Friday, February 20, 2009

E-Government in Malaysia: Its implementation so far and Citizen’s adoption strategies.

~Malaysia E-Government~




E-government, short for electronic government is the use of information and communication technology to provide and improve government services, and among citizens, businesses and others.

A tremendous effort has been made to enhance service delivery via electronic means since the 1990 announcement of the e-Government initiative for Malaysia. Most apparent is the construction of facilities and amenities to support the electronic flow of information to the public. Then, E-government launched and implemented since the initiation of Multimedia Super Corridor (MSC) by Malaysia Government in 1996. Since, it lead the country into the Information Age.It will help to improve how the government operates internally, enabling the government to be more responsive to the needs of its citizens.

E-government was one of the Seven Flagship Application introduced by MSC in order to lead the Malaysian towards the objectives of Vision 2020. However, there are seven pilot projects of the Electronic Government Flagship Application :

  1. Project Monitoring System (SPP II)
  2. Human Resource Management Information System (HRMIS)
  3. Generic Office Environment (GOE)
  4. Electronic Procurement (EP)
  5. Electronic Services (E-services)
  6. Electronic Labour Exchange (ELX)
  7. E-syariah
Under these seven pilot projects, it is divided into three categories , one is Government to Citizens (G2C), the other is Government to Business (G2B), and Government to Government (G2G).

Government to Citizens

1) Electronic Services (E-services)

With e-services, anyone can now conduct transactions with Government agencies, such as Tenaga Nasional Berhad (TNB) and Telekom Malaysia Berhad (TM) through various convenient channels such as the eServices kiosks and internet. It eliminate the queuing, traffic jams or bureaucratic hassles and they can conduct transactions at their own wish and convenience.

2) Electronic Labour Exchange (ELX)

ELX is one stop-centre for labor market information, as supervised by the Ministry of Human Resource (MORH), to enable employers and job seekers to communicate on the same platform. Their objectives are :
  • Enable an effective and integrated job matching process.
  • Provide an effective center of labot market information and references.
  • To improve mobilisation of the nation's human resources and to ensure that manpower utilisation is optimized.

3) E-Syariah

E-syariah is the seventh project under the Electronic Government flagship application of the MSC. A case management system that integrates the processes related to management of cases for the Syariah Courts. And, the objectives are :
  • To improve the quality of services of the Syariah Courts
  • To improve the effectiveness of JKSM (Jabatan Kehakiman Syariah Malaysia) in coordinating and supervising related agencies under its jurisdiction.
  • To improve the productivity and efficiency of the management of the Syariah courts throughout the country.
  • To upload the splendors of Islam through the use of ICT (Information of Communication and Technology)

Government to Business (G2B)

1)E-procurement

An electronic procurement system, which enables suppliers to sell goods and services to the Government through the Internet. Suppliers "open shop" on the World Wide Web (WWW), advertise their pricing, process orders and deliveries. Its objectives includes :
  • Enables accountability and transparency.
  • Creates more skilled and knowledgeable workforce.
  • Equips the workforce with the latest technology at minimum cost.
2)Generic Office Environment (GOE)

Powerful document and office management solution that enables users to effectively and efficiently manage their office environment. It is fully web-based and has been customized based on local developed package, DRDok. Its objectives includes :
  • Efficient preparation and storage of documents.
  • Fast search and retrieval of documents.
  • Effective and productive collaboration and sharing of information.
  • Secure and traceable access to documents.
Government to Government (G2G)

1) Human Resource Management Information System (HRMIS)

HRMIS is integrated, technology-enabled Human Resource Management Information System for the Malaysian Public Service, incorporating Global Best Practices in HR that would enable the Public Service to successfully deal with the Challenges of the K-Economy(knowledge and the ability to use it to create new value and wealth). Objectives includes :
  • Effective staffing and right-sizing of civil service.
  • Up-to-date consolidated HR data for effective information planning.
  • Automate human resource anagerial and operational processes.
  • Improve paperless HRM capabilities.
  • Open and flexible system.
  • Better communication, horizontal integration, streamlined processes and single window access.
2) Project Monitoring System (SPP II)

Online system that monitors the entire lifecycle of national programs, i.e. from project application to approval to implementation, mid-term review and completion. Its objectives includes:
  • To support and monitor entire lifecycle of Malaysia's 5-Year development program.
  • To have a quality projects.
  • To provide a platform for exchanging ideas and demonstrating best practices models in project implementation.
  • To have an effective decision making based on analysis/forecasting of project informaiton and auto-alert on problem projects (e.g. Budget overrun).


Citizen’s adoption strategies

The government should increase the awareness and gain more attention from citizens in the existing of their services provided in e-Government. Then, E-Government adoption requires that citizens show higher levels of satisfaction and security with the online service provided by the government. A higher level of customer satisfaction will increase the rate of e-Government adoption because the citizens are comfortable of the protected privacy and confidentiality of the user's information. Moreover, the service quality should be competitive with the other developed country in terms of speed, problem serving approach, and ease of use of the website. This is important as it provide and encourage long-term users to use the website frequently and cut-off paper work when the payment process can be made through online. Lastly, the government should do more advertising through radio and tv, and organising workshop in a strategic location in order to create awareness and convenience for problem solving as they are full-focus in providing the best services to its citizens.


Corporate Blogging: A new marketing communication tool for companies



With the increase in commodity prices and the slow economy, traditional marketing strategies might prove too costly with advertising and and marketing campaigns. However, you still need to get the public to know about your product or service. Why not take advantage of the networking ties and search engine benefits of a blog?

What once started out as a way to share one's personal thoughts with the world has now become a great public relations and marketing tool.


Corporate blogs are weblogs (blogs) published and used by an organization to reach its organizational goals. Blogs published and used by organizations for marketing purposes, however, are called Blog Marketing. These blogs differ from corporate websites because they feature daily or weekly posts, often around a single topic. Typically, corporations use blogs to create a dialog with customers and explain features of their products and services.

Many organizations use blogs with their user community. This allows them to share and preview product features, functions, and benefits before the products are released. Blogs are an excellent way to gather feedback and to make sure products meet the needs of users. Blogs have become the next generation marketing tool to corporate websites which merely post collateral and do not provide any interactive feedback.

Recently, major conglomerates have been using them as a marketing device to gain feedback from customers, discuss news or promote the latest softwares. The business world's posting pioneers say blogging helps them network, boost sales, and even lobby - at a fraction of the cost of traditional media. Many industries are now hiring full time employees to maintain the company blogs.

Selective blogs, featuring content that offer insight and analysis are the subject matters readers want to make use of. According to EMarketer, the number one reason people read blogs is, “To get news and information I can’t find elsewhere.” Others like blogs because they’re easy to navigate and usually provide daily updates of information. It’s an innovative way to get news quickly and easily.


People can look through blogs at their own leisure. They can revisit the blog by pasting the URL onto their web browser. This is a form of advertising and it is excellent because it will be sought by customers when they seek to visit it again and again. This is better than in the orthodox way where by TV or radio, the ad needs to reach the consumers.


Some corporate blogs:
  1. Boeing
  2. Starbucks
  3. Amazon
  4. General Motors
  5. Dell

Things to take note to prevent E-auction fraud when a consumer participating in an E-auction

Internet auction fraud is a growing epidemic worldwide, as online shopping has grown significantly every year that online shopping has been available. Most internet auction fraud cases involve straightforward scams where consumers allegedly win merchandise by being the highest bidder. All sounds good until they send the payment and never receive the merchandise.

51,000 cases of internet fraud cases were reported in 2002. In 2008, that number ballooned to 105,000. The numbers are staggering, but everyone can lower their risk by knowing what auction fraud is, how to detect it, and how to prevent falling for it.

Tips for preventing E-auction fraud:

  1. Understand how the auction works. Many online auctions simply list items that people want to sell. They don’t verify that the merchandise actually exists or that it is described accurately, and they can’t guaranty that the sellers will keep their promises.
  2. Be careful if the seller is a private individual. Many consumer protection laws don’t apply to private sales, though government agencies may take action if there are many complaints the same individual or criminal fraud is involved.
  3. Be especially cautious when dealing with sellers in other countries. If you have a problem, the physical distance, difference in legal systems, and other factors could make resolving it very difficult.
  4. Ask questions about the goods. Try to verify that a seller has the items in front of him consider the payment arrangements requested. Fraudsters will often insist on high-risk payment methods such as cash, cheque, wire transfer or cash transfer systems.
  5. Check out escrow services - especially if the other party insists on using a particular service. These sites are often well presented and appear genuine, but fraudulent sites may have a number of spelling and grammar mistakes.
  6. Get the name and contact information of the seller. The name, physical street address, email address, and phone number are helpful to have for checking the seller out and following up later if there is a problem. Don’t do business with anyone who refuses to provide that information.
  7. Ask about delivery, returns, warranties and service before you pay. Get a definite delivery time and insist that the shipment is insured. Ask about the return policy. If you’re buying electronic goods or appliances, find out if there is a warranty and how to get service.
  8. Pay by credit card. Under federal law, you can dispute the charges if you paid the seller with a credit card and the goods were never delivered or if they were misrepresented. If you are paying through an intermediary service, ask what happens in the case of disputes.
  9. Protect your privacy. Never provide your Social Security number, driver's license number, credit card number, or bank account information until you have checked out the seller and the online payment or escrow service, if you're using one, to ensure legitimacy.
  10. Customer feedback. Examine the feedback on the seller.

Thursday, February 19, 2009

Review of a local e-commerce site

Canaanland.com.my is an online Christian bookstore selling bibles, books, music, gifts and more. They ship their products to anywhere in Malaysia although they do have a few physical stores also in the Klang Valley.

The site downloads quite quickly and the navigation to other web pages within the site loads easily as well. When you first open the site, a bright orange header greets you. The website's design and layout is relatively simple yet organized so you will find what you are looking for easily. The colour and font selections are simple to read and easy on the eyes, which is an important thing to any users browsing a website.

Besides that, this website also provides a "shopping basket" and the number of items you have chosen in your basket will be shown, as well as the total amount of money you have spent so far. A visible search engine at the top of the page allows busy users to search for what they are looking for immediately. Canaanland accepts payment online through Visa, MasterCard and Maybank.

Other than shopping at this website, users can also check out job vacancies at their physical stores, sitemaps as well as contact them for any further enquiries.

Saturday, February 14, 2009

Mobile payment system in Malaysia: It's potentials & consumer's adoption strategies



Mobile payment in Malaysia is new but fast-growing alternative payment method.
Mobile payment is the collection of money from a consumer via a mobile device such as their mobile phone, SmartPhone and Personal Digital Assistant (PDA) or other such device. A mobile
phone can pay for a wide range of services and digital or hard goods such as songs, computer games, books and magazines.

The most popular mobile payment system is Mobile Money, a PIN-based Mobile Payment Solution which allowing a registered users to pay for their goods and services at anytime , anywhere using only a mobile phone coupled with a 6-digit security PIN (Personal Identification Number) via SMS (Short Messaging Services). The main advantages here is the consumer has the purchasing power whether to buy their desired goods and services whenever they like using their mobile phone without physically present at the store.


The potentials of Mobile payment system are:
  1. Consumers prefer a low-value transaction. However, it will continue to grow as consumer’s needs & confidence on mobile payment increased.
  2. An increasing companies in Malaysia are using m-payment system in order to be more profitable.
  3. Mobile payment providers have a large market share to grab on while the competition are relatively low in the newly developing stage in the market.
  4. High acceptability and adaptability among consumers as the number of mobile users are increasing from year to year.
The adoption strategies will be :
  1. Collaborate with banks and companies in order to expand the ability to purchase goods and sevices via mobile which helps to enhance consumer's confidence and satisfaction.
  2. Enhancing the security during the purchasing transaction on goods and services.
  3. Maintain the customer's loyalty by providing the best satisfaction in terms of security, services, and ease of use of the system.
  4. Gifts and rewards offered from the company to m-payment consumers when they reach a certain level of purchasing of goods and services in order to build consumer's confident.

Friday, February 13, 2009

The application of pre-paid cash card for consumers

This is how prepaid credit cards applications work– You put money on the card, which you can do over the counter, on the phone or online, and then you use the card to make purchases. You can continually put money onto the card if you want, but you cannot spend more than the balance you have left. This means there is no risk of running into debt as it has no credit or overdraft facility. A prepaid cash card looks like a credit or debit card, and gives users the ability to purchase products and services with a card. The total amount will be taken from your card immediately and the transaction is complete.

A popular prepaid cash card is the Octopus Card in Hong Kong. It is widely used in payment system for transportation, supermarkets, fast food restaurants, car parks as well as other point of sale application such as service stations and vending machines.

In Malaysia, we have our own prepaid cash card- Touch 'n Go. The Touch ‘n Go card is an electronic purse that can be used at all highways in Malaysia, major public transports in Klang Valley, selected parking sites and theme parks.
Therefore with prepaid debit card, it helps in controlling an individual's spending as purchases are limited to the balance in the card or account, making it a wiser option overall.

Credit card debts: Causes and Prevention

CAUSES:
There are many reasons why people end up with more debt than they can possibly handle on their own. One of the main causes of personal debt is misuse of credit cards.

1) Don’t have credit card education.
Many people get their first credit card as soon as they are allowed to, when they are 18 or sometimes even younger. Many young people see credit cards as "free money" and buy up everything that they want without showing any concern of how they are actually going to pay for it.
2) Emergence of online shopping
With the economy making for a leaner wallet this year, consumers will still likely continue to overspend while surfing the Internet. The reason attribute to overspending on online shopping due to it become more user friendly and convenient to the user. Whenever the users have possessed a credit card, they can just buy the things through online.

3) Encouragement of credit card companies
Even the credit cards have encouraged you to spend money with no worries wherever you go, but the credit card companies have always sent the advertising to assaults you. Card companies often send their consumers all sorts of flyers and deals in the mail that give those individuals rewards and privileges that depend on spending more. It is often these things that hamper their ability to save their money.

4) Lifestyle maintenance
College tuition, cars and mortgages, luxuries house etc are the big expense along the way. Many people focus on one area of finances, neglecting the other so badly that there's not enough money to go around once these life events arise. Therefore, people may then rely on credit to get by.

PREVENTION:

1) Keep a running tally in writing of your weekly or monthly spending versus you budget, and update it before each purchase.

2) Use an online bank account to keep score of your spending. Keep your credit card receipts when you make purchases. At the end of each day or couple of days, use an online bank account to pay the credit card company for the amount you spent. Seeing your balance fall in line with your credit card spending should help you to keep to a budget, and eliminate risk that you overspend during the month.

3) Limit your credit card use to certain categories of spending. Use your credit card to pay only when there's no risk you will overspend. So use it for regular bills, groceries, and expenses where you trust yourself. For areas where you suspect you overspend or spend on impulse, use cash.

"Spending less than you make is what's important."

Wednesday, February 11, 2009

Electronic Currency


Banks have been able to move currency electronically for decades, only recently that the average consumer had the capability to use electronic transfers in any meaningful way. With the advancement in technology and more computer savvy individuals, global interaction is made available at vastly reduced costs. The Internet and E-commerce have become an increasingly commercial area, where daily payments are rendered for goods, information, services and investment. As a result, electronic payments are becoming the central part to online business between customer and seller.

Electronic money refers to digital currency that you can use on the Internet to buy and sell goods, services and investments by transmitting a number from one computer to another, where it typically involves use of computer networks, the Internet and digital stored value system. These transactions are carried out electronically, transferring funds from one party to another, by either a debit or credit. These funds are instantly cleared and secured by using strong encryption, thus eliminating the payment risk to the consumer.

One major type of Electronic money is the Integrated Circuit Card (ICC). ICC could be broken down further into 2 types - Contact ICC and Contactless ICC.

Contact ICC


Contact smart cards have a contact area, comprising several gold-plated contact pads, that is about 1 cm square. When inserted into a reader, the chip makes contact with electrical connectors that can read information from the chip and write information back. The cards do not contain batteries; energy is supplied by the card reader.

Examples of Contact ICC's:
  1. Credit cards
  2. Malaysian MyKad
  3. ATM cards

Contactless ICC



The chip communicates with the card reader through Radio Frequency Identification (RFID) induction technology (at data rates of 106 to 848 kbit/s). These cards require only close proximity to an antenna to complete transaction. They are often used when transactions must be processed quickly or hands-free, such as on mass transit systems, where smart cards can be used without even removing them from a wallet.

Examples of Contactless ICC's:
  1. Hong Kong's Octopus Card
  2. Malaysia's Touch n Go Card
  3. San Diego's Compass Card

Advantages of E-Currency

Flexibility


There is no need, for example, to carry several cards: one card can simultaneously be an ID, a credit card, a stored-value cash card, and a repository of personal information such as telephone numbers or medical history. Such a card can be easily replaced if lost, and, because a PIN number (or other form of security) must be used to access information, is totally useless to people other than its legal bearer. At the first attempt to use it illegally, the card would be deactivated by the card reader itself.

Security

They are encryption devices, so that the user can encrypt and decrypt information without relying on unknown, and therefore potentially untrustworthy, appliances such as ATMs. ICC's are very flexible in providing authentication at different level of the bearer and the counterpart. Finally, with the information about the user that ICC's can provide to the other parties, they are useful devices for customizing products and services.

Other general benefits of sICC's are:
  • Portability
  • Increasing data storage capacity
  • Reliability that is virtually unaffected by electrical and magnetic fields.

Limitations of ICC's


Security


VISA and MasterCard developed a new standard, SET, in early 1996 in an attempt to get the entire industry on a standard of encryption. Additionally, there are standards such as DES which have been around for years, usable in all forms of encryption which are being used in ICC's. But still some ICC's are not inviolate. Mondex, a maker of banking ICC's, solves this problem by making its transactions possible only between Mondex cards. But in order for ICC's to reach their full potential, they must be able to interact with a host of interfaces. And they must do so securely.

Public Perception

People must believe that the cards are secure. This depends to a great extent upon actual security, but people must also be convinced of it. And once people are comfortable that the card is secure, they must still be confident that a stalker isn't somewhere collecting and analyzing all of the information gleaned from the ICC's use.

Product Complements

While ICC's themselves are fairly cheap, card readers are not. However, in an effort to make ICC's more pervasive, companies such as Netscape and Microsoft are proposing putting software in packages they make. Additionally, Gemplus has created a new pocket reader and other companies are considering adding readers to keyboards.

Friday, February 6, 2009

Phishing: Examples and its prevention methods.


What is Phishing and its Examples.
Phishing is a scam in which the attacker sends an email purporting to be from a valid financial or eCommerce provider, which generally looks and feels much like the valid eCommerce or banking site.
Often phishing spam messages will use legitimate 'From:' email addresses, logos, and links to reputable businesses such as Citibank, PayPal, eBay in the message. But the message instructs you to click on a web link that sends you to a fake website where you are asked to provide personal information such as your name, address, phone number, date of birth, and bank or credit card account number. Providing this kind of information can leave consumers at risk for identity theft.

We may see the phishing scam in the e-mail messages, social networking website, fake website that accepts donations for charity, instant message program and even on your cell phone or other mobile devices.

Fake, copycat Web sites are also called spoofed Web sites. They are designed to look like the legitimate site, sometimes using graphics or fonts from the legitimate site. They might even have a Web address that's very similar to the legitimate site you are used to visiting.

These are few examples of phishing scams:
This PayPal phishing scams tries to trick recipients by pretending to be some sort of security alert. Claiming that someone 'from a foreign IP address' attempted to login to your PayPal account, the email urges recipients to confirm their account details via the link provided.

The attacker claims to be acting in the interests of safety and integrity for the online banking community. Of course, in order to do so, you are instructed to visit a fake website and enter critical financial details that the attacker will then use to disrupt the very safety and integrity they claim to be protecting.

This eBay phishing email includes the eBay logo in an attempt to gain credibility. The email warns that a billing error may have been made on the account and urges the eBay member to login and verify the charges.

Prevention Methods
It is easy to uncover a crude phishing scam. For example, if you get an email from a bank you’ve never opened an account at, then don’t follow the link and enter your personal information. Now, if you actually have an account at the institution it gets more interesting.
Besides that, user must avoid filling out forms in e-mail messages. You can't know with certainty where the data will be sent and the information can make several stops on the way to the recipient.
If you click on a link in an e-mail message from a company be aware that many scam artists are making forgeries of company's sites that look like the real thing. Verify the legitimacy of a web address with the company directly before submitting your personal information.

Here are some common phrases where e-mail message or phone message may be a phishing scam:

"Verify your account."
Businesses should not ask you to send passwords, login names, Social Security numbers, or other personal information through e-mail.
"You have won the lottery."
The lottery scam is a common phishing scam known as advance fee fraud. One of the most common forms of advanced fee fraud is a message that claims that you have won a large sum of money, or that a person will pay you a large sum of money for little or no work on your part. The lottery scam often includes references to big companies, such as Microsoft.
"If you don't respond within 48 hours, your account will be closed."
These messages convey a sense of urgency so that you'll respond immediately without thinking. A phishing e-mail message might even claim that your response is required because your account might have been compromised.

The best way to avoid becoming a phishing scam victim is to use your best own adjustment. No financial institution with any sense will email you and ask you to provide all of your sensitive information. In fact, most institution are informing customers that “ we will never ask you for your personal information via phone or email.

Thursday, February 5, 2009

The Application of 3rd Party Certification Program in Malaysia


Third party certification is an assessment carried out to ensure compliance with a publicly available technical specification. Importantly, the assessment is carried out by an independent, third party organization that is qualified and licensed to issue certification when the assessment is successfully completed.

This means that rather than an organization or company claiming to comply with industry standards, they have taken their commitment to quality further and invited in an external third party to verify that their product or service does indeed comply with the industry standards.

The most popular application of 3rd party certification in Malaysia is provided by the MSC Trustgate.com Sdn. Bhd. MSC Trustgate.com Sdn Bhd is a licensed Certification Authority (CA) operating within the Multimedia Super Corridor. MSC Trustgate was incorporated in 1999 to meet the growing need for secure open network communications and become the catalyst for the growth of e-commerce, both locally and across the ASEAN region.

Trustgate is licensed under the Digital Signature Act 1997 (DSA), a Malaysia law that sets a global precedent for the mandate of a CA. As a CA, Trustgate’s core business is to provide digital certification services, including digital certificates, cryptographic products, and software development. It provides security solutions for individuals, enterprises, government, and e-commerce service providers using digital certificates, digital signatures, encryption and decryption as this is the primary concern of entering into the new Internet economy.

Among the products and services that they provide are Secure Sockets Layer (SSL) Certificate Authority, Managed PKI, Personal ID, MyTRUST, MyKad ID and etc. In addition, MSC Trustgate has been appointed as Asia's first VeriSign Authorised Training Centre. Under this partnership, MSC Trustgate.com and APIIT (Asia Pacific Institute of Information Technology) jointly facilitate the delivery of VeriSign’s high-end Security and E-Commerce programmes. VeriSign is the leading Secure Sockets Layer (SSL) Certificate Authority which also enabling the security of e-commerce, communications, and interactions for Web sites, intranets, and extranets. It provides security solutions to protect an organization’s consumers, brand, Web site, and network.


The Diagram below shows how Verisign tackle spamming and it's solutions:


Therefore, it is important to apply 3rd certification programme as it provides a safe and secure Internet protection. More e-consumer can now shop and purchase online care-free while their personal information or confidentiality is protected

.

The threat of online security: How safe is our data?


Do you truly believe that your data is safe? You might think so. Unfortunately, there are threats online that keep knocking on your door until you let them in - intentionally or not. Once they are in your computer system, they will cause havoc and may result in you losing all your data.

Therefore, online security has become an enormous concern when surfing the net. And with good reason. These threats to online security may cripple your computer system and halt business activities which means losing precious data and time. Besides that, these threats evolve over time and always find a way to better the security softwares we have installed in our computer systems. Therefore, there is always a need to update security softwares to keep our data safe from these threats.

The following are some of the threats to online security:

Malware


A MALicious softWARE or malware constitutes any software written for malicious reasons that infiltrates a computer without authorization and performs some nefarious function. Malware can come in many varieties and perform a myriad of functions. it is this carefully engineered software that performs attacks on an automated level among millions of compromised machines around the world, that makes it the centerpoint of the modern cybercrime landscape. Malware includes computer viruses, worms, trojan horses, most rootkits, spyware, and other malicious and unwanted software.

Botnets


A roBOT NETwork or botnet is a huge number of hijacked Internet computers that have been set up to forward traffic, includig spam and viruses, to other computers on the Internet. The computer is compromised via a Trojan that often works by opening an Internet Relay Chat (IRC) channel that waits for commands from the person in control of the botnet. The very nature of botnets gives criminals plenty of power on the internet at large. With control over so many compromised systems, herders can now engage in quite more damaging activities than the internet has seen before.

Virus


Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation. A virus might corrupt or delete data on your computer, use your e-mail program to spread itself to other computers, or even erase everything on your hard disk.

Viruses are most easily spread by attachments in e-mail messages or instant messaging messages. That is why it is essential that you never open e-mail attachments unless you know who it's from and you are expecting it. Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files. Viruses also spread through downloads on the Internet. They can be hidden in illicit software or other files or programs you might download.

Amount of viruses detected by various anti-virus software last year:

vendor detected total percent
AntiVir 26,457,598 28,024,135 94.41%
Avast-Commercial 12,425,965 13,437,873 92.47%
Norman 25,264,055 27,467,379 91.98%
F-Prot6 17,295,119 19,004,580 91.01%
Sophos 3,345,699 3,691,679 90.63%
NOD32 25,329,840 28,024,135 90.39%
AVG7 25,262,433 28,024,135 90.15%
F-Secure 25,148,742 28,024,135 89.74%
Ikarus 9,275,581 10,476,608 88.54%
TrendMicro 11,703,755 13,437,873 87.10%
QuickHeal 10,190,639 11,846,198 86.02%
DrWeb 23,856,884 28,009,899 85.17%
VirusBuster 13,881,573 16,859,499 82.34%
Vexira 13,877,493 16,859,499 82.31%
Clam 12,232,194 15,305,470 79.92%
BitDefender 22,070,962 28,024,135 78.76%
Kaspersky 20,835,947 28,024,135 74.35%
McAfee 12,332,904 16,744,538 73.65%
VBA32 18,326,900 26,958,740 67.98%
Panda 7,661,487 12,300,516 62.29%
G-Data 1,186,992 3,679,871 32.26%


It is shocking to know that our computer system is exposed to these malicious threats. It is of the utmost importance to always have your anti-virus software updated because these threats can adapt to changes and evolve through time.

The following are some ways to keep these threat at bay:

  1. Always ensure that the Internet firewall is running. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.
  2. Subscribe to industry standard anti-virus software. In the case of a breach in security, these anti-virus software could trap the viruses and alert users of the breach and take the necessary steps to eliminate the viruses.
  3. Never open an e-mail attachment from someone you don't know.
  4. Avoid opening an e-mail attachment from someone you know, unless you know exactly what the attachment is. The sender may be unaware that it contains a virus.
Finally, as the saying goes - prevention is better than cure.

how to safeguard our personal and financial data?

Identity fraud and financial account fraud are not new. Criminals used to gain access to individual’s sensitive personal information with low-tech primary methods such as stealing their mail. But the methods used by criminals to gain access to the personal information that makes these crimes possible are changing with our times. Criminals are now turning to more technologically sophisticated methods of gathering and exploiting personal information.

Therefore, necessary steps to protect the security of individuals' information has to be taken seriously. A few of these safeguards will be discussed below.


Firstly, and also most traditionally, is to create strong passwords and PIN numbers to protect data from being assessed by using a combination of alphabets and numerics.


Besides that, it is crucially important to not only install but constantly update antispyware and antivirus programs. Popular programs include Norton AntiVirus and AVG Antivirus.

Other than that, installing a firewall is also another good safeguard as a firewall is a barrier to keep destructive forces away from your property. In fact, that's why its called a firewall. Its job is similar to a physical firewall that keeps a fire from spreading from one area to the next. Most computers today come with firewalls integrated into their operating systems.

Another safeguard would be to avoid assessing personal and financial information in public places such as cafes and restaurants. This can encourage hackers to hack into your confidential data and steal information from anywhere on the network.

The internet is a great source of information, but obviously also a great danger. However, if appropriate safeguards are taken, it is possible to protect personal and financial data.

Friday, January 30, 2009

How E-Commerce can reduce cycle time, improve employees' empowerment and facilitate customer support

Reduced Cycle Time


Cycle time is the amount of time a particular organization takes to complete any process. Such processes include, collecting accounts receivables, returning a quotation, and getting product out into the marketplace. The latter, is probably the most common in e-commerce. According to a report published by the FedEx Center for Cycle Time Research at the University of Memphis, "All too often in organizations, less than 3% of the elapsed time performing a process has anything to do with real work." The rest is spent on "scheduling, waiting, needless repetition, getting lost (and) getting found."

However, with the emergence of e-commerce and the advances in technology, cycle time could be reduced. For example, obtaining music, one needs to go to the music store to get a physical copy of the album before the emergence of e-commerce. Now with e-commerce, one only needs a computer system and Internet connection to obtain those music digitally. E-commerce reduced delivery time of digitized products and services to mere seconds. Furthermore, e-commerce could eliminate activities that are non-value added.

Activities such as documentation and administrative works could be reduced by more than 90%. Everything is made through computer systems. Employees need not search around for information and walk around the office to pass product orders. All is done via e-commerce.

---------------------------------------------

Improved Employee Empowerment


Employee empowerment is the extent of authority given to the employee to make decisions independently by the organization. This is enabled when the company adopts a decentralization decision making process. It gives the employees more freedom.

With e-commerce, almost everything is made available with a click of the mouse. Such as, customer history, product information, delivery mode, payment mode, promotion and discounts. Employees could make decision on the spot without consulting their superiors. This means that sales could be finalised and closed faster. Hence, making more sales.

--------------------------------------------------

Facilitate Customer Support


E-commerce enables the organization to provide value-added services and update to recurring customers and new customers alike. With the information in the organization's database, it could recommend the right products to the right customers.

For example:

I bought the items below from Amazon.com.

Shipment #1: Shipped on November 30, 2008 Need to return an item?
Shipping estimate:November 30, 2008
Delivery estimate:December 23, 2008 (More about estimates)
1 package via Expedited Int'l Shipping
Shipping Address:
Amy Loke
No. 2, Jalan 5/38C,
Taman Sri Kepong Baru
Kuala Lumpur, Kuala Lumpur 52100
Malaysia

Shipping Speed:
Expedited International Shipping

Items Ordered Price
1 of: Twilight: The Complete Illustrated Movie Companion [Paperback]
By: Mark Cotta Vaz
Sold by: Amazon.com, LLC
$10.19
- 1 item(s) Gift options: None

1 of: The Twilight Companion: The Unauthorized Guide to the Series [Paperback]
By: Lois H. Gresh
Sold by: Amazon.com, LLC
$10.36
- 1 item(s) Gift options: None



Item(s) Subtotal: $20.55
Shipping & Handling: $25.97

-----
Total Before Tax: $46.52
Sales tax: $0.00

-----
Total for this Shipment: $46.52

-----


A few weeks later, Amazon.com sent me an email recommending a product relevant to the goods that I've bought.

amazon.com
Let them choose from millions of items › Amazon.com Gift Cards
Your Amazon.com Today's Deals See All Departments
Dear Amazon.com Customer,

As someone who has purchased Stephenie Meyer books, "Twilight" music, or "Twilight" accessories, or searched for "Twilight" at Amazon.com, you might be interested in "Twilight" on DVD, available to pre-order only at Amazon.

Also, learn more about the film, buy movie merchandise, and watch our interview with Robert Pattinson at the "Twilight" Store: www.amazon.com/twilight.

Check out the DVD

With the help of e-commerce, the organization could lock customers in by giving them what they want and what they might want in the future by analyzing their buying habits.