Tuesday, July 15, 2008

3rd Application of certification programme in Malaysia (week 4)

Third-party certification is a scientific process by which a product or service is reviewed by a reputable and unbiased third party to verify that a set of criteria, claims or standards are being met. Certification Authority (CA) is a trusted third party in a public key security system is responsible for vouchsafing the identity of users and issuing them with certificates that bind the public key to their identities.One of the certificate authorities in Malaysia is MSC Trustgate.com Sdn Bhd.


MSC Trustgate.com Sdn Bhd is a licensed certificate authorities in Malaysia which establish in 1999. Trustgate.com Sdn Bhd offer security solutions and leading trust services such as digital certification, digital signatures, encryption and decryption.




VeriSign is a Secure Sockets Layer (SSL) services provide by Trustgate.com Sdn Bhd. This is the standard security technology for establishing an encrypted link between a web server and a browser to ensure all information remains private and integral. SSL is used by websites in the protection of their online transactions with their customers. To be able to create an SSL connection a web server requires an SSL Certificate. All SSL Certificates are issued to either companies or legally accountable individuals.

Tuesday, July 8, 2008

Corporate Blogging:A new marketing communication tool for companies (week6)


A corporate blog is a blog published by or with the support of an organization to reach that organization's goals. Blog marketing requires to reach out beyond blog and to introduce it to the world. Creating a strategy with standard practices is an important first step towards introducing your blog to the online community.

In external communications the potential benefits include strengthened relationships with important target groups and the positioning of the publishing organization (or individuals within it) as industry experts.

Internally blogs are generally referred to as tools for collaboration and knowledge management.

Though blogging is more popular among online communities for communicating ideas and sharing knowledge, commercializing blogs has provided businesses a new medium for marketing. Generating profits using blogs has invited a lot of businesses to experiment with their online skills. The following are some major benefits of using blogs for marketing.

Converse with Prospective Customers

Conversing directly with customers helps build a reputation for the business. Answering customer queries in real-time can convert a prospect into a sale faster

Invite Traffic to a Website

No matter how good or how bad a website is, if it cannot generate substantial traffic, it's a failure. The more the traffic, the more product sales, ad clicks, leads, and profits.

Advertisement Income


A successful marketing blog can make money by selling its products or services, but a smart blog can earn additional revenues by offering advertisement space to companies offering products on specific areas

Donations

Blogs that offer free stuff on their website, for example, free articles, news, or other useful information, have the option of receiving donations. If the information on the blogs is extremely useful to someone, he/she may wish to oblige by donation

Friday, June 27, 2008

Review post on Legal from My E-commerce blog (week6)


Illegal downloading is a major issue for the creative industries such as music and movie maker industries. It is consider stealing their intellectual properties for the sake of personal pleasure. and taking for granted for every effort making this properties.To protect this industries from making more losses in the future. The UK government drafting a constituition to cut off the internet connection of illegal downloaders.


However, as a proverb said "it is easier to say than be done" .The implementation of such law as by the UK government may work in preventing internet users to download illegal intelletual property. Nevertheless, the cost is higher than the desire to implement the law. This is because having Internet Service Provider to monitor,inspect and filter every single packet passing across their network is like open every single envelope and reading its content in the post office.


Imagine if the packet have some sensitive data or private data. These data may have the leak out to the public. The will be confidentiality issue will come into question. This will lead insecurity of our data passing to the network. In addition, even if the law is implementing the Internet Service Provider may suffer a lot of losses due to poor networking services to their customer. Monitoring, inspecting and filtering every single packet consumes a lot of time and it will only lead ISPs customer service center to receive many complaints by the customers. ISP companies may have too use more sophisticated equipment and technology to be able to keep the customers satisfied with the service provided. This will then again lead more cost incurred then the benefit received by these ISPs.


Making these constituition is only "for a greater good" efforts. Even if this constituition is implemented successfully, it will only invited more unorthodox crackers to challege the ISP network system for the glory and self satisfaction of the crackers.

Application of prepaid cash card for consumer(week5)

What is a pre-paid cash card?
It is the card which requires you to load funds onto your card and use that money to make purchases and get cash — you are not borrowing moneyfrom a bank or other financial institution. The prepaid credit cards look, feel and work like a credit card but are pre-funded “stored-value” cards. It is easy convinient and flexible.
As a consumer, sometimes we would have facing problem of not having enough cash when we trying to buy somethingthat we like the most. And most of us will thought why don’t we bring a lot of cash so that we won’t be encountering such problem. This thought is unworkable as bringing a stack of cash is inconvenient and dangerous in the unsafe world that we are currently living in. In this situation, pre-paid card is the best tool in helping consumer to solve the above problem . Nevertheless, consumer would not face any overspending risk when using it as we can only spend the value contained in the card. A card that sure serves its purpose if we making budget planning for our expenses.




In addition, pre-paid cash card is faster and easier than using coins and bank notes; no more fumbling for that last little coin that you are certain that you saw in the bottom of your pocket.

In some foreign country like Singapore, they have applied a quite perfect pre-paid cash card system since few years ago. Hence, consumers in that country are not only using it when shopping but also using it for gas metering, car parking, car washing, arcade games, and vending machines.

How safe is our privacy data?(week4)


With the advancement of technology today, we normally save our personal or private data in our hard drive. The main reason we keep this data in our hard drive is for us to easily retrive our data anytime, and whereever we need to However, there are also numerous of online threats attack your computer system, personal data and privacy anytime without your attention while u access the websites.Malicious attacks are cyber attacks that can be further broken down into attacks caused by malicious code. The most common form of malicious code is computer virus. It’s a computer program can replicate itself and infect a computer without permission or knowledge of the user. The virus can easily spread by a user sending it over a network on the internet or by carrying it on a removable medium such as floppy disk, CD, USB drive. For example, the May 2000”I Love You” virus was a simple and small piece of code attached to e-mail which cause e-mail servers to overload and business to shut down email. It ever caused over $100milllion in US damages and over $1 billion in worldwide losses.


Spyware is any technology that aids in gathering information about a person or organization without their knowledge. On the Internet, spyware is programming that is put in someone's computer to secretly gather information about the user and relay it to advertisers or other interested parties.A Trojan horse is a destructive program that can cause serious damage by deleting files and destroying information on your system.


Trojans are also known to create a back door on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Trojans unlike virus or worms, they do not reproduce by infecting other files nor do they self-replicate

Nowadays, identity theft has become general. Identity theft is online fraud that unauthorized collection and use of personal information such as social security numbers, signature, name, address, phone number, credit card information, usually for criminal purposes. Internet provides a new way for people to steal your personal information.

Crackers using internet chat rooms and spreading Trojan horses that drop key loggers on your computer to transit any passwords, usernames and credit card numbers you use on your computer back to the crackers for example paypal password . Internet identity theft has made many people hesitant about making a purchase online or signing up for what others consider everyday occurrences such as creating PayPal account, purchasing from e-commerce sites, using internet banking and checking credit card statements online

Review on local e-commerce website(week6)




The local e-commerce website that is available in Malaysia is Maybank2u.com. Maybank2u.com is one-stop financial portal that promises a new, fast, convenient and safe banking environment. It attends to all customer banking needs, along with providing online services for insurance, stock trading, bill payment and e-procurement. Maybank2u.com is an instant online banking service that our valued customers can access from the desktop or laptop anytime, anywhere at your leisure and convenience.

All Internet users can access Maybank2u.com.The user can use the Online Financial services as long as the user has one of the following items:
a) Maybank ATM Card or Credit Card linked to your account
b) Maybank Credit Card with ATM facility
c) Maybank Account or Credit Card with Internet Banking facility

If the user is not a Maybank account holder, user can register as a Maybank2u.com PayBills user. Business customers can also enjoy the online services by applying for an Internet Banking facility at the main branch.

The website of maybank2u is attractive because the webpage design is colorful and has a lot of images which can fill the pleasure of the user. Apart from that, easy to navigate is one of the strength of maybank2u because the language it used is simple, clear and have multiple languages which can suit the user needs without facing any trouble. If the user does not know how to perform the banking transaction online, the website offers a feature called demo which demonstrate to the user how the process is being performed to ensure that the user is not done it wrongly. If the problem still persists, there is “Contact Us” tabs which guide the user to ask for further assistance from the receptionist of Maybank.

Prevention of e-auction fraud(week6)

E-auction website such as e-bay provides us chance and exciting experience to bid for the things we like onlines.We can do the biding easily and without going through all the hassle. But, in the mean times, its also cause issue such as e-auction fraud. So, we have to have some security knowledge when conducting an e-auction to prevent us from becoming an e-auction fraud victim.

Website like e-bay has provide lots of tips for the user when conducting a bid .There even has a tutorial in teaching the user to be security savvy when biding in an e-auction.
There are tutorial in teaching the user to understand the e-auction security and take notes when bidding online to prevent from becoming an e-auction fraud victim, such as :
Account Protection Tutorial
Reporting Phishing & Spoof
Deterring Identity Theft
Reporting Account Theft

Each of this tutorial provide a comprehensive understanding on the security measurement to be taken when biding online.This tutorial are useful for people that are first time in biding and also enhance the security knowledge on existing online bider.Beside that, some website such as e-bay also providing rules & policies to its user when biding, and also enforce rules and regulation to govern and control the e-auction process, hence provide a safe and sound e-auction to the internet bidder

Thursday, June 26, 2008

Mobile Payment(week5)

Mobile payment also calls as mobile web payment or WAP billing. Is the collection of money from a consumer via a mobile device such as their mobile phone, Smartphone, personal digital assistant (PDA). Under mobile payment there are two primary models, which is Premium SMS based transaction payments and Mobile web payment (WAP). Premium SMS based transaction payments is where the consumer sends a payment request via SMS text message to a shortcode and a premium charge is applied to their phone bill. The merchant involved is informed of the payment success and can then release the paid for the goods. Whereas, Mobile wed payment is where the consumer uses web pages displayed on their mobile phone to make a payment.

Nokia and visa have teamed up to provide credit card users in Malaysia a chance to buy items using mobile phone. Using visa’s wave reader, a system that deducts a payment from a credit card when an NFC (near- field communication) mobile is pressed against it, the companies will test out the service in Kuala Lumpur where 200 users will try the technology.
The principal behind this is that customer has the cost of their calls or messages added to their mobile phone bill at an agreed tariff. This process is commonly known as Premium Billing or Reverse Billing. Any value-adding service can be offered to customers on a premium rate SMS basis. SMS costs are capped to an agreed cost per SMS MT and revenue is shared between the network operator and advertiser.
Mobile payment services are developing fast in the Europe and recently in Malaysia. Mobile payment service is also an effective means of providing customers with admission or money off vouchers which can be unique coded or designed to allow viral spread.
MobileExec currently provides premium rate SMS messaging across the all major Malaysian carriers - Celcom, DiGi, Maxis and TMtouch. Such services are currently utilised by many mobile content providers to receive requests and send ring tone, logo and picture messages.
MobileExec has successfully completed numerous such projects for Malaysian clients and more happy to share the experience with you.

Apart from convenience, security and savings, Mobile Money has much more benefits to offer to the Mobile Money Members. MM offer you Mobile Money Corporate call plan. With this plan, can make phone calls at a flat low rate to anybody on any network, and also enjoy 45 hours of free talk time within the Mobile Money Corporate Call Plan Community.
With this program, we provide an avenue for merchants to advertise their new products /services and allow our members and our mobile consumers to purchase the vouchers at a discount, and instantly gets a e Voucher.









Tuesday, June 24, 2008

Electronic currency (week5)

Electronic currency or electronic money refers to money or scrip which is exchanged only electronically. Typically, this involves use of computer networks, the internet and digital stored value systems. Example of e-currency is e-micropayment which is the equivalent of paper currency and coins which enable secure and anonymous purchase of low priced products, Electronic Funds Transfer (EFT) and direct deposit.

With the use of electronic currency, one can be benefits by it. It provide the individual with lots of convenience, and it also increase the process of transactions to be more efficiency by having a lower transaction fees, No less than that , it also provide more business opportunities with the expansion of economic activities by using Internet.

Although, electronic currency provide lots of benefit, but there are many potential issues with the use of this digital cash. The transfer of digital currencies raises many issues such as how to levy taxes and the possible ease of money laundering. There are also potential macroeconomic effects such as exchange rate instabilities and shortage of money supplies (total amount of digital cash versus total amount of real cash available, basically the possibility that digital cash could exceed the real cash available). To prevent all this issue, proper cyberspace regulations or laws has to be addressable to regulate and monitor the transactions of electronic currency.

Monday, June 23, 2008

Causes and Prevention of Credit Card Debts(week5)

Credit card debts are resulted when a consumer of a credit card company purchases an item or service through the card system without paying off the debts by accumulating the debts. As a result, the penalties for not settling the payment as well as interest go up.

The main cause of credit card debts is people cannot reasonably measure how much he or she has spent. The reason is due to they cannot physically foresee the money is flowing out from their hands. They perceive that they are not paying the money from the moment and they will keep on buying. As a consequence, the money they spent will end up in credit card debts.

People pile up credit card debt by increasing their spending without considering their income for a host of good reasons. With the advancements in every walk of life in today's world, every piece of electronic equipment or a household item or a fashion update has an increase in cost making the average monthly expense go sky high. The salaries don't increase the sameway and people with less income purchase more on their credit account and get hold of credit card debt.
Gambling is America's new entertainment. Everyone likes to gamble with the money they have. How many come back home with a bag full of cash, very few. The guarantee in this game of chance is that you will be definitely paying to the house. Gambling loans are also available which lead to debt

The prevention of credit card debts is simple, just set up a Direct Debit for the minimum amount and pay off as much of the remaining balance as possible to keep the debt low.
Besides, the smart card user only uses the card in place of cash, or to obtain a purchase they can afford, if they can pay off the cost over time. In other words, the smart card holder only spends what they can afford.


The user should never ever hold more than eight cards at any one time, as this will adversely affect credit ratings. Clear any outstanding balances and cancel cards that are no longer used. Police advise shoppers to only carry one card at a time to reduce the risk should their card be stolen.


Develop a monthly spending plan. It is important to know where your money is going. Hundreds of dollars are spent on unnecessary things and when there isa need of purchasing a required commodity you just don't have any cash left and use a credit card frequently ending up in debt. In case of debt, debt management must be adopted.A monthly plan is no more difficult then writing down your income and expenses. You are in control of your money when you make thoughtful decisions about where and when to spend your money.

If debt is growing, there are four things card holders can do immediately:
1.Move debts to the lowest interest rate available. Remember, a card holder with a good credit rating can always ring and ask the credit card company for a lower rate at any time.
2.Prioritize paying off the most expensive debt first, so interest is kept to the minimum.
3.Assess their situation fully, work out their income and expenditure, and total their debts and assets.
4.Take this information to a professional body offering free debt advice.
5.If a card holder is having major difficulties making repayments, say after losing their job, their first port of call should be the credit card company. Companies would far rather help at this stage than when the situation has escalated. Card holders can discuss freezing the card and paying off the debt at an agreed amount each month, for example. Card companies are surprisingly willing to help in cases of genuine difficulty, but this will involve major budgeting and belt-tightening by the card holder. Then they should consult a professional.

There are plenty of debt consolidation firms offering to help, but do bear in mind these companies ultimately make money from a card holder’s debt. There are four main agencies that offer free, impartial advice for those in debt: the Citizen Advice Bureau, the Consumer Credit Counselling Service, National Debtline, and Payplan. These are non-profit making organizations that guide those in debt through the options available to them.

When debt has got out of control, the two major options are an individual voluntary arrangement (IVA), and bankruptcy. Never consider these without consulting the free debt agencies and/or a professional insolvency practitioner first. These are serious actions with wide-reaching consequences for future credit applications of any sort.

With the introduction of bankruptcy, the credit card companies are concerned regarding this issue where the consumer purchases as many things as possible without even considering the debts they accumulate by declaring bankruptcy. With the declaration of bankruptcy, the credit card companies are required to forgive all or much of the debt, unless such discharge of debt is successfully challenged by one or more creditors, or blocked by a bankruptcy judge on legal grounds irrespective of creditors' challenges. Due to the forgiveness of debts reduce the likelihood of making profit and continue its business, the credit companies are willing to offer another deal to the consumers which is in the border of bankruptcy. This deal consists of removal of past late fees and penalty charges, and re-aging the accounts so that the credit agencies see them as late accounts to enable clients to offset their debts.

The threat of online security: How safe is our data? (Week 4)


With the evolution of the Internet, e-commerce is very popular in the consumer behaviour. From the Internet, we can learn how to do the e-transaction and purchase from the net. Human tend to depend more on online convenience and along came another revolution of crime and security issue where some unethical users commit acts of crime on the World Wide Web. Every unprotected online computer can be affected with the viruses, malware, adware, hackers’ attacks and Trojans. There are several online security risks that can lead the users to serious monetary loss, information thievery and the attack on their computer.

The best way to overcome those problems is to use one of the many antivirus, antispyware, and firewall programs on the market; beside that also make that no anyone will ask for your password, account number, or other log-in information via e-mail or instant message. Beside this, to protect our data is safe we also can have an antivirus program to scan the entire computer for viruses. Even though most antivirus programs have an auto-protect feature that should, theoretically, prevent the insertion of a virus onto our computer, because it’s still a good idea to scan our computer periodically in the event the automatic protection feature missed something. Moreover, we can scan our computer once per week.

Furthermore, The solution for us how to protects our data for the online security, we need to uses the security issues to help us to protect our data, such as Authentication, Authorization, No repudiation, Confidentiality, Integrity, and Availability.

Thursday, June 19, 2008

How to safeguard our personal and financial data (Week 4)




The way to safeguard the personal information and financial data is to establish appropriate standards for the financial institutions subject to the jurisdiction relating to administrative, technical, and physical safeguards to insure the security and confidentiality of user records and information as well as take reasonable precautions to protect data in the system from any anticipated threats or hazards to the security of such records and to protect against unauthorized access to or use of such records or information which could result in substantial harm or inconvenience to the user.

If you do shop, bank or do anything else online that require the user to disclose personal information, make sure that your system is up to date with patches that you are running anti virus software and that you have a firewall turned on.


Check your banking and credit card statement for any unauthorized activity. Besides, notify your banking institution if you see anything suspicious.

Limit the download of execution software onto your personal computer because it might contain spyware or Trojan which will penetrate the computer security and access to the user personal information.

Disclose only the information that is absolutely necessary, and never give out your Social Security number.

Read watch and listen to the news everyday. There’s nary a day that goes by that some data loss or theft isn’t reported. You can never let your guard down when it comes to your personal information, but you need to be especially vigilant when you hear about vulnerability that hits close to home.

If your personal data has been put in jeopardy, contact the credit reporting agencies and put a fraud alert on your account

If your personal data and financial data is already been intrude by hacker, the user should contact the credit card companies, and let them know that the data is at risk. As a result, the bank or credit card companies will put a fraud alert on your account, or, if the user thinks there’s a good chance of your data being abused, close your old accounts and open new ones.


The user should never ever open suspicious emails from unknown people, especially the attachments however tempting it may be. It will be hazardous to your computer. Sometimes you may even get emails with attachments with subject saying "Thank you for your order and the credit card details". Most of them will be sending malicious viruses through those attachments which will destroy your computer data and information.

Apart from that, the most common way is to protect your computer with antivirus soft ware and update it regularly. With the updates, the anti virus can assist you in detecting the virus, Trojan and spyware which will notify to the user.

In order to safeguard the personal data and information, backing up of all your important files and store them in two sets of floppies. In case one floppy fails to open the other one would be of help.

There are more and more ways to help safeguard and improve the security from being loss of data and information. I just pick some of the ways form the internet. If you interested, you can go on the web to surf it. Hope it might be helpful to those who reading this post.^^

Tuesday, June 17, 2008

Phishing_Examples and its prevention method (week 4)

In this information technology era, internet has provided us lots of benefit. In the same times, it also being abused or misused by other to conduct unethical or criminal activities such hackering, phishing and others. Nowadays,the threat of phishing has become quite common and tends to increase overtime and it is a threat to the internet user. Certain measurement has be conducted to overcome this problem.

Phishing is a social engineering attack which is criminally acquire sensitive information of others by masquerading as a trustworthy entity in an electronic communication. Normally, the information being acquire are usernames, account number, passwords, mother maiden name and credit card details and else. In other words, it is a technique used to gain or fool the user to disclosure their personal information for the purpose of identity theft.

There is a lot of ways phishing can be carried out such as fake e-mail or instant messaging or phone call from the phisher. No less than that, phisher even willing to create a fake legitimate website to deceive the users to disclosure their personal details to them. Normally, the fake legitimate website being targeted are PayPal, ebay and other online bank.

To combat with this phishing, there is many ways can be done such as educate and train the user awareness on phishing, better policies and procedures by legitimate company on their website, and use of spam filters which can reduce the number of phishing e-mails that reach their addressees' inboxes. Beside that, nowadays, web browser such as Microsoft Internet Explorer 7 has been provide anti-phishing measurement to the web user.


Friday, June 13, 2008

How ebay become a successful auction e-commerce? (Week3)

The founder of ebay was a computer programmer Pierre Omidyar, who is a Frenceh-born Iranian. The very first item sold on eBay was a broken laser pointer for $14.83. Astonished, Omidyar contacted the winning bidder to ask if he understood that the laser pointer was broken.
In his responding email, the buyer explained: "I'm a collector of broken laser pointers." Chris Agarpao was hired as eBay's first employee and Jeffrey Skoll was hired as the first president of the company in early 1996. In November 1996, eBay entered into its first third-party licensing deal, with a company called Electronic Travel Auction to use SmartMarket Technology to sell plane tickets and other travel products. The company officially changed the name of its service from AuctionWeb to eBay in September 1997.
Originally, the site belonged to Echo Bay Technology Group, Omidyar's consulting firm. Omidyar had tried to register the domain name echobay.com (the domain has recently been put up for sale) but found it already taken by the Echo Bay Mines, a gold mining company, so he shortened it to his second choice, eBay.com. EBay went public on September 21[6], 1998, and both Omidyar and Skoll became instant billionaires.The company purchased PayPal on October 14, 2002.
The domain ebay.com attracted at least 902 million visitors annually by 2008 according to a Compete.com study. This was thrice the numbers of walmart.com.
Beside ebay, Amazon.com is a very successful example of e-commerce business because of several reasons. Basically, there are three strategies that have helped Amazon.com to enhance its competitive advantage, including cost-leadership, customer differentiation and focus strategies.Amazon.com strives to be Earth's most customer-centric company where people can find and discover virtually anything they want to buy online. By giving customers more of what they want which include low prices, vast selection, and convenience, Amazon.com continues to grow and evolve as a world-class e-commerce platform.

Tuesday, June 10, 2008

History and evolution of E-commerce (Week 3)


E-commerce are the activities that consists of the buying and selling of products or services through an electronic systems such as the Internet and other computer networks. The amount of trade conducted electronically has grown since the spread of the Internet. With the use of E-commerce, lots of activities can be carried out easily and this has benefited us a lot. The activities can be carried out are such as electronic funds transfer, Internet marketing, online transaction processing, electronic data interchange (EDI), customer relationship management (CRM)and else,

E-commerce has been changed and evolves over the last 30 years. Originally, electronic commerce are created for the facilitation of commercial transactions to be done electronically, using technology such as Electronic Data Interchange (EDI) and Electronic Funds Transfer (EFT). These were both introduced in the late 1970s, allowing businesses to send commercial document likes invoices and purchase order electronically. The rapid growth and use of credit cards, automated teller machines (ATM) and telephone banking in the 1980s were also forms of electronic commerce. In the late 1990s,Jeff Bezos launched Amazon.com ,the first e book retailer has born. Other companies such as Dell and Cisco began to aggressively use Internet for their commercial transactions. Furthermore, eBay was founded by computer programmer Pierre Omidyar as AuctionWeb and now it is the famous auction website ever in the world.

Identify and compare the revenue model for Google, Amazon.com and eBay (Week3)

There are total of 5 revenue models that available on the net which consists of sales, transaction fees, subscription fees, affiliate fees and advertisement fees.


mainly involves in advertising fees. The Google website is adopting the pay per click advertising program. The Google is charging the advertiser once the user click on the advertisement which will link to the advertiser’s website. This revenue model helps Google to generate more and more income as the year passing by. Besides, Google is using affiliates fees model to generate income too. It provides a highlighted web address or images that link to another website.

For Amazon book and music selling online business, it mainly depends on the volumes of selling the books and music. For current time, Amazon is no longer a book and music selling company. It has expanded its business by diversifying it through toy, health and beauty, sports and outdoors and others selling products. However, it also takes the opportunity of using advertisement fees as a passive income for advertisers to promote their advertisement to earn extra income to the company itself.

The primary income for this company is through transaction costs. When people post their items on
eBay, it charges the insertion fees for the auctioneer by giving a space for them to auction their items or products. If the products were sold, eBay will also charge the final fees for the product of being sold. In another term, it is similar to commission fees.

Why Webvan.com fails? (Week 3)


Webvan was an online "credit and delivery" grocery business that went bankrupt in 2001. The core business of the company was to delivered products to customers homes within a 30 minute window of the grocery products being choose by the customers. This web site provide the services in ten U.S. Market. San Francisco Bay Area, Dallas, San Diego, Los Angeles, Chicago, Seattle, Portland, Atlanta, Sacramento, and Orange County.


The main reason webvan falls bankruptcy was due to the investment made by the company on infrastucture was exceeded the sales growth. As a result,the company ran out of money.Webvan placed a $1 billion (USD) order with engineering company Bechtel to build its warehouses, bought a fleet of delivery trucks, purchased 30 Sun Microsystems Enterprise 4500 servers, dozens of Compaq ProLiant computers and several Cisco Systems model 7513 and 7507 routers, as well as more than 80 21-inch ViewSonic color monitors and at least 115 Herman Miller Aeron chairs (at over $800 each).


The bankruptcy of this e-commerce website resulted, all non-perishable food was donated to local food banks. The company's legacy consists of thousands of colored plastic shipping bins for groceries that are still sitting in customers' basements and closets, and a lucrative severance package for ex-CEO Shaheen.
Written and edit by: Chok Yik Siong

Thursday, June 5, 2008

Introduction Chok Yik Siong (Week 2)

My name is Chok Yik Siong. I come from Kedah. My hobby during free time is playing soccer, playing badminton, bowling and spend time with friends. The top 5 websites i surfing the most are
Each website has their very own features. The purpose for surfing all those search engine website is to get the information that is relevant to my course work. Web Search Engine provide me an easy way to get information and helps me in my completing my research and coursework. Beside that, Facebook and Friendster provide me good network to stay connected with friends, ex classmate , old buddy and else. Furthermore, i use hotmail to check for my mail to look for any in coming message from my friend and sent reply to them .Internet provide lots of convenience to us, i normally use internet to surf net and to acquire new knowledge or information which is useful to my work. Moreover, i also use to be chatting with friends online, playing online games, download freeware and sometimes may use internet to book ticket for cinema shows. Internets has changing our living style and helps us as to become more intellectual human being.

Wednesday, June 4, 2008

Introduction_Cha Hua Fu (Week 2)

My name is Cha Hua Fu. I come from Selangor. I am 21, and an ordinary fellow. My hobby during free time is playing soccer, playing badminton, bowling and spend time with friends. The top 5 websites i surfing the most is Yahoo,Friendster,Hotmail,Facebook,Google. Each website has their very own features. The purpose for surfing all those search engine website is to get the information that is relevant to my course work. Web Search Engine provide me an easy way to get information and helps me a lots in my coursework. Beside that, Facebook and Friendster provide a good network to stay connected with friends, ex classmate , old buddy and else. Furthermore, i use hotmail to check up any mail being send to me and use it to send mail to others, this will help us in staying connected to the latest information send by my friends. Internet provide lots of convenience to us, i normally use internet to surf net and to acquire new knowledge or information which is useful to my work. Moreover, i also use to be chatting with friends online, playing online games, download freeware and sometimes may use internet to book ticket for cinema shows. Internets provides us lots of conveniences and assists us and make our life easy.

Tuesday, June 3, 2008

Introduction-Chin Chi Yung (Week 2)

My name is Chin Chi Yung. I was born in 24 March 1987. I am 21 years old age now. Currently, I’m staying in Seri Kembangan. My hobby is nothing much. It is just like the ordinary teenagers who always surfing the net and playing online games. I can say internet is part of my life. Without it, I can hardly imagine how boring the life is. For my favorite sport, I would say is badminton. The reason is due to it is easy to play and can communicate with my family well. Since, it is also my father favorite sport.
For the top 5 internet website I visit the most is Yahoo, Youtube, Crunchyroll, Google and Gamefaq. Yahoo I visit the most is because I can get many information for my studies and research as well as news around the world and it acts as a search engine. Youtube and Crunchyroll allow me to watch video online. Besides, it also enables me to discuss and post comment in the forum regarding certain issue and topics. For Gamefaq website, I visit quite frequently also. It is because I play many online and Playstation games. If I encounter any problem which I do not know how to pass or solve, this website can help you pass it easily. Apart from that, it also provides hints and strategy guide for you to pass the stage easily.
The top 5 internet activities for me is playing multiplayer online games and yahoo games such as diner dash and pools where it can make friends and excitement throughout the games. Besides, i also checking mails and chatting with my friends and secondary classmates through MSN to keep in touch. I also watching video online as i mentioned in the website just now and browsing some popular news from the net to keep myself update.

Introduction - Ooh Chin Ping (Week 2)


I am Ooh Chin Ping from Pulau Pinang, a beautiful island. I am currenly study in University Tunku Abdul Rahman. I am taking accounting course because i like account and i like to deal with numbers. I finished my diploma in accounting in Ktar.

My hobbies is play badminton and watch football. I will play badminton with my friends when i am free. Besides this, i also very like to watch football. I will sacrify my sleeping time to watch football at the midnight.

The 5 websites that i visit everyday are http://www.hotmail.com/ http://www.friendster.com/, http://www.livescore.com/ http://www.google.com/ and http://www.klse.com.my/. Hotmail is a usefull website for me because i can receive some interest news from my friends and it is free of charge. Friendster is another website that is important for me. This is because i use it to connect with my friends and it let me know their recent live style. I get to know many of my friends through friendster. The next website is live score website. I am very interested in football and i will watch every football match that i interested in. But, when the football match is crash with my study time or during exam period, i will use live score to know the result. Google helps me a lot when i do my assignment. As we know, it is a useful search engine. I get many information from there. I also like to visit KLSE website everyday because my family members are all invest in the share market. Furthermore, i also very interested in the economy issue and its relation with the share market.