Sunday, July 27, 2008
Revenue Model for Google, Amazon and Ebay
E-bay earned transaction fees from each successful transaction made by the bidders or seller in an auction. It has built a streamlined and globalized person-to-person trading community on the Internet through World Wide Web. This facilitates easy exploration for buyers and allows the seller to immediately list those items for sale. Sellers and buyers are brought together in a manner where sellers are allowed to list items for sale and buyers can bid on the items interested. In the meanwhile, all eBay users can browse through the listed items in a fully automated way. Sellers are charged with two kinds of charges. First charge is charged on an item that are being listed on eBay which is called as nonrefundable Insertion fee which ranges between 30 cents and $3.30, depending on the seller’s opening bid on the item. . A fee is charged for additional listing options to promote the item, such as highlighted or bold listing. Secondly, a fee is charged at the end of the seller’s auction which ranges between 1.25% and 5% of the final sale price.
Amazon.com is an American electronic commerce company in Seattle, Washington. It is one of the first major companies involved in selling of goods by Internet. It was started as an online bookstore but later was diversified to product lines of DVDs, VCDs, computer software, video games, furniture, food and etc. In 2001, Amazon.com has launched the Honor System that allowed customers to make donations or buy digital content. With that, Amazon has collected 2.9% of the payment plus a flat free of $0.30 USD. For example, after 2004 earthquake and tsunami in the Indonesia Ocean, Amazon has set up an online donation channel to the American Red Cross, waiving its processing fee. Besides, Amazon has also launched an online storage service called Amazon Simple Storage Service. The service charges monthly fees for data stored and data transferred. Using Amazon technology, Webstore, allows businesses to create e-commerce websites. Merchants can customize their websites using their own photos and even branding. Sellers have to pay a commission of 7% to Amazon.com, which includes credit card processing fees and fraud protection fee; subscription fee of $59.95 per month for an unlimited numbers of Webstores and listings. Moreover, Amazon has launched Associates affiliate programme which run like this way: associate drive internet traffic to Amazon.com through links that allows user to track sales and other activity. Then, associates can earn up to 10% in referral fees on all qualifying revenue made via their links.
Wednesday, July 9, 2008
Thing to take note to Prevent E-Auction Fraud when a Consumer Participating in an E-Auction
Auction is market mechanism by which buyers make bids and sellers place offers. The most democratic type of auctions is an electronic auction which means auctions carry on online.
Now, purchaser and marketer alike gain from the great chances that online auctions provide. It call e-auction. Nevertheless, the speedy increment of online commerce presents new chances and new dispute for both traditional retailers.
These are some significant notes that users should take notes when enter into an e-auction process. First of all, there are the User identity verification where eBay uses the service of Equifax to verify user personal identities. Verified eBay user, a voluntary platform, encourages users to supply eBay with datas for online confirmation. By providing their Social Security number, date of birth and driver’s license number, users can qualify for the highest level of confirmation on eBay.
- check the reputation of the e-auction web sites and their policies to protect their own customers and also customer's personal datas
- know the buyers or sellers- If possible, deal with the buyers/ sellers in person.
- If there is any question on the identity of the buyers/sellers, don't make payment or ship out the goods.
- Get the details of the sellers/buyers before making payment or sending out the goods.
- Always check for the feedback forum to read the comments that left by previous buyers on the seller or particular website.
The Application of Pre-paid Cash Card for Consumers
- Toll fare: Touch'n Go can be used in entire highways stretches in Malaysia with the familiar TnG sign marked when reach a toll plaza
- Public Transportation fares: Touch'n Go can be use as an integrated ticket in Kuala Lumpur public transport system. There are Rapid KL, KTM Komuter, and KL Monorail.
- Ticketless car parks: Touch'n Go card can also be used in selected car parks such as Sg Wang Plaza, 1 Utama shopping center, Sunway Pyramid shopping center and etc.
After we have the Touch'n Go systems, the system can process up to 800 vehicles per hour in a toll plaza. These can save a lot of energy and save a lot of time. This is very convenient for the consumers which they feel inconvenience to prepare for exact change when they are driving or wait for the teller to give back the small change.
Lastly, the Touch'n Go card brings a lot of benefits to us which makes our life become more convenient.
Sunday, July 6, 2008
Corporate Blogging: A New Marketing Communication Tool For Companies
A New Marketing Communication Tool For Companies
A corporate web log is published and used by an organization to reach its organizational goals. Blogging has caused quite a buzz. From political activists to aspiring novelists, industry pros and avid hobbyists, everyone seems to be starting a blog. Recent articles in Business Week and Forbes demonstrate how even the mainstream media is taking notice of their unprecedented growth and increasing effect on our society.
Companies that employ a well thought out blogging strategy encourage the strongest community goodwill, and that goodwill, in turn, promotes significant marketing and sales gains. It is said that success breeds success. This holds very true for successful blogs. There is chain reaction that begins with a real desire on the part of the blogger to provide value and connect with their audience. The blogger shares useful and engaging content —the latest information, help, discussion topics and ideas. The way the audience responds to that content is key. When customers start commenting, posting or tracking back to a blogging community, it can have a viral effect —spreading out across the blogosphere.
Besides that, companies that harness their customers’ knowledge and ideas find better ways to satisfy their needs and wants, thus facilitating goodwill in the community. For example, it is a common practice in blogging to provide a link back to a thought originator, which is valuable because backlinks are a way that search engines distinguish the order of the editorial rankings. Higher search engine rankings translate into significantly higher web site traffic and more sales leads. Thus, successful blogging breeds success in other marketing and sales initiatives.
On the other hand, leaders can communicate directly with customers, suppliers and investors, as well as employees, helping disseminate and explain strategy. Employees and customers can share their ideas freely in an honest voice brings the blogging companies new connections and generate trust which will lead to business opportunities galore. People are far more likely to give great feedback if they know someone specific is listening. The power of these feedback loops can generate big benefits.
A company can use a blog to learn how to improve or develop new products by communicating more effectively with their customers through the use of corporate blogs. Any company should encourage customer ideas, reward them and learn from their customer’s example. If they do, they will build more successful products which also have ready customers who want to adopt new ideas and products because they have participated in the process of product development. Such a strategy will also have additional Internet marketing benefits in the form of more backlinks and higher search engine rankings, as well as direct traffic from links on many different websites.
Finally, corporate blogging really give many advantages to a company and it is a new marketing communication tool. So, corporate blogging should be implemented in all companies.
E-Government in Malaysia: Its implementation so far and citizen’s adoption strategies
Implementation and Citizen’s Adoption Strategies
The implementation of e-Government in Malaysia heralds the beginning of a journey of reinventing the government by transforming the way it operates, modernising and enhancing its service delivery. E-Government seeks to enhance the convenience, accessibility and quality of interactions with the public and businesses at large. Simultaneously, it will improve information flow and processes within the government, improve the speed and quality of policy development, and improve coordination and enforcement. This would enable the government to be more responsive to the needs of its citizens. (The Multimedia Super Corridor).
E-government is one of the seven flagship applications introduced in MSC. The objectives of these flagship applications are to jump start and accelerate the growth of MSC, to enhance national competitiveness; to creation of high value jobs and export growth, to help reduce digital divide, and to make MSC a regional hub and test bed. Under the e-government flagship, seven main projects were identified to be the core of the e-government applications. The e-Government projects are Electronic Procurement (eP), Project Monitoring System (PMS), Electronic Services Delivery (eServices), Human Resource Management Information System (HRMIS), Generic Office Environment (GOE), E-Syariah and Electronic Labour Exchange (ELX).
Nowadays, not many Malaysian use the E-government service. This is because many of them do not trust the services that are provided by the government. There are many problems occur when they use the e-government. They can’t get their licenses in a short period and others. Besides that, many of the citizens do not how to use the e-government, especially those whose ages are above 50.
Malaysia should organize campaigns and road shows to encourage all the citizens to use e-government. They should show all the advantages that the citizens can get by using e-government. On the other hand, government should overcome the problems that are occurred while using e-government. The system should be improved. So the citizens would not face difficulties using it.
Friday, July 4, 2008
Review A Local E-Commerce Site : JustSimpleDesign.com
At the main page, like the normal web designer did. 3 frames which 1 is at the top, 2 at the bottom but the right portion is wider than the left. As usual, on top of the frame put the company name together with its hyperlink which bring the users directly to the destination they wanted to surf. Left frame of the web page gives the company featured solutions, so that the client can be easily aware of what features are the company provides. Client login at the main page to convenient the client so login right away when they enter main page. Confidence from clients is the best return, that is why the featured client are in the main page as well. The purpose mostly is for the new comers to experience how is the company outcome looks like. The client might know the style of the company whenever they remember one of the featured client's portfolio. Sometimes it does gives good impression to the client from previous client web page. For example, whenever a new client ever checks out of mynews.com web page, the new client is indirectly introduced to JustSimpleDesign.com. Lastly, Live Support is provided in the web page on-line. Status has been giving out too to let the client know whether the support is still in the status of online. So that billing, sales and technical support can
The bottom right portion which is the main body posted up important message that most of the client will aware of. That is why the company brief introduction is posted up at that spot just to attract the client to read. Besides, Domain Name quick search is provided for those client who is interested to host their own domain and the following is the portion where they sells their features. Training or workshop that they conduct or host also will be posted at their webpage. Although the webpage looks simple but it sends a lot of informations to the clients.
Quicklinks also can be seen on top of the main page. Most of the links can be found in the main page features too. Among the all the quicklinks, clients and solutions can be considered the most important because the solutions are the products that the company going to sell to the customer and the clients link is about the supports that the clients to the company. Project portfolio is added to increase the confidence of the client.
This e-commerce webpage does not enquiry the clients to make payment over the web. The company requires the clients to provide details and personal particulars so that the company will contact the client for further information. The best part of this is the company does not need to bare more cost. Besides direct communication with the clients will get more familiar with the clients so that will cut down the gap in between plus the company will also get the requirement onto clients solutions more clearly.
Last but not least, the web page also provide FAQ (Frequently Ask Question) to answer guests' doubts. FAQ is the most common features that most of the company will provide.
Monday, June 30, 2008
Mobile Payment Systems in Malaysia: Its Potentials and Consumers’ Adoption Strategies
Its Potentials and Consumers' Adoption Strategies
Mobile payments are payments made using mobile handsets and other devices, either to directly purchase or to authorize payment for goods and services. Such devices are playing an increasing and evolving role in the wider development of electronic payment systems around Asia Pacific.
The uses of mobile payment system are money transfers person-to-person (C2C) and to businesses (C2B), buying ring tones, concert tickets, taxi and parking payments, credit card/checking transfers, delivery/mobile business payments, music (content), gift cards.
Easy payment translates to larger sales and a greater instance of impulse purchasing. We all know that if you make the purchasing process easy and remove any thought of how much you are spending then the tendency is to spend more. Credit cards have been a boon to impulse spending. This has been a real plus for merchants as it has enabled the public to have a quick, easy, efficient and cashless way to make purchases. The move from cashless to cardless is the next logical step in payment evolution. The rise of the cell phone as a key piece of personal technology will continue to grow; its use as a payment device seems an inescapable and inevitable extension to its utility.
The payment industry and mobile phone manufacturers are looking to use near field communication (NFC) as the base technology. NFC technology is an extension of RFID that combines a smart card interface and reader into a single device. NFC in mobile phones is likely next in line in the evolution for mainstream payment systems. Long term, all phones will have a NFC chip built into the phone.
Maxis Communications Berhad is currently trialling a mobile phone multi-payment service incorporating credit card and prepaid transit payments with Maybank, Visa International and Touch ‘n Go. Maxis "Touch to Pay" employs Near Field Communications (“NFC”) technology which leverages on a short-range wireless connectivity standard embedded in mobile phones.
Maxis also plans to offer a special user interface that offers an array of functionalities which will allow customers payment details, credit balance and recent transactions on the mobile phone screen at any point in time. Upon successful completion of the ‘touch to pay’ trial and commercial roll out next year, Maxis also plans to expand the NFC application in the area of “service discovery”, which will enable mobile phones to read “smart posters” implanted with Radio Frequency Identification (“RFID”) Tag. This will open up a new information channel for customers to gain access to bus routes and timetables, special offers and coupons at selected retail outlets.
Friday, June 27, 2008
Electronic Currency : PayLoadz
The way PayLoadz works is like this. When the buyer click on the product they like on the internet. After that a window will prompt out asking for the user's PayPal or Google Checkout Username and Password. If they do not have an account, they will be given the opportunity to create one or to check out without creating an account using a credit card or bank account as their funding source.After the payment process successfully made, the PayPal or Google Checkout server communicates with the PayLoadz server and provides the transaction details to the system. After that, an email which contains custom “thank you” text that the users specify during the product creation process, and a link for users to download their product. Or they are redirected to the download page, immediately after payment, that provides them instant access to the purchase. After the whole process is done, the users will receive a notification of payment through the mail.
By using PayLoadz, users can enjoy:
- Access to international markets
- the differences between physical trades and trading via internet is, the products can be exhibited to the world at one time. It means that the products can be introduced through the internet whenever the internet users drop by or found the item that the seller is posted and at the same time, there can be a lot of users around the world are viewing the items posted.
- Quick and easy implementation
- by using the Electronic Currency, the trades can be easily done. In this case, if using PayLoadz is used. Just need to register the PayLoadz account and PayPal or Google Checkout to guarantee the transactions.
Wednesday, June 25, 2008
Credit Card Debts: Causes and Prevention
Sunday, June 22, 2008
Phishing: Examples and Its Prevention Methods
Phishing
Examples and Its Prevention Methods
Phishing is a scam in which the attacker sends an email purporting to be from a valid financial or eCommerce provider. Identity thieves and other criminals often use "phishing" scams, one of the fastest growing internet crimes, to steal personal information from a vast number of people. Phishing attacks use 'spoofed' e-mails and fraudulent websites designed to fool recipients into divulging personal financial data such as credit card numbers, account usernames and passwords, social security numbers.
The following are examples of what a phishing scam e-mail message might look like:
How to Prevent ?
There are some ways to help us to prevent phishing scam. Firstly, never click on the links in email messages. It can be extremely difficult to identify which are legitimate and which are spoofed. Go directly to the website of your financial institution and log in as usual. If there is a need to update some information, you will be informed when you log in.
Secondly, review credit card and bank account statements as soon as you receive them to check for unauthorized charges. If our credit cards are being used by other people, we will see the amount in the bank statement.
Thirdly, we should always be skeptical. Most legitimate companies do not send requests to update our information. Those that make these requests are finding that most people are suspicious and ignore the request.
Fourthly, use anti-virus software and a firewall, and keep them up to date. Besides that, don’t email personal or financial information. This is because; other people can hack our email and take information from there.
Finally, in order to avoid this e-mail to ever land in your inbox you need to use a phishing filter. One of the most common ones at the moment is the Bayesian Filter that allows you to blacklist or white list certain individuals. It also easily integrates to popular email clients such as MS outlook.
Friday, June 20, 2008
How to Safeguard Our Personal and Financial Data?
Nowadays, there are many ways that other people can obtain our personal information and financial data. For example, some syndicates steal wallets that contain our identification and steal our mail, including our bank and credit card statements. From that, they can know our personal and financial data. Then they will create a new credit card or identification card by using our data.
There are several ways that we can safeguard our personal and financial data. Firstly, we should memorize our passwords. Don’t record our password on papers and carry it in the wallets. We also should not use our date of birth as our password. This is because other people can know our password for our atm card if we use our date of birth as password.
Secondly, we should never give our personal or financial information over the phone or Internet unless we initiated the contact. We also should not download files that were sent to us by strangers or click on hyperlinks from people whom we don’t know. It is dangerous to do that because other people have the chance to hack into our computer after we download some files. Besides that, we should use a firewall program on our computer, especially if we leave our computers connected to the Internet 24 hours a day.
Thirdly, we should report lost or stolen credit cards immediately. This step is to prevent our cards being used by other people. Besides that, we should always check our monthly credit card and bank statements for unusual activity. Once we find out something unusual then we need report to the bank.
Finally, we need to protect our personal information. We only share credit card or other personal information when we are buying from a company that we know and trust. We need to know who we are dealing with. We should not do business with any company that won’t provide its name, street address and telephone number.
Thursday, June 19, 2008
The application of 3rd party certification programme in Malaysia.
- One Time Password (OTP)
- Public Key Infrastructure (PKI)
- Subscriber Identity Module (SIM) Technology-Based Authentication
or
Normally, VeriSign logo or signature can be easily seen in a log in page especially when the user login and password is needed to deal with sensitive matters. VeriSign uses digital certificates can also add value when Tivoli Access Manager encrypts customer information and transactional data and by enabling digital signatures to further secure monetary exchanges. Because the combined solution provides a multitiered program of transaction security—from authentication to access and encryption to digital signatures—end users are more likely to do business via online.
In Malaysia, E-Commerce has become more common these days in the business industries. Data confidentiality and integrity are one of the main concerns for an organization to give assurance and confidence to the end users. To ensure data confidentiality and integrity, all information transmitted over the Internet is encrypted using the 128-bit Secure Sockets Layer (SSL) protocol from VeriSign Certificate Authority. SSL is a secure way of transferring information between two computers on the Internet using encryption. Strong end to end encryption is also adopted within the bank's computer networks and resources.
The appliance of VeriSign has become broader, the growth of websites which applies this internet security service also become larger. The service is familiar to the end user whenever comes to money matters, they will enquire for the certificate for the assurance. Locally, maybank2u.com and www2.pbebank.com are among the bank websites that apply the service because of its e-banking which deals millions of transactions daily.
Below is the image of VeriSign's certification for Public Bank:
Wednesday, June 18, 2008
The Threat of Online Security: How Safe is our Data?
Many simply just do NOT understand the risks online. Over the last 24 months tens of thousands of computers around the world have been compromised and turned into a "zombie" computer that can be controlled by a remote user - and the PC owner does NOT even suspect a thing!
When a "remote user" (a criminal) wishes to launch an attack on a website, spread a new piece of spyware that steals personal data, send out spam e-mail and etc. They will use thousands of these "zombie" PC's as a group of computers, sometimes referred to as a "botnet", to achieve their task.
Always use Internet Explorer 7 or FireFox 2.0. Use anti-spyware like SpySweeper or Spyware Doctor (AVOID the free software as the stakes are now to high to rely on them, except Microsoft Windows Defender as they DO have the resources behind this product.)Use AntiVirus programs like McAffee AntiVirus. On at least a weekly basis update anti-virus and spyware products. Switch on the Windows firewall. Make sure updates to your operating system are installed. Make sure you are running XP Service Pack 2. Consider an all-in-one package like OneCare or McAfee Internet Security Suite. Take time to educate yourself and family about the risks. Always use passwords that contain numbers & letters and make them at least 8 to 12 characters long. Do NOT use familiar words such as a name in the password as these can easily be cracked. Monitor your computer and stay alert to threats. Remember the days of installing free software to protect you are long gone.
Friday, June 13, 2008
An Example of an E-Commerce Failure and its Causes
Furnituresite.com was launched in 1998 by Steve Rothschild. A year after the site was launched; the company replaced Rothschild with Andrew Brooks as CEO and soon after changed its name to Furniture.com. The company had lost $46.5 million in the year it filled the IPO. Although Furniture.com had many customers, it still struggled to make a decent profit. It became apparent that the company was in trouble when it lay off 30 of its 230 employees in April 2000.
There were some reasons that caused furniture.com to failure in the market. Firstly, furniture needs high shipping cost because furniture is usually large and heavy. Since Furniture.com was an online store, shipping was very important because it was part of every sale. Most of the items Furniture.com sold were too heavy “to send by the U.S. postal service, Federal Express, or United Postal Service,” so it were forced to use more expensive specialty delivery services. There were some stories of shipping costing more than the purchase price, which is very bad for business. Furniture.com was not able to find a remedy to the high shipping costs and suffered greatly because of it.
Secondly, Furniture.com also struggled with its information systems. It struggled to “track, ship, and charge” properly on the goods it sold. Many shipments were shipped without charging the proper price for them, to the wrong place, or not sent at all. It was most common for shipments to be delivered late; this was a big problem for customers with deadlines, such as holidays and other special occasions. In the last few months of the company’s existence, the Better Business Bureau received over 70 complaints about Furniture.com, mostly over shipping errors.
Finally, the product, furniture, was not the ideal type of product for the Internet. Many consumers just weren’t ready to buy furniture over the Web. Furniture is a fairly expensive purchase, and most customers want to make sure they make the right decision. Consumers, put a big emphasis on the comfort of furniture. A major downside to shopping on Furniture.com was that the consumer lacked the ability to touch and feel cushions and fabrics first hand. People were not comfortable choosing furniture solely based on pictures, and those who did were forced to gamble on what the actual product would be like.
An Example of an E-Commerce Success and its Causes
Dell.com sells more computer systems throughout the world than any other computer company. Over the last four quarters, Dell.com has totaled “$57.9 billion in revenues". Dell.com also introduces the latest relevant technology much more quickly than companies with slow-moving, indirect distribution channels, turning over inventory in just five days on average”. For over twenty years, Dell.com has experienced great success inB2C e-commerce.
Discuss how E-Commerce can reduce cycle time, improve employees’ empowerment and facilitate customer support.
Facilitate Customer Support E-Commerce facilitates customer support by providing a wide range of technological solutions and communication opportunity. Maintaining electronic bulletin will enable customers to report fault immediately. E-Commerce creates an easier way for customer to purchases goods and services in a more interactive way. On line site are more attractive compared to the traditional store. Customers have direct access to product information, new product updates, and promotions by visiting online stores.
Jordan Kuah First Blog
My name is Kuah Chia Nien, can call me Jordan as well. I am 21 years old and now staying at Bandar Damai Perdana, Cheras. I am studying at Universiti Tunku Abdul Rahman, Bandar Sungai Long, which the course I am taking is Bachelor of Business Administration (Hons) Entrepreneurship in year 3 semester 1. I was born on the land below the wind where the place is Kota Kinabalu, Sabah.
I always visit http://www.friendster.com/ for meeting my net's friends and also my university's friends. I also make friend with a lot of foreigners' friends. Friendster also can help me to keep in touch with my old friends and also help me to contact back my friends that long time didn't meet which studied together in primary and secondary schools. Other than that, I always use http://www.hotmail.com/ to access e-mail inbox. Hotmail is a web site which provides e-mail service to internet users. I start using it since I was 12 years old. It is very user friendly. Other that, I always check for soccer news from http://www.soccernet.com/. I can get the latest news about my favourite clubs from that web site. This web site is useful because the news is up-to-date and can't get it from local news paper. I'm also always check for football latest results from http://www.livescore.com/ because it provides the on the spot results and complete details for the particular matches. This web site consist almost whole world of football's results. Lastly, one of the top web site I always visit are http://www.youtube.com/. This web site has a lot of videos are very interesting and useful.
Thursday, June 12, 2008
Tio Yee Lin I Am
I usually log on www.google.com and www.yahoo.com . Both serve as competent search engine and enable the users to search for information, providing free e-mails services and etc. I usually read and send e-mails via these two sites. I can access to various information from the web sites from all around the world with just a click on the mouse. These two are the necessary websites that I would visit for school work as well as finding extra information.
Other than that, wikipedia.org is another pathway to obtain information from various fields. It is an “E-Encyclopedia” contributed and written by volunteers from all over the world. It shows many relevant pictures and diagrams that made me understand better.
www.thestar.com.my is a local newspaper provider. It enables to read instant and latest news. The most importantly, by reading newspaper online, we can reduce the usage of paper and it is environmental friendly!
dictionary.cambridge.org. The online dictionary is convenient, easy to access and the best of all, it is free of charge. It helps a lot when I come a cross words that I do not understand .The content of the dictionary is complete and the explanation is comprehensive .There are barely any words that could not be found here.
The site I visited the most is www.friendster.com. It is a site that enables the user to discover new friends via Internet social network and maintain profiles, music, photos and etc. I am able to communicate and keep in touch with friends which are located at different place.
My TOP FIVE INTERNET ACTIVITIES are reading e-newspapers, sending and receiving e-mails, browse and search for information, chat instantly with friends and family members.
I am Ng Yeik Feiy
My hobbies are playing badminton and reading. Me and my friends play badminton once a week. We book a badminton court in Balakong every Thursday. We can relax ourselves when playing badminton. This can help us to pay more attention in the lecture and tutorial classes. Besides that, I also read books during my free time. I like horror and thriller novels.
The five websites that I visited the most are www.yahoo.com, www.google.com, www.sinchew.com.my, www.nanyang.com.my and www.tribalwars.net . I use Yahoo and Google websites to search information. Sometimes, I need to use the search engine to search some information for my assignments. On the other hands, I read the latest news from Sinchew and Nanyang websites. These two websites provide me the latest news in Malaysia and the other countries. The last website is for me to play online game. It is a strategy game and is good for teenagers.