super Corridor and it is licensed under the Digital Signature Act 1997 (DSA). MSC Trustgate was incorporated in 1999 to meet the increasing need for secure open network communications and become the catalyst for the growth of e-commerce, both locally and across the ASEAN region. Trustgate’s core business is to provide digital certification services, including digital certificates, cryptographic products, and software development.

MSC Trustgate provides businesses with various kinds of products and services. Some of the examples are SSL certificate, personal ID and My Kad ID.





References

http://www.petri.co.il/obtain_digital_certificate_from_a_3rd_party_ca.htm

http://www.msctrustgate.com/

http://fourlittlewitches.blogspot.com/2008/06/application-of-3rd-party-certification.html

posted by BerniceLau at 0 Comments