Sunday, July 12, 2009

Corporate Blogging

Corporate blog is published and used as a marketing communication tools. Nowadays, a lot of companies create blog for public to view their companies. Corporate blog is common for large company and it also act as a public relations tools or communication channel since they allow public to leave comment. Company often uses blog to introduce new products or services, explain and clarify policies, or react to public criticism on certain issues. “Blog” is now a new company website, it is more than a homepage of a company’s website and it is more personal because they are written by outside people and in conversational tone of voice. CEO, employees and other internal user can easily update the blog without knowledge of programming or professional web layouting. Blog create an easier and straight forward way for company to communicate with public, and public can provide feedback to company directly.
The official Google Blog is the top rating corporate blog around the world. They use blog as a public relation tools effectively. They introduce new products or services and information about the company in their blog post. Google blog talk lots about their company policy and how their company operates. They also explain the new policy and the impact of issue in the world to their company. They get reader’s feedback from the comments in their blog and improve their web. They even involve in education on providing school a tools for learning. Google even teach reader new knowledge about the world technology.
The Pros and Cons of Corporate Blogging:
Pros:
1) Dialogue with consumers
2) Regular turnover of content to give consumers reason to return
3) Seen to be embracing Web 2.0
4) Search engine visibility
5) Requires little budget input

Cons:
1) Time consuming activity, keeping content fresh and updated
2) Legal minefield, privacy concerns
3) Lack of control vs. over-moderation
4) Sourcing relevant “voice”/blogger
5) Hard to measure ROI

E-Goverment in Malaysia


E-government, also known as online government, is the combination of use of the information technology and E-commerce in which to provide individuals or organisations with more convenient and easy access to government’s information and services.
In Malaysia, our government is also adopted E-government. It will improve the government operation as well as the delivery of services to the citizens.

Currently, there is several application of E-government in our country. One of the most common applications is the E-filing. This is an online system introduced by Lembaga Hasil Dalam Negeri (LHDM) which allows the residents to submit their income tax details through online. E-filing serves as an alternatives method to the manual tax return form. This speed and ease the tax payment procedures.
Additionally, E-perolehan transforms the traditional manual procurement process in the government machinery to electronic procurement online. This allows suppliers to post their products or services over Internet and manage the order as well as payments from government agencies through Internet. Furthermore, citizens can also renew their road tax or their driving license through online by using E-government application.

E-government brings us lots of convenience. However, there are still some limitation and loop holes:
1) Authenticity and security
Many citizens do not trust on the transaction made online.


2) Language barrier
Most of the E-government site is based on Bahasa Malaysia. Some citizens may face those language problems when they wish to conduct some transaction through E-government.

3) Lack of public awareness
The implementation of E-government is not so popular and most of the citizens are not aware of it.

4) Technological limitation
There is lack of knowledge and technology to conduct E-government by the citizens.

In order to overcome all of the limitations, government should promote and acknowledge the citizens regarding the E-government system. This can be done through TV and radio so that citizens are aware of the application. Moreover, citizens must be educated to use the E-government systems.

Other than that, government should simplify the procedures in access to the E-government application. There must be clear and easy steps to guide the users, especially to those new users.

In order to eliminate the language problem, the government should provide different version of languages which enable the users to choose their preferable languages.

Saturday, July 11, 2009

Pros & Cons of E-learning from student prespective

E-learning is the use of technologies in learning opportunities, without face-to-face interaction. It is different from the traditional class room learning. By using e-learning, student can learn through internet in their house. E-learning includes web-based training, computer-based training and web-based learning.

Some Malaysin universities offer e-learning courses such as Universiti Teknologi Pertronas (UTP), University of Malaya (UM) and Universiti Teknologi Malaysia (UTM).

Pros on e-learning:
1) Reduce cost and time
Student can save the time and money travel to school. Since e-learning can be conducted at home, student can just study at home. Besides that, student can control the time of learning, they can choose to learn until wherever the like.

2) Flexibility
Student can schedule their time table themselves. This will allow student to study at the time they prefer. Besides that, student can also choose a comfortable place that they prefer, e-learning can be conducted anywhere as long as there is a computer that can access to the internet. In addition, with the flexibility of time, student can do some part-time job whenever they are free.

3) Personalized learning
E-learning encourages students to peruse through information by using hyperlinks and sites on the worldwide Web. Students are able to find information relevant to their personal situations and interest. E-learning allows selection of learning materials
E-learning is more focused on the students because student can get the information they wanted to learn. E-learning is flexible and can be customized to meet the individual needs.

Cons on e-learning:
1) Lack of communication
Without the face-to-face communication, student will face the communication problem with their tutor or lecturer. Student may communicate with them by using e-mail or msn, but sometimes the e-mail is not instantly reply by the lecturer. This will not be useful if the student have an emergency problem.

2) Unmotivated
E-learning requires time to complete especially those with assignments and interactive collaborations. Students have to be highly motivated and responsible because all the work they do is on their own. Learners with low motivation may not complete modules.

3) Access
Students need to have computer skills with programs such as word processing, Internet browsers, and e-mail. Without these skills and software it will be difficult to conduct e-learning. Slow Internet connections or older computers may cause the learners to get frustrated and give up.


Tuesday, July 7, 2009

Review of Malaysia Transactional E-Commerce Website : MPH Bookstore


MPH bookstore is one of the largest bookstore in Malaysia selling books ranging from fiction and non fiction books, teens books and also children books. This online bookstore also gives special offers to its customers.
Type of product
MPH bookstore is offering books from 36 different types of categories ranging from Business Studies, Home decoration and Improvement, Lifestyle, Law and legal books, as well as books on religion and relationship.


Site Design and Layout
MPH bookstore have a good layout where they categories their range of books into fiction and non fiction, best seller, new release, hot titles,coming soon, and special offers. This make it convenient for customer to find what book they are interested. Moreover each books have a short synopsis on the content of the book. This gives a picture of what the customer is going to purchase. The use of flash is also a smart choice to make the website alive and fun.

Availability of Search Engine and Shopping Carts.
A search engine is also equipped in the website of this online bookstore to make sure its website is user friendly.It cut down customer's time searching for the books they are interested to purchase. Moreover, a good e-commerce website is always equipped with a search engine for convenience of users. Shopping carts is available for customers to place the items that the customer are planning to buying and customer are still able to continue shopping and compare prices before making the final payment.

Color and Fonts Selection
The website design is simple and clear. The author uses white color as the background of their website while the wordings are in blue. White is a wise choice as the color of the books are very colorful which fits perfectly into the background color.



Payment and Security
MPH online bookstore is secured by SSL which is security socket layer. It is where customer information such as credit card number will be encrypted twice to prevent the information from being misuse, loss, or damage. MPH also provides all kind of payment methods for customers' convenience. Among the payment methods offered are by visa, master and also debit card and even online payment thru maybank2u.com website.

Related Link:
1. http://www.mph.com.my/welcome/welcome.cfm

Saturday, July 4, 2009

Mobile Payment systems in Malaysia: Its potentials & Consumers’ Adoption Strategy




Mobile phone is so popular today that it is designed with so many incredible features. One of the latest features is whereby phone user can use their mobile phone to do their payment. Unbelievable but true. It is where mobile user that uses this function supported by their Smartphone, Cellular phone, Personal Digital Assistance (PDA), or even mobile phone can buy groceries, electronic devices, clothing, books, and many more and make the payment using their mobile phone. The whole idea is similar to a credit card. The concept here is that user can make their payment or transaction using their mobile phone instead of bring whole load of cash. It is much safer and save the user a lot of time from traveling to the bank and queuing up to withdraws money.


The first mobile payment service, Telemoney, was launched in November 2001 in Malaysia. Telemoney was the first company that offers mobile payment services in Malaysia. One needs to have a GSM mobile phone and a Telemoney personal identification number in order to connect to a credit card, debit card, store valued card, bank account and also phone account. In April 2009, the revolution of mobile payment was seen when the first contactless mobile payment services were launches by Maxis communication together with Nokia, Visa, Maybank and Touch and Go. The features of the contactless mobile payment includes credit card, debit card, ticketing and transportation payments to be integrated into a mobile phone.

This innovation offers its customers a lot of benefits. Customers Life is more convenient when they are making payment for toll charges, transportation fees such as Rapid KL, convenience store, retail store, buying movie ticket online or e-ticket, as well as paying for parking fees. This speed up all transaction and customers need not bring any cash in hand. This indirectly will reduce crime rates. Moreover, customers need not to waste time queuing up to pay bill or even going to ATM to withdraw money. Customer’s data is secured by a pin fraud protection patent whereby it offers security and prevention from hackers. This leads to customer’s satisfaction and confidence in using the mobile payment. In addition, it acts as a competitive advantage for the country by helping the country to boost its economy. Multinational companies should collaborate together to enhance the mobile payment services in order to offer customers more new and innovative products in order to maintain customer’s loyalty.

Friday, July 3, 2009

The application of pre-paid cash card for consumers

A pre-paid cash card is a card that requires the consumer to top-up the card before using it. It means that you need to put some money into the card. Not really squeeze the money into the card. First, you need to go to the counter that provide top-up services and then the employee will help you to update the balance of the card, after that you can use it to buy thing.

Nowadays, pre-paid cash card is very common in our life. It is very convenient, safe, and portable. The consumer do not need to carry a lot of cash to buy thing, they just need to bring their pre-paid cash card only.

There are many application of pre-paid cash card:
1) Buy thing- Consumer can use pre-paid cash card in shopping centre and restaurant.
2) Pay bill- Electricity, water telephone bill and etc.
3) Toll fee- Pay toll fee in high way.

In Malaysia, we can only use pre-paid cash card to pay toll fee. That is Touch 'n Go.
Touch 'n Go is an electronic purse that used in toll expressway and highway operators as the sole payment system. Touch 'n Go uses contactless technology. The card is similar with credit card. User can continuously using the card as long as it is top-up before using it. It is very popular and convenient in Malaysia. It will help driver to save time when they paying toll fee. Besides that, user can use Touch 'n Go card to pay the bus fare.
The
Octopus card is a stored value smart card that used to transfer electronic payments in online or offline systems in Hong Kong. It is used to collect fares for the territory's mass transit system. The Octopus card system was the first contactless smart card system around the world. The Octopus car is also used for payment at supermarkets, fast-food restaurants, car parks, and others.
The
EZ-Link card is used for the payment of public transportation fares in Singapore. The card is commonly used for paying transportation fees in Mass Rapid Transit (MRT), Light Rail Transit (LRT) and public bus services. The card also serves as a supplementary identification and concession card for students in nationally recognised educational institutes.
The demand for pre-paid cash card is increasingly important and it has been implemented in the countries around the world. Hope that there will be strong improvement in the use of pre-paid cash card in Malaysia.

Credit Card Debts: Causes& Prevention

Open your wallet now, and count, how many credit cards you have?
Check on your monthly bills, how much you have to pay every month for your credit card debts?

Nowadays, nearly everyone has access to a credit card. Many of us like to put some bills onto credit card and try to delay the payment as long as possible. Credit card companies offered different interest rates and payment schedule which you think it is easier and cheaper to solve your bills. But, it actually makes users harder to pay off all the debts. Thus, it created more and more credit card debts and also the interest charges on overdue balances.

So, check out how to build a healthy financial status. We need to find out what the causes of credit card debts are and how we prevent it from threaten our financial health.

1) Poor financial management: we always spending money using credit cards, but when the bills reach your hand, you have no idea where you spent so large amount of money that month. Thus, we have to work out a plan on spending. Therefore, a budget for whole month is really needed. You can just write out your expenses daily, and compare to your income, so that you won’t spend more than you earn each month.

2) Zero saving or too little: once you recognize your expenses each month, figure out 5% - 10% of your income to set aside for emergencies or unexpected expenditure. People used to pay their car repair fees or medical expenses by credit cards since they have no saving for those unexpected fees. So, just prepare some saving to avoid unwanted debts or financial strain.


3) Spending habit: woman mostly, shop for a whole day and just using few credit cards on payment. But they have no idea how much they had spent for the whole day. Every time you pull out the credit card to pay at the counter, the debts is become higher and higher. Credit card is not cash which you can physically feel the thickness it appear in your wallet. So, you must record and limit the amount you spend every time you make payment.

4) Limit the cards in wallet: every credit card has its own set of terms and condition including varying interest rates, penalties, fees, and due dates. Try to bring one or two cards instead of five or six. If you focus all your expenses on two cards, you can easily found the total amount you spent. But, if you pay using different card every time, you will forget the amount you spent and interest rate for each card. Besides, try to compare each credit card companies and find out the lowest interest rates companies.


5) Pay on time: some people used to pay only the minimum amount of monthly bill. But, it actually makes you pay more interest in the future. Because of the universal default clause in credit cards terms and conditions, credit cards companies can raise your interest rate if you are late paying creditor or utility company. Therefore, never make a late payment and try to pay earlier since the interest calculated based on average daily balance. So, the earlier you pay the less interest you pay.

Electronic Currency

In the E-commerce world today, there are more and more advancement and technology in conducting this activity. As for the electronic payment system, people have implemented the electronic currency in today E-commerce trading.

Electronic currency is also known as electronic money, electronic cash, digital currency, digital cash as well as digital money. The use of the electronic money is done through the computer networks, the internet and also the digital stored value system. This money is only exchange electronically. It assisted in the online-based purchases and sales transaction conveniently.

Electronic benefit transfer (EBT) is one of the examples of the use of electronic currency. It is the business-to-business E-commerce which is use to made payment electronically. Additionally, E-Check is also one of the electronic currencies which function as the paper check. It is the electronic version of a paper check with some additional function as compare with the traditional paper check. It is a useful tool to make online shopping payment.

Users may be benefited much by using the electronic currency. It serves as a universal media of exchange which allowed users to make quick online payment ubiquity at anywhere anytime provided that there is an internet connection. With the speed of transferability, it enables the users to send and receive money instantly from anyone all around the globe.

On the other hand, it also provided a safe and secure system to make your payment. Various types of safeguard are there to identify the fraud, chargeback prevention, funds verification, PIN verification and others security system.

People also can invest in electronic currency to make more money. There are only few simple steps in order to enjoy the profits of this investment. A user does need to open an electronic currency account which is free of charge, purchases the electronic currency through the electronic currency processor in their account, invest it in the trustworthy HYIP programmes, transfer the electronic currency profits from HYIP system to your account, and lastly convert the electronic money into real money.

However, there are some issues identified in the use of electronic currency. Problem arises when it come to the collection of taxation. Additionally, electronic currency also creates the ease of possibility of money laundering.

In order to encourage the implementation of this new technology in the E-commerce world, more rules and regulation must be created to solve the inefficiencies in using the electronic currency so that E-commerce could achieve its full potential in the future.

Saturday, June 27, 2009

Review on a post on internet security

First of all, I would like to share news in China:
“22 year-old hacker from Hunan steals over 7million RMB from banks”
There is a 22 year-old unemployed man with only a junior high-school education being a hacker and steal money from banks. He purchased a hacking software which used to infiltrate the main computers and websites of Chinese banks to insert “Trojan horse”, and steal the identification numbers, bank account numbers, bank codes, mobile phone numbers and other personal information of banking customers. Thus, he successfully steal over 7 million RMB from the over 300 accounts!

From this news, it means that, nowadays, it is easy to be a hacker, and even easier being hacked! In this e-century, hackers are everywhere. They can hack into your MSN, yahoo, hotmail or others personal websites. That is why we have to learn how to avoid from being hacked! I always receive message from my friends’ msn messenger, sent me some website address link while the sender is appear offline! I feel weird and just ignore it. But, this is actually the hackers who try to send out virus after hacked the user’s msn account. However, after my friend change the password, these things did not happen again.

After reading the password security post in E-Commerce blog, I finally understand why a lot of people being hacked by hacker. They did not care about the security of password. Some people use their name, date of birth as the password that could be easily found out by everyone. Although it may be easier to remember the password, we should change the password every month to avoid hacker. Besides, avoid using the same password for every applications or account login.

I would like to share some ways to create a secure password and STOP being hacked to protect your private personal information. 1. Avoid using personal information: never use your name, spouse name, or date of birth as your password.
2. Do not use real words: try to create your own words that could not find in dictionary.
3. Mix different character types: create a password which include different type of character such as ‘#’ or ‘&’.
4. Use a pass phrase: think a sentence or line from song, and create a password using the first letter from each word.
For example: “I like to wear Nike shoes” we can change it to:‘il2wns’
5. Use password management tools: password management tools can remember password securely and easier for user.

The post I review:
1.
http://ecommerze.blogspot.com/search/label/Internet%20Security
2.
http://chinanewswrap.com/2009/06/24/22-year-old-hacker-from-hunan-steals-over-7-million-rmb-from-banks/

How to safeguard our personal& financial data?

How safe is our data? Do you know how to protect your data? For me, I only know the basic way to protect my data. Nowadays, my way to protect data is outdated, because there is a lot of software that can easily hack into my data or computer. Hacker is the “most professional people” that steal the data; they can easily steal data without your knowledge. As this is very dangerous for the innocence people, that is you and me, because we don’t know have strong knowledge in protecting our data. In order to adapt to current situation, we need to start to protect our data now.

There are some ways to safeguard our data:
1) Set up password
Setting up password is the most basic way to protect data, but the others can still steal your data if your password can be guessed. We avoid using password such as birthday, name and identity card number, this type of password is can be easily guessed by other people. Besides that, we should not use repeating word in a password e.g. Betty. The length of the password is also very important, we need to set password that is at least 7 words long. Nowadays, when setting up the password there will be an identification of the strengtheners of your password. Remember to set the password that is strong enough to avoid stealing of data. 2) Firewall
A firewall is a part of a computer system or network that is designed to block unauthorized access. Firewalls are usually used to prevent unauthorized users from accessing private networks, especially
intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that are unauthorized. Firewall is suitable for individual or organization use. There is a lot of firewall software that are available in the internet; you can download it for free. 3) Antivirus Software
A computer virus is a
computer program that can copy itself and infect a computer without the permission of the owner. Virus can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer. In order to avoid virus hacking our computer, we need to install antivirus software. The software must be very strong enough to “kill” the virus. Besides that, we need to update antivirus software everyday, so there will be strong protection for our data. 4) Log in, log out
When you log in to some website, the website may keep your username and password. This may be dangerous when you using public device to log on to that website. Others may steal your data without your knowledge. So, when you log in to one website, you need to make sure that you have clear the data. This will ensure that your data will not be hack by others. Besides that, when you sign in to one account, you need to ensure that you have sign out from that account, because some people will directly close the window and they think that the account will be automatically sign out. Some website will automatically sign out your account but not all. You need to make sure that you have signed out to the account and make a double check by log in another time to that website.

Friday, June 26, 2009

The threat of Online Security:How safe is our data?

Computer plays a major role in our daily life. Without computer, a lot of tasks couldn’t be done. For example, we need a computer to do assignments, communicate, do online shopping, news feed, and to find information. However, the doubt on how safe is the data disclosed still remains an issue to all Internet users. Crimes don’t only exist in real world but also in Internet. Worries on whether private information such as credit card number will be misused, stolen, loss, or damage still remains. Threat such as phishing, information theft, hackers, viruses and worm are concerns of traders as well. Therefore, traders are still trying their very best to prevent their customers’ information from being stolen, loss, misuse, as well as damage.

1. Phishing

Phishing is an act of obtaining access to passwords, identity details, and credit card information by posing as a trustworthy website such as Maybank2u, Amazon, eBay, and Public Bank through emails or Instant Messaging. Phishing concept is similar to ‘fishing’ whereby the theft leads to bait used to gain personal and financial information. Not only steals information, sometimes phishers also infect the computer with viruses or worm.

2. Information Theft

Similar to phishing, information theft is also a crime of stealing private information thru the Internet. Most popular information theft is the credit card number theft. The use of credit card has widened as people do their purchases online. It is the easiest area to use fraudulent as it has no extra identification number to use. Website without proper security such as free hosting websites is main target. Therefore, purchasing from a trusted entity is much safer.

3. Hackers

Black hat hackers are individual that breaks into others computer system to access forbidden information and cause some damages. However white hat hackers are those that work for big corporation to test out their latest website in order to offer a safe website and program to the public. For example, Maybank hires hackers to try out their website, http://www.maybank2u.com/ to make sure their security are safe enough and there are no loop holes for hackers to break into their system and steal and damages their information.

4. Computer Virus

Computer virus corrupts files and programs in a computer, causing the files and program damages. It infects a computer without the permission or knowledge of the computer owner. Types of viruses include Trojan horse, worms, most rootkits, spyware, crimeware and many more. Computer may be infected by virus thru clicking on website pop up, email links, corrupted files, pendrive, downloads, as well as programs. Installation of anti virus software can minimize the risk of virus attack on ones computer.


Therefore, users are advice to be careful when they are doing any online transaction. Get confirmation from the bank before disclosing any important data such as password and user ID. Moreover, important data in the computer may be abused if one lost their laptops or computer files are corrupted. Therefore, users are advise not to keep personal data such as ATM password, e banking password, or even credit card number in the computer system, but rather write it down on a notebook.

Phishing

Phishing is a fraudulent technique to steal the identity of a company to acquire the sensitive and confidential information of its customers. For examples, the customers’ personal information such as username or password.

Spy-phishing is a phishing technique with spyware programs which target on online banking and other websites. The phisher normally uses SPAM, malicious websites, email and instant messaging to trick users and login into their personal account so that they are able to steal their information. This information is then sending to the fraudster who then uses it, mostly for bank and credit card fraud. This is the most common phishing tactic nowadays.

Phishing has become more and more serious fraud nowadays. As users of the online application, we must protect and prevent ourselves from getting into those tricks.

Firstly, users must verify the authenticity and security of the websites. A user must login to their account by using the company’s official website rather than login through any hyperlink or email. Most of the banking websites are now warning their users not to login through any email or hyperlink and ignore email that require the users to update their personal information. Also, never reply to any email or pop up messages from company that ask for personal information.

Users must secure their computers with the antivirus software and firewall software. They have to ensure all of the software is updated frequently before they conduct any online activities. However, the users are highly recommended to install online anti-phishing software. There are two type of anti-phishing software: blacklist/ white list based and rule- based. The blacklist/ white list based will warn the users whenever they visit those phishing sites while the rule- based will check the security of the visited web site according to the rules established.
On the other hand, education can be provided and users are acknowledged regarding the danger of phishing. The users are taught to understand what phishing is and how phishing can attack and endanger them. The users must also be alert to identify and detect the phishing email. They may block the sites to prevent the phishing attack.

Last but not the least; users can block the phishing email by using anti spam software or spam filter. This filter could scan the contents as well as the information of the email to determine whether the email is sent by the identified sender and thus decreasing the phishing attack.

Example of phishing email of Citibank:

Thursday, June 18, 2009

Boo.com – E-commerce failure and its causes


Boo.com was launched 3rd November 1999, with approximately $125million of funding from Europe largest luxury goods group. It was actually a high profile e-tailer website, but due to several serious problems in managing the site, Boo.com had failed in this competing industry.

Boo.com spent a lot for consultancy fees after the launched had been delay for 6 months. The online virtual shopping assistant “Miss Boo” did not successfully helping visitors with purchasing experience. The site was reported slow browsing, poor navigation and irritating technology which caused bad reputation for Boo.com. Moreover, Boo.com can’t fulfill the “three click rules” in web design, which means customer should be able to access to their product information not more than three clicks. Boo.com makes the process over complicated. Besides, computer text appeared instead of graphics causes customers unable to view and purchase the products. Customers’ complaint on the poor online shopping experience that advised customer to limit their transaction discourages customers to drop on the site again. This is because there is no site-testing before it is launched, and they ignore the users of their site.

Boo.com has a nice graphic and 3-D view on the products, but they ignore the price of those products. The bad marketing completely shows where Boo did not fulfill 3 important criteria which are “ease/convenience”, “better prices” and “speed of process”. Furthermore, there is bad planning in expanding their business plan. The management tries to dominate in the market immediately instead of expanding step by step.

Boo.com had lack of sound financial management, due to huge cost spend on technological and employee benefits. Besides, Boo.com did not have a manager to oversee its spending. Instead of cut down the cost, Boo.com employs excessive employees which show a bad human resource management in the company.

The last and the main reason Boo.com fail is where investors refuse to continually inject money into business after it has spent $380 million. This force Boo.com into liquidation and finally it was bought by a US fashion portal, Fashionmall.com.

Revenue model for Google, Amazon.com & e-Bay

E-commerce consists of buying and selling products through computer process and it is quite popular nowadays. Some company focusing on using e-commerce to conduct their business. Some people may be confused that without physical transfer of money, how are these companies going to survive? How are they going to earn money? The answer is through revenue model.

A Revenue Model lays-out the process by which a company actually makes money by specifying how it is going to charge for the services provided. What is the revenue model for Google, Amazon.com and eBay?

Google is a useful and popular search engine; it has many revenue models such as Google AdWords and Google AdSense. Google Adwords is a pay per click advertising program designed to allow the advertiser to present their advertisement to the user. Pay-Per-Click (PPC) is an online advertising payment model in which payment is based on qualifying click-through. An advertiser has to pay every time his advertisement receives a click. When a user search for something, there are some related advertisement will be shown on the right side of the screen. You can see a clear picture as below:

If you are interested to advertise in Google you can log on to www.adwords.google.com for more information.

Google AdSense is an advertisement serving program. Website owners can enroll in this program to enable text, image and, video advertisements on their sites. Revenue is generated on a per-click or per-thousand-ads-displayed basis and the advertisement are administered by Google. AdSense program includes AdSense for search and AdSense for content. Advertisers are required to pay Google a fee each time a user clicks on one of their ads displayed on Google Network members’ web sites. Here is the picture for Google AdSense:



Amazon.com is an American-based multinational e-commerce company. It sell product online such as electronic device, books and games. Amazon is the most successful online-shopping website.

Amazon Marketplace is an online marketplace that allows sellers to sell their product. Buyers can buy new or used items which are sold directly by a third party through Amazon Marketplace; this has created profit for Amazon. Besides that, Amazon will charge a commission rate based on the sale price of an item. When each transaction is being done, Amazon will also charge transaction fee to the seller. In addition, Amazon also allows some user to advertise their advertisement on their website.

eBay is an online auction
and shopping website in which people and businesses buy and sell goods and services worldwide. It also establishes localize website in many countries including Malaysia. EBay generates revenue from a number of fees such as insertion fees, promotional fees, and final value fees.

Insertion fees: When an item is listed on eBay, a non-refundable fee is charged.
Final value fees: Fees that charged to the seller at the end of each auction.

Here is an example of the auction:


Every e-commerce business is continuously creating new revenue model in order to bring more profit to the organization. We hope to see a lot of revenue model in the future.

History and evolution of e-commerce


E-commerce has tremendously developed over the past few years. It can be defined as the transaction of selling, buying, transferring or exchanging goods, information and services using the Internet. In the past, people need to go to a physical shop to shop for clothing, groceries, food and many more. However, since e-commerce wan introduced, shopping and travelling time can be cut down. Today, the most successful firm with e-commerce based would be Airasia. Most firm nowadays use E-commerce as a way to cut cost (permit cost, material cost) while trying to improve e their services and goods to be able to compete with other organization in offering their customer a better quality of goods and wider range of products.

History of e-commerce is dated back to when the term “buying and selling”, internet, computer and electricity was invented and introduced. It all started in 1991 when Internet was opened for commercial use. With the help of Electronic Funds Transfer and Electronic Data Interchange which appeared in late 1970s, users are able to exchange business information and carry out electronic transaction. Organizations and companies are able to send commercial documentation electronically to its supplier, customers, as well as creditors.

In 1984, the Electronic Data Interchange was standardized through ASCX12, enabling the transfer of large amount of transaction become more reliable and stable. Next development occurred in 1992 when Mosaic web-browser was made available and adapted into Nescape. It enables easier and convenient access to electronic commerce. This is when online retail products are offered and purchases are made online by the customer The Digital Subscriber Line (DSL) was introduced which allows faster access and more stable connection to the internet.

The development and success of E-commerce can be seen in 1995 with two biggest E-commerce based companies which are Amazzon.com and eBay.com. In 1999, retail spending over the Internet reaches $20 billion according to business.com and is still expending again day after day.