Sunday, February 22, 2009

Review a local e-commerce website

Review a local e-commerce website
www.kok5kok.com
k0k5k0k Idea Fashion Store.







Recently, I have discovered that there has a web-store that selling a lot of unique and special designed tee at low price.

The main objective of k0k5k0k store is to provide the best quality, best price, and best customer service to their beloved customer. They believe that “ideas make perfect”. With their unique designed, they aim to become one of the famous fashion brand in the fashion market.

The e-commerce model of this website is B2C. B2C is the business that sells products or services to end-user consumers.

Creative idea tees, custom-made shoes and custom-made small shirts are the major products of k0k5k0k store. Moreover, all of the products that sell in k0k5k0k store are designed by his in-house designer. All tee-shirts that selling in the store are just RM25! With their unique design products, k0k5k0k store has become better known and popular in teenager’s fashion market.

The structure of this website is simple and easy to surf around. With simple html coding and navigation bar, surfers can access all information with few clicks. Besides, the web is providing high bandwidths that allow surfers surf in high-speed.

However, there are some limitations of the website. For example, the website does not provide e-payment method, such as credit card payment and Paypal. Furthermore, the security of the website has not been verified by any trusted parties.

Besides,the founder of this website is ME, k0k5k0k. ^^

From the domain registration, server-hosting, webpage design and tee-shirts design, mostly all works were done by the founder, k0k5k0k. The website was created on 1 Nov 2008. Initially, I just feel interested in creating a website with special domain, which is my name, k0k5k0k. After that, I feel that it is a great opportunity of making money in e-commerce field. So, I just make up my mind and try my best in designing all those tee-shirts and sell it out.

Lastly, although the website is still got a lot more to improve, the designs of the shirts are not that good, but I promise that I will never give up continuing to enhancing the website and design quality.
Furthemore, thanks you for supporting me, http://www.kok5kok.com/ k0k5k0k Idea Fashion Store.

Here are some of the products :


Saturday, February 21, 2009

Things to take note to prevent e-auction fraud

- Understand as much as you can about how the internet auctions work, what your obligation are as a buyer, and what the seller’s obligations are before you bid.

- Watch out for “Advance-fee demand” – you need to look carefully at any seller of goods or services who wants you to send checks or money orders immediately to a post office box, before you receive the goods or services.

- Find out what actions the websites takes if a problem occurs and consider insuring the transaction and shipment.

- Do not simply disclose your personal data – if you see e-mail messages from someone you do not know that ask you for personal data for examples, credit card number, account number, or password, do not just send the data without knowing more about who is asking.

- Review the feedback rating for the seller, and use common sense; if the seller has a history of negative feedback, then the participants do not bid with the particular seller.

- Must ask the seller when delivery can be expected if not specified in the listing, and about warranty, exchange or return of merchandise you find unsatisfactory.

- To avoid unexpected cost, you must read the information in the listing about shipping and handling fees carefully. If not specified, you may want to clarify before you start bidding.

E-Government in Malaysia: Its implementation so far and citizen’s adoption strategies

My mom always grumbles a lot towards the end of April... It's the time of the year when the tax return forms have to be submitted... My mom HATES it to the core.. I always hear her moot on how troublesome it is to send it by post and to deliver it personally. But now all of that could be done online through the government website http://www.hasil.org.my/english/eng_index.asp (my mom never grumbles in April anymore).

Well online tax filing brings me to the focus of today's post - E-Government.

E-Government is a tool used by the government to efficiently support the public. It is used to disseminate information and to increase the convenience, accessibility and quality of communication and interaction with the respective parties (it's true as my mom don't complain about tax filing anymore). I used the term respective parties because E-Government is not for the public (citizens) alone, but also for three other parties namely, the business community, other counties' government and the government employees.

E-Government was sparked by the Multimedia Super Corridor (MSC) project in 1996 where E-Government is one of the seven flagships under this project; and under the E-Government flagship are seven projects said to be the core of E-Government.




The seven projects are as follows:
  • Electronic Services Delivery (E-Services)
  • Generic Office Environment (GOE)
  • Electronic Procument (EP)
  • Human Resource Management Information System (HRMIS)
  • Project Monitoring System (PMS)
  • Electronic Labor Exchange (ELX)
  • E-Syariah
The application of E-Government stems from the seven project stated above. Some further application of E-Government are
  • myGovernment - the official government website that disseminates the most up-to-date information released by the government
  • e-Compalaint, Ministry of Works Malaysia - the site to lodge any complaints on the projects carried out by the Ministry of Works
  • eKL - the government tool to improve the service delivery system of government agencies in Klang Valley
  • MySMS - the government official SMS portal that enables the public to obtain government services through one SMS number 15888
Apart from the implementation of E-Government, the governemtns needs to have strategies to halp the users or potiential users feel more comfortable when using E-Government. As such the government needs to beef up the security of this system. Malaysians are very sceptical in regards to online transaction (hack.. my neighbours thinks its a sham) so the government needs to convince the users that the websites are safe and their computers won't blow up when they use them.

The reliability of this system needs improvement as well. The government related websites tend to be down (inoperative) sometimes and i feel that this should not happen as it represents the government. It will give the government a very bad impresion of inefficiency and unreliability.

The awareness of the existance of E-Government must be spread as only a handfull of people knows about it. Many do not know that they can do their tax filing online or pay their summons online. This information could be spread through the media (television especially as TV1, TV2 and TV3 are owned by the government).




Related Links

A review on a post on e-tailing from My E-Commerce blog.

A review on a post on e-tailing from My E-Commerce blog
(http://ecommerze.blogspot.com/search/label/e-Tailing)

Opentable.com

Opentable.com, a website that provides restaurant management system for restaurateurs, is also known as ERB (Electronic Reservation Book). It is so unique that, in Malaysia, we can’t find any similar websites that is operating with this kind of model.

After I’ve been to the website, I have some ideas on the means and way to run a website, similar to opentable.com but I will be providing more functions to the surfers and restaurateurs.
I will make a website that not only contains the reservation function, but also the e-order and payment function.

Getting a good and special domain name together with a great slogan is an important beginning. Then, coming up with a well-designed layout which provides easy navigation and the provision of a highly securable system to surfers and restaurateurs will make the website more attractive and impressive.

Besides, I will design a system that works as below:

Firstly, potential customers can to make reservation through the website for their desired restaurant.

Next, customers can view the brief overview of the restaurant, restaurant’s menu, and special courses for the day, or any promotion or event available during the time.

After customers have made up their mind, they can select the time and date to dine in.
After that, we also allow customers to choose the location of their seat; for example, smoking or non-smoking area.

Moreover, customer can order their dishes and drinks with a few clicks, and leave some important message to the restaurant.

Lastly, customer can settle their bills online with a credit card.

The whole process can be done in a very easy and convenient way. Compare to Opentable.com, this website is containing more functions, such as e-payment.

(If I really successfully open this website, I will treat Sir/Miss to dine in ^^)


Thursday, February 19, 2009

Corporate Blogging: A new marketing communication tool for companies.

A corporate weblog is published and used by an organization to reach its organizational goals. The advantage of blogs is that posts and comments are easy to reach and follow due to centralized hosting and generally structured conversation threads. Currently, all major browsers (including Firefox, Opera, Safari and Internet Explorer 7) support RSS technology, which enables readers to easily read recent posts without actually visiting the blog, which is very useful for low-volume blogs.

In order to maintain a competitive edge, corporations are increasingly looking for opportunities to make them remain competitive in the market. Therefore, they started implementing corporate blog for their company. For instance airasia.com, trumphuniversity.com and google.com have their company blog to serve as a platform for discussion between company staff, users, customers and management.

Why is Blogging Crucial to Corporations?
What is the first image your mind conjures up when a brand is mentioned? Is it the logo, the jingle on the advertisement or the experience you previously had with the brand? Blogging allows current and potential consumers to associate the brand with a face and a personality. It reduce the distant gap that has existed between the company and the consumer. In addition, the blog is a representation of the company’s values, beliefs, philosophy and direction. Besides, blogging allows companies to communicate with customers in a more personal and direct way. Lastly, it has the power to position employees as thought-leaders in their industry, to assist in reputation management during crises; to build brand awareness and loyalty; and to increase brand visibility, traffic and links.

13 Steps to Create a Corporate Blog
1. Determine if blogging is a good fit for your company
2. Determine if your company is willing to invest in a blog
3. Create a strategy
4. Ensure that everyone is on the same page
5. Determine the Involvement of PR
6. Select Bloggers
7. Train the Bloggers
8. Writing Posts
9. Realize that the Blog doesn’t need a tone
10. Editing
11. Establish a Comment Policy
12. Develop a Promotion Strategy
13. Establish a Measurement program

Sunday, February 15, 2009

Mobile Payment Systems in Malaysia : Its Potentials and Consumers' Adoption Strategies

I went back to my hometown last weekend by train. I usually took the 1.30 train in the afternoon but last week i had to take the 8.15 night train. This happened because the 1.30 train tickets were all sold out. So i wasted my whole afternoon loitering around KL missing a great dinner back at home. Yeah i was angry but what could i have done... nothing i thought, until i got on the train and took my seat. I saw the most interesting thing for that entire day - I CAN PURCHASE THE TRAIN TICKETS USING MY MOBILE PHONE (so now all of you know where this story of mine was leading to). This is something i haven't heard of at least until that day.

Purchasing train tickets is not the only transaction which could be made through a mobile phone. Bill payments, music and game purchases, phone credit top-up, movie ticket purchases and even payment for pizzas and fries could be made. So where do all the money come from? The funds come from your credit card, debit card, current account and from your phone credit.

Stating all these, i can see that mobile payment systems have a huge potential in Malaysia. I state this because 9 out of 10 Malaysian citizen have at least one hand set (some have 2 or 3; 1 for business use, 1 for the family and the last for the mistress). The model and type of hand set is not an issue as the system is applicable on all mobile phone models.

Now a days, more Malaysians are addicted to online shopping. This is a very good sign for mobile payment companies as more and more people would be aware that payments could be made through their mobile phone. Teenagers especially would welcome the mobile payment system due to not having a credit or debit card.

, Digi, and the new addition to the family U-mobile are the service providers of hand phone lines. Having a perfectly competitive environment would stimulate the market for mobile payment systems because the users will benefit from all the marketing strategies (price slashes, promotion rewards, etc.). People will pay through their mobile phones more often as the competition amongst service providers will make the system convenient and rewarding.



Having potential alone won't make mobile payment systems boom, consumers' adoption strategies must be implemented as well. the first strategy is to make known this system and technology to the public. Not many are aware of the functions of mobile payment systems. I dare say this because.... i had no idea that the train ticket could be purchase through my mobile phone and when i told my neighbors that some bills could be paid through SMS, they scolded me and said it was a sham (haha.. that's how unknown it is).

The next step is to gain the users and potential users trust by beefing up the security and reliability. There have been complains that that payment has been made but the games and songs ordered were not delivered.


RELATED LINKS

Thursday, February 12, 2009

The application of prepaid cash card for consumers

Today, prepaid card are becoming mainstream products for consumers in Asia. It was only three years ago that the volume of global Visa prepaid retail sales and cash transactions first surpassed those made using credit cards. Prepaid products are about delivering greater convenience and relevance for consumers.

Consumers in Australia, India and Thailand were the top three prepaid markets in the Asia Pacific last year for transaction volume, accounting for more than 62 percent of the total prepaid retail sales and cash transactions. Below are few examples of prepaid cards:

1. Touch-n-Go


Touch ‘n Go (TNG) card is a multipurpose prepaid card which can be used in public transportation around Selangor and all highway in Malaysia. With the high demand of TNG, applications of Touch-n-Go now are expended towards the retail purchases such as fast food industry and parking fees. Adding on, TNG facilities is placed at both the KL International Airport (KLIA) and Low-Cost Carrier Terminal (LCCT) since February this year. With this facilities available, consumer finds it more convenient in making transactions without taking out much of petty cash in hand.

2. Ezlink


Ezlink is one of the most prominent prepaid card in Singapore. It covers a very wide usage and can be used in different sector service including food & beverage, convenience shops, gaming, government service, health, shopping & retail, tertiary institutions, schools, private bus service and so on. With ezlink ,consumer will not have trouble having too much cash in their wallets.

3. Octopus


Octopus is one of the most successful " prepaid card" system. It is started from a transit payment system, and it has become a widely used electronic cash system. In Hong Kong, most of the people are using Octopus prepaid card in different services including public transportation services, apparel stores, bakeries, car parks, cinemas, convenience stores, fast food chains, household stores, leisure facilities, personal care stores, photo finishing stores, photocopiers, supermarkets, and vending machines. From year 2006, it had expanded its business to ShenZhen and Macau.

4. Oyster Card


Oyster card is known as " Pay as you go" cards. It is used mainly on London transport services. Starting from 2007, Oyster card also can be used to purchase goods and services. The advantage of this prepaid card over paper ticket is Oyster single fares are generally cheaper. Moreover, its credit can be used as you need it and doesn't expire and lastly, having "daily price capping" which will automatically calculate the cheapest fare for all the journeys you make in a single day.

In conclusion, with the advancement of prepaid cards, consumer can enjoy the convenience that it brings. In other words, prepaid cards makes people's lives easier.

Tuesday, February 10, 2009

Credit Card Debts: Causes & Prevention

Credit card debt is an example of unsecured consumer debt, accessed through ISO 7810 plastic credit cards.

Debt results when a client of a credit card company purchases an item or service through the card system. Debt accumulates and increases via interest and penalties when the consumer does not pay the company for the money he or she has spent.

Causes

1) Less Income, More Expenses
It happens that the main wage earner of the household loses his job but monthly expenses are not cut down in line with the reduction in income. This obviously leads to a rise in debt. The family is forced to use their credit cards for groceries, utilities, etc.

2) Saving little or not at all
You should save for at least 4-6 months of living expenses in case an unfortunate tragedy happens. For example, if you lose your job on January 1st, you shall have enough money to maintain your current lifestyle till July 1st of that year. Until July 1st, you can find yourself new employment or open your own business.

3) Poor Money Management
Poor money management is one of the best reasons why so many families accumulate lots of debt. Not having a monthly spending plan and not keeping track of your monthly bills makes you unaware of where your money is going. You might be spending hundreds of dollars every month towards items that are useless and have no value in your life, yet you do not realize it.

Prevention

1) Stop accruing more debt
The more you continue to spend, the longer it will take for you to pay it off. Reduce your spending. If you have high interest credit cards, transfer the balance to ones with a lower Annual Percentage Rate (APR). By the way your debt won’t increase while as you’re paying it off.

2) Make a budget and stick to it
It’s easy to overspend when you don’t have a budget. Calculate how much you have to spend and stick to that limit. Write down all of your expenses so you know where your money is going.

3) Change your spending philosophy
Are you only buying the things you really need? Those impulse purchases may feel good at the moment, but in the long run, they will only get you further into debt. If you’re going to get out of debt, you will need to change your whole attitude to spending.

A review on “Internet Security – IMPACT – To fight cyber terrorism”





Nowadays, cyber security threats have been a global major issue. From the cyber war of Estonia, we can clearly know that cyber security threats can even jeopardize a country security and economic prosperity. A country critical infrastructure is highly depending on Information Technology System for crucial operations.

However, there is no one owns the Internet, cyber security preparedness and awareness are the duty and responsibility of all Internet users.

With the implementation of IMPACT, we should be proud of being a Malaysian. IMPACT is the world’s first international public-private sector collaborative institution against cyber terrorism. The aim of the IMPACT is to bring governments and international private sectors together to deal with the increasing security threats in cyberspace. The IMPACT will also build an electronic collaborative platform in order to link all member countries. It enables experts to collaborate with one another.

Besides, IMPACT also collaborates with ITU in aiming at building synergies to provide:
1) Real-time analysis, aggregation and dissemination of global cyber threats information
2) Early warning system and emergency response to global cyber threats
3) Training and skills development on the technical, legal and policy aspects of cybersecurity.

The implementation of IMPACT - such a great non profit organization is encouraging and most welcomed. Keep it on, Malaysia BOLEH!!!





Outside the book

But, in fact did IMPACT play their roles well? Let me share somethings that is interesting ^^

Malaysia's Kaspersky Website HACKED!

(click to enlarge the photo)












Website : Kaspersky Lab: Antivirus software
URL :
http://www.kaspersky.com.my/

NOTE: Kaspersky is one of the private company involved in IMPACT.





Quote of the Post

Quoted from IMPACT – A cyber-attack can be launched from anywhere in the world. The more connected you are, the more vulnerable you would be. CYBER-TERRORISM IS REAL. JOIN THE FORCES OF IMPACT.


References

http://www.impact-alliance.org/
http://ecommerze.blogspot.com/search/label/Internet%20Security
http://www.security.org.my/index.php?/archives/Making-an-IMPACT-on-Cyber-terrorism.html

Monday, February 9, 2009

How to Safeguard Our Personal and Financial Data

The emergence of the internet and e-commerce has brought many benefits to the users such as online shopping, online banking, online trading. Almost every financial transaction could be made online. However, despite all the benefits, this advancement also brings about bane. Identity thefts occur more,financial data and even personal data are leaked, malicious programs and viruses destroy information and many more uncountable troubles. No matter what we do these troubles could not be totally eliminated; but by following the few steps and tips below, the chances of all these troubles finding you is very much lower.

Password

A password is the most fundamental protection you must apply. But what's there to it. You've been using a password all along but still your data and information have been stolen. Our question is have you been using a password the correct way?

"WHAT?? THERE'S A RIGHT OR WRONG WAY TO USE A PASSWORD???"


This is the question that might me playing in your mind now and it's answer is definitely a big YES!! For starters passwords should be something you can recall but not something so obvious like your birth date or name. It's also wise to have both alpha and numeric in your password; for example, "88cosmo88" (this is a password that we came up with on the spot so don't try to sign into our MSN using this password). Having different passwords for different accounts is also a good idea as a lost password will not lead to a loss of everything. To top things up, do not, we repeat DO NOT carry your passwords around be in on paper or in your hand phone. It'll be a big problem if you lose them.

Trusted Websites
Besides having a strong password, the websites you visit also plays a very crucial role in safeguarding your data. You should only access trusted websites. For the girls, do your online shopping through renown online traders such as Amazon.com or Walmart. For the boys, no matter how curious you are please refrain yourself from going to any websites that would corrupt your computer as well as your mind. All payments should also be made through trusted websites such as Public Bank (www.pbebank.com), Maybank (www.maybank2u.com)or Paypal (www.paypal.com).

AntiViruses


Another thing that your computer must have is an AntiVirus. As the post before mentioned, there are many viruses waiting to strike at your computer. Once infected there might be a lost of data stored in your computer or even end up frying your computer's hardware. So in order to avoid that from happening, it would be wise to install an AntiVirus. here's the list of the top 10 AntiVirus in year 2009 (http://anti-virus-software-review.toptenreviews.com/).



Spam
We are sure many of you have actually heard of this term, thus we'll not be elaborating on it. NEVER EVER respond to spam. We mean it never respond to spam as it is one of the phishing methods (refer to our earlier post on phishing to learn more). Some spams bring with them malicious software such as Trojan Horses and many more viruses that will cripple your computer and retrieve your information. SO NEVER EVER RESPOND TO SPAM.


The Rule of Thumb in Public Places

There are things that you should and should not do when accessing your private accounts or data on public computers. If possible don't, as you stand a risk of losing your data or finances. But if you have no choice then follow our instructions. Always look around before typing in your ID and password. You don't know when someone just happen to see you happily punching in your password and plans to steal them, so be alert. You should also make it a habit to clear all browsing history and saved passwords before logging off as you might have saved your password on the computer.

Well if you follow the step and tips that we have mentioned, we are certain that most probably, no most definitely, no MOST ABSOLUTELY all the troubles won't stumble on you.

The Threat of Online Security: How Safe Is Our Data

The threat of Internet fraud is quite real and we need to be aware of scams such as “phishing" and “pharming” where a virus or malicious program can be downloaded to your computer with the intention of stealing your personal information – from credit card information, user ID and password to online banking accounts.

There are some tips that will minimise your risk of being a victim.

TIPS TO PROTECT YOURSELF ONLINE

Watch out for suspicious e-mail or pop-up links
NEVER click on a URL link in e-mail or fill out forms in e-mail requesting you to confirm or update personal information, even if it threatens dire consequences if you don’t reply.Even if the e-mail seems to be from a genuine web site or someone you know, call first to check or type the web URL to log on to the site yourself (not from the e-mail). Also, never send your personal information to anyone by e-mail.

Protect your computer with anti-virus, spam filters and firewalls
Update your Operating System and Internet Browser regularly to ensure that you are protected. Use anti-virus software and, if possible, personal firewalls. Ensure your anti-virus software is up to date with the latest signatures.

Scan your PC for viruses and update your browser regularly
Take some time to visit any popular anti-virus web site to scan your PC. This will alert you to any virus or malicious programs in your computer. You can often download the latest security and critical patches from these sites too.

Be cautious about clicking on pop-ups and free stuff
Beware of downloading free programs and web content offering to increase the speed of your computer, free gifts, get rich quick schemes, etc.If you share your computer with others, ensure they do not visit such sites and unknowingly download malicious content.

Be selfish about sharing your password
Online fraud frequently occurs when someone has compromised the security of their password through sharing. Do not share your password with family, relatives, friends or anyone, however harmless and convenient it may seem at the time. Your password is the key that opens the lock to your personal information and should be guarded as safely as your car keys.

Finally, always clear your cache each time you logout after an Internet session. This is very important if others have access to your computer or you use a computer in public places such as Internet cafes.

Just take these steps to enhance the way you protect your personal information and ensure your Internet experience is enjoyable.

Sunday, February 8, 2009

Phishing; Examples and prevention methods

Phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.



Below are two examples of phishing email from ebay which serve different functions.



This genuine looking email is a masquerade. As soon as you clicked on “respond”, you were directed to an exact clone of eBay and your personal information was stolen. These messages come in different styles and writings.







This whole email was actually an image which referred you to a scam website if you clicked anywhere on it. Your mouse cursor changed to a “hand”, if you have this set as default when you point over a link.



Despite all these phishing examples, there are also ways to prevent getting scammed.

The first step to avoid being phished is to not trust emails sent to us that requests personal information especially financial information. Normally, phishers will include upsetting or exciting statements in order to trigger our fear or happiness so that we will react immediately after receiving the email. They may falsely claim suspicious withdrawals from your bank account by telling us we are the winner of a lottery. Therefore, to avoid being phished, we must never give out our account information to other parties before checking and reporting the incident with the bank or actual company that have sent you the email.



Secondly, we must ensure the website we are using to submit our credit card or other sensitive information is secure. To ensure the website is an encrypted secured website, we must check the beginning of the web address in the browser address bar is showing “https://” rather than just “http://”. Other than that, a small chain will also show in your browser if a secured website is used. However, we must be aware that phishers can get us to enter their own website and create a “secure link” for us to provide all the information they need. They can also spoof the windows explorer to show exactly what they want by putting a window on top of the other, covering the real URL.



Another way to avoid being phished is also by regularly logging into your online accounts. Having a healthy control over your accounts is normal good conduct. It is important that we should regularly check our bank, credit and debit cards to ensure that all transactions are legitimate. If anything suspicious is observed, we should contact our bank and all card issuers as soon as possible. The Microsoft Internet Explorer browser has several security holes exploited by phishing attacks. We can download the security patches at the Microsoft Security home page, http://www.microsoft.com/security/ .



Lastly, we can always lend a helping hand to stop phishing by reporting “phishing attacks” or either “spoofed” e-mails to several groups. First of all, we can forward the email to reportphishing@antiphishing.com or either to the Federal Trade Commission at spam@uce.gov. Other than that, we can also forward the email to the “abuse” email address at the company that is being spoofed, for example, spoof@ebay.com”. When forwarding spoofed messages, we must always include the entire original email with its original header information intact. Another option is to notify the Internet Fraud Complaint Centre of the FBI by filling a complaint on their website, www.ifccfbi.gov/.