Tuesday, July 15, 2008

3rd Application of certification programme in Malaysia (week 4)

Third-party certification is a scientific process by which a product or service is reviewed by a reputable and unbiased third party to verify that a set of criteria, claims or standards are being met. Certification Authority (CA) is a trusted third party in a public key security system is responsible for vouchsafing the identity of users and issuing them with certificates that bind the public key to their identities.One of the certificate authorities in Malaysia is MSC Trustgate.com Sdn Bhd.


MSC Trustgate.com Sdn Bhd is a licensed certificate authorities in Malaysia which establish in 1999. Trustgate.com Sdn Bhd offer security solutions and leading trust services such as digital certification, digital signatures, encryption and decryption.




VeriSign is a Secure Sockets Layer (SSL) services provide by Trustgate.com Sdn Bhd. This is the standard security technology for establishing an encrypted link between a web server and a browser to ensure all information remains private and integral. SSL is used by websites in the protection of their online transactions with their customers. To be able to create an SSL connection a web server requires an SSL Certificate. All SSL Certificates are issued to either companies or legally accountable individuals.

Tuesday, July 8, 2008

Corporate Blogging:A new marketing communication tool for companies (week6)


A corporate blog is a blog published by or with the support of an organization to reach that organization's goals. Blog marketing requires to reach out beyond blog and to introduce it to the world. Creating a strategy with standard practices is an important first step towards introducing your blog to the online community.

In external communications the potential benefits include strengthened relationships with important target groups and the positioning of the publishing organization (or individuals within it) as industry experts.

Internally blogs are generally referred to as tools for collaboration and knowledge management.

Though blogging is more popular among online communities for communicating ideas and sharing knowledge, commercializing blogs has provided businesses a new medium for marketing. Generating profits using blogs has invited a lot of businesses to experiment with their online skills. The following are some major benefits of using blogs for marketing.

Converse with Prospective Customers

Conversing directly with customers helps build a reputation for the business. Answering customer queries in real-time can convert a prospect into a sale faster

Invite Traffic to a Website

No matter how good or how bad a website is, if it cannot generate substantial traffic, it's a failure. The more the traffic, the more product sales, ad clicks, leads, and profits.

Advertisement Income


A successful marketing blog can make money by selling its products or services, but a smart blog can earn additional revenues by offering advertisement space to companies offering products on specific areas

Donations

Blogs that offer free stuff on their website, for example, free articles, news, or other useful information, have the option of receiving donations. If the information on the blogs is extremely useful to someone, he/she may wish to oblige by donation

Friday, June 27, 2008

Review post on Legal from My E-commerce blog (week6)


Illegal downloading is a major issue for the creative industries such as music and movie maker industries. It is consider stealing their intellectual properties for the sake of personal pleasure. and taking for granted for every effort making this properties.To protect this industries from making more losses in the future. The UK government drafting a constituition to cut off the internet connection of illegal downloaders.


However, as a proverb said "it is easier to say than be done" .The implementation of such law as by the UK government may work in preventing internet users to download illegal intelletual property. Nevertheless, the cost is higher than the desire to implement the law. This is because having Internet Service Provider to monitor,inspect and filter every single packet passing across their network is like open every single envelope and reading its content in the post office.


Imagine if the packet have some sensitive data or private data. These data may have the leak out to the public. The will be confidentiality issue will come into question. This will lead insecurity of our data passing to the network. In addition, even if the law is implementing the Internet Service Provider may suffer a lot of losses due to poor networking services to their customer. Monitoring, inspecting and filtering every single packet consumes a lot of time and it will only lead ISPs customer service center to receive many complaints by the customers. ISP companies may have too use more sophisticated equipment and technology to be able to keep the customers satisfied with the service provided. This will then again lead more cost incurred then the benefit received by these ISPs.


Making these constituition is only "for a greater good" efforts. Even if this constituition is implemented successfully, it will only invited more unorthodox crackers to challege the ISP network system for the glory and self satisfaction of the crackers.

Application of prepaid cash card for consumer(week5)

What is a pre-paid cash card?
It is the card which requires you to load funds onto your card and use that money to make purchases and get cash — you are not borrowing moneyfrom a bank or other financial institution. The prepaid credit cards look, feel and work like a credit card but are pre-funded “stored-value” cards. It is easy convinient and flexible.
As a consumer, sometimes we would have facing problem of not having enough cash when we trying to buy somethingthat we like the most. And most of us will thought why don’t we bring a lot of cash so that we won’t be encountering such problem. This thought is unworkable as bringing a stack of cash is inconvenient and dangerous in the unsafe world that we are currently living in. In this situation, pre-paid card is the best tool in helping consumer to solve the above problem . Nevertheless, consumer would not face any overspending risk when using it as we can only spend the value contained in the card. A card that sure serves its purpose if we making budget planning for our expenses.




In addition, pre-paid cash card is faster and easier than using coins and bank notes; no more fumbling for that last little coin that you are certain that you saw in the bottom of your pocket.

In some foreign country like Singapore, they have applied a quite perfect pre-paid cash card system since few years ago. Hence, consumers in that country are not only using it when shopping but also using it for gas metering, car parking, car washing, arcade games, and vending machines.

How safe is our privacy data?(week4)


With the advancement of technology today, we normally save our personal or private data in our hard drive. The main reason we keep this data in our hard drive is for us to easily retrive our data anytime, and whereever we need to However, there are also numerous of online threats attack your computer system, personal data and privacy anytime without your attention while u access the websites.Malicious attacks are cyber attacks that can be further broken down into attacks caused by malicious code. The most common form of malicious code is computer virus. It’s a computer program can replicate itself and infect a computer without permission or knowledge of the user. The virus can easily spread by a user sending it over a network on the internet or by carrying it on a removable medium such as floppy disk, CD, USB drive. For example, the May 2000”I Love You” virus was a simple and small piece of code attached to e-mail which cause e-mail servers to overload and business to shut down email. It ever caused over $100milllion in US damages and over $1 billion in worldwide losses.


Spyware is any technology that aids in gathering information about a person or organization without their knowledge. On the Internet, spyware is programming that is put in someone's computer to secretly gather information about the user and relay it to advertisers or other interested parties.A Trojan horse is a destructive program that can cause serious damage by deleting files and destroying information on your system.


Trojans are also known to create a back door on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Trojans unlike virus or worms, they do not reproduce by infecting other files nor do they self-replicate

Nowadays, identity theft has become general. Identity theft is online fraud that unauthorized collection and use of personal information such as social security numbers, signature, name, address, phone number, credit card information, usually for criminal purposes. Internet provides a new way for people to steal your personal information.

Crackers using internet chat rooms and spreading Trojan horses that drop key loggers on your computer to transit any passwords, usernames and credit card numbers you use on your computer back to the crackers for example paypal password . Internet identity theft has made many people hesitant about making a purchase online or signing up for what others consider everyday occurrences such as creating PayPal account, purchasing from e-commerce sites, using internet banking and checking credit card statements online

Review on local e-commerce website(week6)




The local e-commerce website that is available in Malaysia is Maybank2u.com. Maybank2u.com is one-stop financial portal that promises a new, fast, convenient and safe banking environment. It attends to all customer banking needs, along with providing online services for insurance, stock trading, bill payment and e-procurement. Maybank2u.com is an instant online banking service that our valued customers can access from the desktop or laptop anytime, anywhere at your leisure and convenience.

All Internet users can access Maybank2u.com.The user can use the Online Financial services as long as the user has one of the following items:
a) Maybank ATM Card or Credit Card linked to your account
b) Maybank Credit Card with ATM facility
c) Maybank Account or Credit Card with Internet Banking facility

If the user is not a Maybank account holder, user can register as a Maybank2u.com PayBills user. Business customers can also enjoy the online services by applying for an Internet Banking facility at the main branch.

The website of maybank2u is attractive because the webpage design is colorful and has a lot of images which can fill the pleasure of the user. Apart from that, easy to navigate is one of the strength of maybank2u because the language it used is simple, clear and have multiple languages which can suit the user needs without facing any trouble. If the user does not know how to perform the banking transaction online, the website offers a feature called demo which demonstrate to the user how the process is being performed to ensure that the user is not done it wrongly. If the problem still persists, there is “Contact Us” tabs which guide the user to ask for further assistance from the receptionist of Maybank.

Prevention of e-auction fraud(week6)

E-auction website such as e-bay provides us chance and exciting experience to bid for the things we like onlines.We can do the biding easily and without going through all the hassle. But, in the mean times, its also cause issue such as e-auction fraud. So, we have to have some security knowledge when conducting an e-auction to prevent us from becoming an e-auction fraud victim.

Website like e-bay has provide lots of tips for the user when conducting a bid .There even has a tutorial in teaching the user to be security savvy when biding in an e-auction.
There are tutorial in teaching the user to understand the e-auction security and take notes when bidding online to prevent from becoming an e-auction fraud victim, such as :
Account Protection Tutorial
Reporting Phishing & Spoof
Deterring Identity Theft
Reporting Account Theft

Each of this tutorial provide a comprehensive understanding on the security measurement to be taken when biding online.This tutorial are useful for people that are first time in biding and also enhance the security knowledge on existing online bider.Beside that, some website such as e-bay also providing rules & policies to its user when biding, and also enforce rules and regulation to govern and control the e-auction process, hence provide a safe and sound e-auction to the internet bidder