Friday, July 3, 2009

Credit Card Debts: Causes& Prevention

Open your wallet now, and count, how many credit cards you have?
Check on your monthly bills, how much you have to pay every month for your credit card debts?

Nowadays, nearly everyone has access to a credit card. Many of us like to put some bills onto credit card and try to delay the payment as long as possible. Credit card companies offered different interest rates and payment schedule which you think it is easier and cheaper to solve your bills. But, it actually makes users harder to pay off all the debts. Thus, it created more and more credit card debts and also the interest charges on overdue balances.

So, check out how to build a healthy financial status. We need to find out what the causes of credit card debts are and how we prevent it from threaten our financial health.

1) Poor financial management: we always spending money using credit cards, but when the bills reach your hand, you have no idea where you spent so large amount of money that month. Thus, we have to work out a plan on spending. Therefore, a budget for whole month is really needed. You can just write out your expenses daily, and compare to your income, so that you won’t spend more than you earn each month.

2) Zero saving or too little: once you recognize your expenses each month, figure out 5% - 10% of your income to set aside for emergencies or unexpected expenditure. People used to pay their car repair fees or medical expenses by credit cards since they have no saving for those unexpected fees. So, just prepare some saving to avoid unwanted debts or financial strain.


3) Spending habit: woman mostly, shop for a whole day and just using few credit cards on payment. But they have no idea how much they had spent for the whole day. Every time you pull out the credit card to pay at the counter, the debts is become higher and higher. Credit card is not cash which you can physically feel the thickness it appear in your wallet. So, you must record and limit the amount you spend every time you make payment.

4) Limit the cards in wallet: every credit card has its own set of terms and condition including varying interest rates, penalties, fees, and due dates. Try to bring one or two cards instead of five or six. If you focus all your expenses on two cards, you can easily found the total amount you spent. But, if you pay using different card every time, you will forget the amount you spent and interest rate for each card. Besides, try to compare each credit card companies and find out the lowest interest rates companies.


5) Pay on time: some people used to pay only the minimum amount of monthly bill. But, it actually makes you pay more interest in the future. Because of the universal default clause in credit cards terms and conditions, credit cards companies can raise your interest rate if you are late paying creditor or utility company. Therefore, never make a late payment and try to pay earlier since the interest calculated based on average daily balance. So, the earlier you pay the less interest you pay.

Electronic Currency

In the E-commerce world today, there are more and more advancement and technology in conducting this activity. As for the electronic payment system, people have implemented the electronic currency in today E-commerce trading.

Electronic currency is also known as electronic money, electronic cash, digital currency, digital cash as well as digital money. The use of the electronic money is done through the computer networks, the internet and also the digital stored value system. This money is only exchange electronically. It assisted in the online-based purchases and sales transaction conveniently.

Electronic benefit transfer (EBT) is one of the examples of the use of electronic currency. It is the business-to-business E-commerce which is use to made payment electronically. Additionally, E-Check is also one of the electronic currencies which function as the paper check. It is the electronic version of a paper check with some additional function as compare with the traditional paper check. It is a useful tool to make online shopping payment.

Users may be benefited much by using the electronic currency. It serves as a universal media of exchange which allowed users to make quick online payment ubiquity at anywhere anytime provided that there is an internet connection. With the speed of transferability, it enables the users to send and receive money instantly from anyone all around the globe.

On the other hand, it also provided a safe and secure system to make your payment. Various types of safeguard are there to identify the fraud, chargeback prevention, funds verification, PIN verification and others security system.

People also can invest in electronic currency to make more money. There are only few simple steps in order to enjoy the profits of this investment. A user does need to open an electronic currency account which is free of charge, purchases the electronic currency through the electronic currency processor in their account, invest it in the trustworthy HYIP programmes, transfer the electronic currency profits from HYIP system to your account, and lastly convert the electronic money into real money.

However, there are some issues identified in the use of electronic currency. Problem arises when it come to the collection of taxation. Additionally, electronic currency also creates the ease of possibility of money laundering.

In order to encourage the implementation of this new technology in the E-commerce world, more rules and regulation must be created to solve the inefficiencies in using the electronic currency so that E-commerce could achieve its full potential in the future.

Saturday, June 27, 2009

Review on a post on internet security

First of all, I would like to share news in China:
“22 year-old hacker from Hunan steals over 7million RMB from banks”
There is a 22 year-old unemployed man with only a junior high-school education being a hacker and steal money from banks. He purchased a hacking software which used to infiltrate the main computers and websites of Chinese banks to insert “Trojan horse”, and steal the identification numbers, bank account numbers, bank codes, mobile phone numbers and other personal information of banking customers. Thus, he successfully steal over 7 million RMB from the over 300 accounts!

From this news, it means that, nowadays, it is easy to be a hacker, and even easier being hacked! In this e-century, hackers are everywhere. They can hack into your MSN, yahoo, hotmail or others personal websites. That is why we have to learn how to avoid from being hacked! I always receive message from my friends’ msn messenger, sent me some website address link while the sender is appear offline! I feel weird and just ignore it. But, this is actually the hackers who try to send out virus after hacked the user’s msn account. However, after my friend change the password, these things did not happen again.

After reading the password security post in E-Commerce blog, I finally understand why a lot of people being hacked by hacker. They did not care about the security of password. Some people use their name, date of birth as the password that could be easily found out by everyone. Although it may be easier to remember the password, we should change the password every month to avoid hacker. Besides, avoid using the same password for every applications or account login.

I would like to share some ways to create a secure password and STOP being hacked to protect your private personal information. 1. Avoid using personal information: never use your name, spouse name, or date of birth as your password.
2. Do not use real words: try to create your own words that could not find in dictionary.
3. Mix different character types: create a password which include different type of character such as ‘#’ or ‘&’.
4. Use a pass phrase: think a sentence or line from song, and create a password using the first letter from each word.
For example: “I like to wear Nike shoes” we can change it to:‘il2wns’
5. Use password management tools: password management tools can remember password securely and easier for user.

The post I review:
1.
http://ecommerze.blogspot.com/search/label/Internet%20Security
2.
http://chinanewswrap.com/2009/06/24/22-year-old-hacker-from-hunan-steals-over-7-million-rmb-from-banks/

How to safeguard our personal& financial data?

How safe is our data? Do you know how to protect your data? For me, I only know the basic way to protect my data. Nowadays, my way to protect data is outdated, because there is a lot of software that can easily hack into my data or computer. Hacker is the “most professional people” that steal the data; they can easily steal data without your knowledge. As this is very dangerous for the innocence people, that is you and me, because we don’t know have strong knowledge in protecting our data. In order to adapt to current situation, we need to start to protect our data now.

There are some ways to safeguard our data:
1) Set up password
Setting up password is the most basic way to protect data, but the others can still steal your data if your password can be guessed. We avoid using password such as birthday, name and identity card number, this type of password is can be easily guessed by other people. Besides that, we should not use repeating word in a password e.g. Betty. The length of the password is also very important, we need to set password that is at least 7 words long. Nowadays, when setting up the password there will be an identification of the strengtheners of your password. Remember to set the password that is strong enough to avoid stealing of data. 2) Firewall
A firewall is a part of a computer system or network that is designed to block unauthorized access. Firewalls are usually used to prevent unauthorized users from accessing private networks, especially
intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that are unauthorized. Firewall is suitable for individual or organization use. There is a lot of firewall software that are available in the internet; you can download it for free. 3) Antivirus Software
A computer virus is a
computer program that can copy itself and infect a computer without the permission of the owner. Virus can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer. In order to avoid virus hacking our computer, we need to install antivirus software. The software must be very strong enough to “kill” the virus. Besides that, we need to update antivirus software everyday, so there will be strong protection for our data. 4) Log in, log out
When you log in to some website, the website may keep your username and password. This may be dangerous when you using public device to log on to that website. Others may steal your data without your knowledge. So, when you log in to one website, you need to make sure that you have clear the data. This will ensure that your data will not be hack by others. Besides that, when you sign in to one account, you need to ensure that you have sign out from that account, because some people will directly close the window and they think that the account will be automatically sign out. Some website will automatically sign out your account but not all. You need to make sure that you have signed out to the account and make a double check by log in another time to that website.

Friday, June 26, 2009

The threat of Online Security:How safe is our data?

Computer plays a major role in our daily life. Without computer, a lot of tasks couldn’t be done. For example, we need a computer to do assignments, communicate, do online shopping, news feed, and to find information. However, the doubt on how safe is the data disclosed still remains an issue to all Internet users. Crimes don’t only exist in real world but also in Internet. Worries on whether private information such as credit card number will be misused, stolen, loss, or damage still remains. Threat such as phishing, information theft, hackers, viruses and worm are concerns of traders as well. Therefore, traders are still trying their very best to prevent their customers’ information from being stolen, loss, misuse, as well as damage.

1. Phishing

Phishing is an act of obtaining access to passwords, identity details, and credit card information by posing as a trustworthy website such as Maybank2u, Amazon, eBay, and Public Bank through emails or Instant Messaging. Phishing concept is similar to ‘fishing’ whereby the theft leads to bait used to gain personal and financial information. Not only steals information, sometimes phishers also infect the computer with viruses or worm.

2. Information Theft

Similar to phishing, information theft is also a crime of stealing private information thru the Internet. Most popular information theft is the credit card number theft. The use of credit card has widened as people do their purchases online. It is the easiest area to use fraudulent as it has no extra identification number to use. Website without proper security such as free hosting websites is main target. Therefore, purchasing from a trusted entity is much safer.

3. Hackers

Black hat hackers are individual that breaks into others computer system to access forbidden information and cause some damages. However white hat hackers are those that work for big corporation to test out their latest website in order to offer a safe website and program to the public. For example, Maybank hires hackers to try out their website, http://www.maybank2u.com/ to make sure their security are safe enough and there are no loop holes for hackers to break into their system and steal and damages their information.

4. Computer Virus

Computer virus corrupts files and programs in a computer, causing the files and program damages. It infects a computer without the permission or knowledge of the computer owner. Types of viruses include Trojan horse, worms, most rootkits, spyware, crimeware and many more. Computer may be infected by virus thru clicking on website pop up, email links, corrupted files, pendrive, downloads, as well as programs. Installation of anti virus software can minimize the risk of virus attack on ones computer.


Therefore, users are advice to be careful when they are doing any online transaction. Get confirmation from the bank before disclosing any important data such as password and user ID. Moreover, important data in the computer may be abused if one lost their laptops or computer files are corrupted. Therefore, users are advise not to keep personal data such as ATM password, e banking password, or even credit card number in the computer system, but rather write it down on a notebook.

Phishing

Phishing is a fraudulent technique to steal the identity of a company to acquire the sensitive and confidential information of its customers. For examples, the customers’ personal information such as username or password.

Spy-phishing is a phishing technique with spyware programs which target on online banking and other websites. The phisher normally uses SPAM, malicious websites, email and instant messaging to trick users and login into their personal account so that they are able to steal their information. This information is then sending to the fraudster who then uses it, mostly for bank and credit card fraud. This is the most common phishing tactic nowadays.

Phishing has become more and more serious fraud nowadays. As users of the online application, we must protect and prevent ourselves from getting into those tricks.

Firstly, users must verify the authenticity and security of the websites. A user must login to their account by using the company’s official website rather than login through any hyperlink or email. Most of the banking websites are now warning their users not to login through any email or hyperlink and ignore email that require the users to update their personal information. Also, never reply to any email or pop up messages from company that ask for personal information.

Users must secure their computers with the antivirus software and firewall software. They have to ensure all of the software is updated frequently before they conduct any online activities. However, the users are highly recommended to install online anti-phishing software. There are two type of anti-phishing software: blacklist/ white list based and rule- based. The blacklist/ white list based will warn the users whenever they visit those phishing sites while the rule- based will check the security of the visited web site according to the rules established.
On the other hand, education can be provided and users are acknowledged regarding the danger of phishing. The users are taught to understand what phishing is and how phishing can attack and endanger them. The users must also be alert to identify and detect the phishing email. They may block the sites to prevent the phishing attack.

Last but not the least; users can block the phishing email by using anti spam software or spam filter. This filter could scan the contents as well as the information of the email to determine whether the email is sent by the identified sender and thus decreasing the phishing attack.

Example of phishing email of Citibank:

Thursday, June 18, 2009

Boo.com – E-commerce failure and its causes


Boo.com was launched 3rd November 1999, with approximately $125million of funding from Europe largest luxury goods group. It was actually a high profile e-tailer website, but due to several serious problems in managing the site, Boo.com had failed in this competing industry.

Boo.com spent a lot for consultancy fees after the launched had been delay for 6 months. The online virtual shopping assistant “Miss Boo” did not successfully helping visitors with purchasing experience. The site was reported slow browsing, poor navigation and irritating technology which caused bad reputation for Boo.com. Moreover, Boo.com can’t fulfill the “three click rules” in web design, which means customer should be able to access to their product information not more than three clicks. Boo.com makes the process over complicated. Besides, computer text appeared instead of graphics causes customers unable to view and purchase the products. Customers’ complaint on the poor online shopping experience that advised customer to limit their transaction discourages customers to drop on the site again. This is because there is no site-testing before it is launched, and they ignore the users of their site.

Boo.com has a nice graphic and 3-D view on the products, but they ignore the price of those products. The bad marketing completely shows where Boo did not fulfill 3 important criteria which are “ease/convenience”, “better prices” and “speed of process”. Furthermore, there is bad planning in expanding their business plan. The management tries to dominate in the market immediately instead of expanding step by step.

Boo.com had lack of sound financial management, due to huge cost spend on technological and employee benefits. Besides, Boo.com did not have a manager to oversee its spending. Instead of cut down the cost, Boo.com employs excessive employees which show a bad human resource management in the company.

The last and the main reason Boo.com fail is where investors refuse to continually inject money into business after it has spent $380 million. This force Boo.com into liquidation and finally it was bought by a US fashion portal, Fashionmall.com.

Revenue model for Google, Amazon.com & e-Bay

E-commerce consists of buying and selling products through computer process and it is quite popular nowadays. Some company focusing on using e-commerce to conduct their business. Some people may be confused that without physical transfer of money, how are these companies going to survive? How are they going to earn money? The answer is through revenue model.

A Revenue Model lays-out the process by which a company actually makes money by specifying how it is going to charge for the services provided. What is the revenue model for Google, Amazon.com and eBay?

Google is a useful and popular search engine; it has many revenue models such as Google AdWords and Google AdSense. Google Adwords is a pay per click advertising program designed to allow the advertiser to present their advertisement to the user. Pay-Per-Click (PPC) is an online advertising payment model in which payment is based on qualifying click-through. An advertiser has to pay every time his advertisement receives a click. When a user search for something, there are some related advertisement will be shown on the right side of the screen. You can see a clear picture as below:

If you are interested to advertise in Google you can log on to www.adwords.google.com for more information.

Google AdSense is an advertisement serving program. Website owners can enroll in this program to enable text, image and, video advertisements on their sites. Revenue is generated on a per-click or per-thousand-ads-displayed basis and the advertisement are administered by Google. AdSense program includes AdSense for search and AdSense for content. Advertisers are required to pay Google a fee each time a user clicks on one of their ads displayed on Google Network members’ web sites. Here is the picture for Google AdSense:



Amazon.com is an American-based multinational e-commerce company. It sell product online such as electronic device, books and games. Amazon is the most successful online-shopping website.

Amazon Marketplace is an online marketplace that allows sellers to sell their product. Buyers can buy new or used items which are sold directly by a third party through Amazon Marketplace; this has created profit for Amazon. Besides that, Amazon will charge a commission rate based on the sale price of an item. When each transaction is being done, Amazon will also charge transaction fee to the seller. In addition, Amazon also allows some user to advertise their advertisement on their website.

eBay is an online auction
and shopping website in which people and businesses buy and sell goods and services worldwide. It also establishes localize website in many countries including Malaysia. EBay generates revenue from a number of fees such as insertion fees, promotional fees, and final value fees.

Insertion fees: When an item is listed on eBay, a non-refundable fee is charged.
Final value fees: Fees that charged to the seller at the end of each auction.

Here is an example of the auction:


Every e-commerce business is continuously creating new revenue model in order to bring more profit to the organization. We hope to see a lot of revenue model in the future.

History and evolution of e-commerce


E-commerce has tremendously developed over the past few years. It can be defined as the transaction of selling, buying, transferring or exchanging goods, information and services using the Internet. In the past, people need to go to a physical shop to shop for clothing, groceries, food and many more. However, since e-commerce wan introduced, shopping and travelling time can be cut down. Today, the most successful firm with e-commerce based would be Airasia. Most firm nowadays use E-commerce as a way to cut cost (permit cost, material cost) while trying to improve e their services and goods to be able to compete with other organization in offering their customer a better quality of goods and wider range of products.

History of e-commerce is dated back to when the term “buying and selling”, internet, computer and electricity was invented and introduced. It all started in 1991 when Internet was opened for commercial use. With the help of Electronic Funds Transfer and Electronic Data Interchange which appeared in late 1970s, users are able to exchange business information and carry out electronic transaction. Organizations and companies are able to send commercial documentation electronically to its supplier, customers, as well as creditors.

In 1984, the Electronic Data Interchange was standardized through ASCX12, enabling the transfer of large amount of transaction become more reliable and stable. Next development occurred in 1992 when Mosaic web-browser was made available and adapted into Nescape. It enables easier and convenient access to electronic commerce. This is when online retail products are offered and purchases are made online by the customer The Digital Subscriber Line (DSL) was introduced which allows faster access and more stable connection to the internet.

The development and success of E-commerce can be seen in 1995 with two biggest E-commerce based companies which are Amazzon.com and eBay.com. In 1999, retail spending over the Internet reaches $20 billion according to business.com and is still expending again day after day.

E-commerce success and its causes- eBay

In today business world, e-commerce is become more and more important for business activity which conducted over the internet. As we can see, there is more business engaged and sell the products and services online.

eBay, is one of the most successful example of e-commerce business. It is the world’s largest online marketplace, where anyone can trade online anytime and anywhere. There are million items available for fixed-price and also auction-style trading which is conducted online in their day to day e- commerce business.

Questions arose as how eBay did and the reason of the success and sustainability to be the leading in the online trading platform?
The key successful factor is the trust and safety. eBay has developed a Trust and safety team which is responsible to maintain a safe trading marketplace for people from all around the world to trade with each other. For example, there is a set of rules and regulation to guide the clients whenever they trade in eBay. The rules and regulation is strictly enforceable to prevent any fraud and unethical transactions occurred.

Moreover, eBay’s transaction processing to make online payment is supported by the PayPal, which is the leader in the online payment solution. It enables an individual and business to securely and easily make or receives their payment by online. On the other hand, PayPal fraud prevention would keep buyers’ financial information private and highly confidential from the sellers and other to others unauthorised access. Other than using PayPal to make the payment, buyers also can make their payment by credit card, debit card, Paymate, Propay and other payment methods.

The next success contributor to eBay is a convenient platform to search and bargain for the item. A buyer can find the items that they wish to purchase by either searching or browsing through the catalogue. For the buyer who is looking for a specific item, they can just enter the descriptive or key word of the item into the search column. There are also some specific options which allow the buyer to narrow their search.

Also, eBay provides a feedback option which enables the buyers or sellers to leave their feedback and comments on particulars products, services, and even comment on the members. This option played a significance role because it is a useful option which ensures the buyers with the reputation of members before they trade with each others. This can increase the trustworthy of a buyer to other members who they wish to trade with.

To be sustainable and continue to be the leading in e-commerce, eBay is striving for continuous improvement in all aspect.