CLICK HERE FOR THOUSANDS OF FREE BLOGGER TEMPLATES »

Friday, July 4, 2008

E-Government in Malaysia: Its implementation so far and citizen’s adoption strategies.

E-government is the use of information and communications technology (ICT) to promote more efficient and cost-effective government, facilitate more convenient government services, allow greater public access to information, and make government more accountable to citizens.


While e-government is often thought of as "online government" or "Internet-based government," many non-Internet "electronic government" technologies can be used in this context. Some non-internet forms include telephone, fax, PDA, SMS text messaging, MMS, wireless networks and services, Bluetooth, CCTV, tracking systems, RFID, biometric identification, road traffic management and regulatory enforcement, identity cards, smart cards and other NFC applications; polling station technology (where non-online e-voting is being considered), TV and radio-based delivery of government services, email, online community facilities, newsgroups and electronic mailing lists, online chat, and instant messaging technologies. There are also some technology-specific sub-categories of e-government, such as m-government (mobile government), u-government (ubiquitous government), and g-government (GIS/GPS applications for e-government).


Citizens generally will expect and demand governmental services with a high degree of quality, quantity, and availability in a 24-hour, seven-days-a-week, and year-round fashion. But, in the real life it is difficult to fulfill these requirements. Customer preservation in e-services is mainly significant because of the low switching costs, little is known about how consumers distinguish and estimate electronic service release. This is of mainly imperative in the public sector where government organizations have to carry their services by electronic means without a tolerant of why citizens would use electronic service delivery channels more than other traditional service delivery methods, government organizations cannot take the required strategic behavior to meet their citizen reception targets for these channels and decrease costs. Therefore, this attempt to examine usage intent and consider possible changes.


To make sure the citizen are satisfied with the e-government performance, they reduce travel and waiting time, introduce a more efficient payment methods, improve transparency of government’s operation, improve poor governance and reduce systemic corruption, and eventually lead to transformation of governance. This is an important point, because the success and acceptance of e-Government initiatives are dependent on citizens’ willingness to adopt and utilize these services. Success in delivering electronic services depends upon the capability and self-confidence of citizens in performing e-transactions, as well as their trust and confidence in the protection of their personal data within an open and accountable government.


You may link to http://www.gov.my/MyGov/BI/Directory/Citizen/Home.htm for the further informations.

Thursday, July 3, 2008

Things to take note to prevent e-auction fraud when a consumer participating in an e-auction.

According to the National Consumers League, all of the e-commerce activities conducted over the Internet, fraud is most prevalent and serious in e-auctions. There are many type of e-auction fraud around the Internet, such as Bit Shielding (use of phantom bidders to bid at a very high price when an auction begins), Shilling (placing false bids on auction items to artificially jack up the bidding price) and etc.

How to prevent e-action fraud when a consumer participating in an e-auction?

The following are antifraud measures for consumer participating to the e-auction.
1. Examine the insurance policy provide by the e-auction company. The function of Insurance is to protect the buyer, seller and service provides would not suffer any financial loss when conducting auction.
2. Some of the e-auction has provided authentication service. The product authentication is a way of determining whether an item is real and described appropriately. This service can increase the reality and validity of the product to make sure it is no come from illegal.
3. Escrow service is a service that protects the buyer and seller. This service is through the third party to make a double security protection. The buyer pays to the escrow service, which verifies the payment and alerts the seller when everything checks out. After that, the seller only ships the goods to the buyer. After am agree-upon inspection period the buyer notifies the service, which then sends a check to the seller.
4. An e-auction have provide for a physical inspection can eliminate many problem. This is especially true for collectors’ item.

Nowadays, fraud is very serious and difficult to prevent especially in the simulation world—Internet. When we participating the e-auction, we cant see the other face and dun know who are them, although it have many method for us to prevent, we still want to take care the process.

Tuesday, July 1, 2008

“Other that bank ATM card and bank debit card, still have other payment method can no need bring cash also let us done patty cash payment?”

Now, Touch ‘n Go have provide those service.

Normally, Touch ‘n Go are mainly be used at all highways in Malaysia, major public transports in Klang Valley, selected parking sites and theme park.

In the mid of 2008, Touch ‘n go is expending their application and services towards the retail purchase, such as A&W, Burger King, Dunkin’ Donut, 7-eleven, Carrefour hypermarkets, Caltex convenience store and Cineleisure.

Touch ‘n Go, bank ATM card and Debit card are let user can continue using the card as long as it is pre-loaded with electronic cash or saving account, but Touch ‘n Go is more popular and easy use than the other card. The reason is it no age limitation for using this card and no other extra charge for the card owner to the retail purchase. Nowadays, who is able pay the RM 10 to buy the Touch ‘n Go card, he or she is able to use the service. Beside that, when the spending in the retail shop which have an agreement with the Touch ‘n Go, it will be no extra charges including.

Touch ‘n Go expand their business model is create a competitive advantage. In the previous year, it already becomes only one card payment tool in Toll and public transports. Now it is expend their service to retail, it will attract many people to use it in the future.

Monday, June 30, 2008

Review: Piracy in Malaysia


Fighting through Education and Enforcement


Do you know that Malaysia is remaining on the US Trade Representative (USTR) piracy watch list that recommended by International Intellectual Property Alliance (IIPA) since year 2001?
The USTR “grades” a country according to its level of Intellectual Property law and enforcement. According to the IIPA’s report on piracy, Malaysian business software piracy is up to point 61%, it is terrible figure!


Currently, the most important thing is to find a way on how to reduce the percentage of the software piracy to the world average of 35%.


After reading this blog, I able to found that Malaysian government have recognized 2 approaches -Enforcement (Ops Tulen) and Education (Sikap Tulen) to solve this issue.
Enforcement is continuous raiding companies that use illegal software as well as the illegal vendors selling the pirated software.
Education is to educate the relevant groups on the important of respecting Intellectual Property and stay away from pirated software. Those targeted groups are professionals, companies, public and IT malls.


As we know, software piracy in the workplace is a criminal offence, under the Corporate Act 1997, if a business is found with illegal copies of software, as well as its directors, senior management may face criminal prosecution. Those found guilty would be fined between RM 2000 and RM 20,000 for each infringing copy of software or sentenced up to 5 years jail or both. Even there is a serious penalty for those people using piracy software, still many companies are using pirated software in their business despite the government’s fight against software piracy.
In my opinion, it is impossible to change people mindset overnight, therefore Malaysian government still have to continue with the Sikap Tulen campaign and add more element to that campaign to educate consumer about IP.


The mix of education and enforcement surely can bring down the country in its fight against IP infringement. Dear friends, Business Software Alliance have rewarding all informants with up to RM 20,000. If you have any information can call the hotline at 1800-887-800 or log on to www.bsa.org/malaysia.


Corporate Blogging


Nowadays, blogging activity is very popular among the individual and organization. A blog is a website and maintained by an individual which become as a personal online diaries. On the other hand, a corporate blog is published and used by an organization to reach its organizational goals. The advantage of corporate blog is that posts and comments are easy to reach and follow due to centralized hosting.
Corporate blog is giving established companies and obscure brands the ability to connect with their customers on a more personal level, build trust, collect valuable feedback and foster strengthened business relationship. More importantly, the company is enjoying tangible returns in the blogging investment in the form of increased sales and business opportunities.
In the corporate blog, the blogger can share useful and engaging content, such as the latest information, discussion topics and ideas. In addition, the company can connect the customers’ knowledge and ideas in order to find better ways to satisfy their needs and wants.
In conclusion, the most important of corporate blog is that blogging is a tool for communication within inside or outside the organization. A corporate blog primarily are used for national branding. It allows company to present accurate information without the filter of the media or advertising. ( 209 words )
15 Most Popular Corporate Blogs
#15. Boeing - Authority: 67
#14. Monster - Authority: 73
#13. Kodak - Authority: 105
#12. Delta - Authority: 252
#11. Yahoo! - Authority: 297
#10. General Motors - Authority: 364
#9. Ask - Authority: 364
#8. LinkedIn - Authority: 591
#7. Digg - Authority: 641
#6. Dell - Authority: 799
#5. Yahoo! Search - Authority: 1130
#4. Facebook - Authority: 1478
#3. Flickr - Authority: 1744
#2. Adobe - Authority: 1797
#1. Google - Authority: 8492

Thursday, June 26, 2008

The application of pre-paid cash card for consumers

In the recent years, the “Pre-paid Cash Cards” came into existence and popularity. Pre-paid cash cards have surpassed credit cards and checks worldwide as the dominant non-cash consumer payment system. The card can be used to purchase a wide range of goods and services including telephone services. The card can also be used to make cash withdrawals at an ATM or a point-of-sale terminal.


Pre-paid cash ca
rd can be issued to “bankable people” and “unbanked people” which are no bank account needed, no banking history needed, no credit check, no employment verification needed and everyone can be approved to use it.


By the way, pre-paid cash cards are much safer for the banks to issue because all transactions for these new cards are authorized online against account balances. The payment option of pre-paid cash card is quickly and securely moves “checking account like” funds without the hassles or risks involved with paper checks. Security features such as personal identification numbers (PINs) also protect consumers against theft and fraud.


Pre-paid cash card has a numbers of advantages and consumers prefer pre-paid cash card because they act virtually the same as cash, only with much more security. Consumers who make debit card purchases are free of interest charges associated with credit cards. Consumers can conveniently and inexpensively transfer funds to friends and relatives anywhere. Un-banked consumers can pay bills and purchase products and services online or through phone calls.


In the conclusion, the pre-paid cash cards are more convenient and safety for consumer. That’s why rec
ent years the pre-paid cash cards are become popularity.

Wednesday, June 25, 2008

What is electronic currency?


What is electronic currency? Do you heard about it before?

Let’s me take this opportunity to explain to you what is electronic currency!
Electronic currency refers to money or scrip which is exchanged only electronically or a system of debits and credits, used (but not limited to this) to exchange value, within another system, or itself as a stand alone system, online or offline.Basically, this involves use of computer networks, the internet and digital stored value systems, for instance, the Electronic Funds Transfer (EFT) and direct deposit. As addition, it is a collective term for financial cryptography and technologies enabling it.

E-currency is use in the E-micropayment systems such as Firstgate’s Click and Buy, PayLoadz, Paystone Technologies, DidiCash and else.
Now, let us look at PayLoadz in detail. Payloadz is a service to sell intangible products such as softwares, e-books, digital art, manuals, articles and files. It is an automated delivery service which means these files can be either download via hyperlink or sent via e-mail to consumers once payment is being made. Payloadz also has an easy integration with PayPal’s online payment and Google Check out.

Dear friends, if you want to sale digital PDF files, Payloadz is your best choice. Once your customers download the intangible, and the money flows into your PayPal account. Payloadz services can be used depending upon seller’s sales and product’s life size. The plan include 3 types of account which is Basic Account with 50 MB storage, Premium Account with 100MB-400MB and Corporate Account with 800MB-100000MB.
You may go to link http://www.payloadz.com/ to register on payloadz.

Furthering network evolution in terms of the use of digital cash, a company named DigiCash is at the focus of creating an e-cash system that would allow issuers to sell electronic coins at some value. When they are purchased they come under someone’s own name and are stored on his computer or under his online identity. At all times, the e-cash is linked to the e-cash company and all transactions go through it, so the e-cash company secures anything that is purchased. Only the company knows your information and will properly direct purchases to your location.

Sunday, June 22, 2008

Credit Card Debts: Causes and Prevention

A credit card is a system of payment named after the small plastic card issued to users of the system. In the case of credit cards, the issuer lends money to the users to be paid later to the businessman. It requires the balance to be paid in full each month. Usually, if a user is late paying the balance, finance charged will be calculated which also call credit cards debt. These are due to over-borrowing, slack financial discipline, late repayment and not keeping track of credit reports.
Besides, there is also having some factors that dive a person towards credit card debt. Many people believe having too many credit cards in the wallet is an essential sign of prosperity and the larger the number of credit cards the more money is at their disposal. Moreover, people think that by repaying the monthly minimum they are doing their part towards paying the credit card debt. By paying only the minimum the credit card debt starts accumulating at a rapid rate. Thus, the credit card debts will land up 3 to 10 times the money they borrowed. Another factor is taking cash advances from credit cards. Many users treated credit card as a debit cards. This will cause the users have to paid heavy interest rates and penalty on cash advances. The high interest rates make the repayment tougher.
Although the credit card debts become a burgeoning problem for many users. We also can prevent and avoid it by some common methods. Such as, we can spend money only on buying things that are absolutely necessary to us. On the other hands, a budget is a tool that can tell you about your money where it will go before the money arrive. Hence, you will think before use the money. We also advise people not hold more than one credit card in hand. This is because if the people hold more than one credit card in hand will lead to hard remember the repayment dates. The repayment dates is varying with the credit cards the repayment of credit card debt become messier.
Nowadays, the credit card debts problem had become seriously and this is a signal bring to the users try to solve the problem as early as their can. (379 words)

The threat of online security:How safe is our data?



The technologies today become more and more advance, some of the peoples are work at home via the internet but they now face a problem and they need to recognize that there is no impenetrable security on the Web. More and more, data management also moving to the internet and this may cause a greater security challenges. The common online security threats include viruses, spyware, adware, malware, hackers, Trojans and others. There has much software that can have many security layers, but the data protection is only as good as the website firewall and hackers still can get in and do damage.

Besides that, internet is not a safe place for the web users. Every unprotected online computer can be affected with the online security threats with only in 20 minutes. There are numerous security risks on internet that can lead you to serious financial loss, information theft and the attack on your computer. By the way, do you still think that our data upload to the Web are safe?

Although we can’t perfectly prevent the data stolen but we still have some ways to deal with these threats. As the following, do not open any email attachment from any unknown and unauthenticated source. Never reply to the emails whose identity you don't know. Protect your computer by installing up-to-dated antivirus and antispyware programs and regularly scan your computer with them. Never send your user names, bank account information, passwords and credit card details to someone via emails. Before doing online shopping through a website ensure the validity and repute of that website.

All of the tools cannot guarantee that your data are safety but you can try for it. If you need more information you can contact me or leave your question in our blog maybe we can help.

Review post on Internet Security from My E-Commerceblog

Nowadays, internet is an useful tool for us to make our life easily and we can through internet to settle our life job, such as we can make online payment to purchases thing, searching information, communicate with other through e-mail etc. However, it have many computer viruses, worms and Trojans existing in the internet. It is very harmful and risky to our computer.

In order to protected our computer, internet security aim to prevent unauthorized access and damage to computer systems using internet access. To prevent the unauthorized access our computer, there are many matter to make our computer safety and prevent virus.

Generally, install anti-virus and spy ware –detection software, and a firewall and update on a regular basis is requiring for all computer user. Always keeping anti-virus and anti-spam software up-to-date, it makes it more difficult for scampers to access our computer.

Besides that, using a firewall to prevent hackers from attacking the system and find out vulnerabilities in our computer system. Firewall blocks traffic not authorized to access our PC and enables us to access internet securely and prevent unauthorized applications and people from accessing our PC.

No software installed on your system is perfect for life. Vulnerabilities are bound to be found out in each one of them. So always apply the latest updates & patches to the software.

Review: DIY Eye Glasses Online Shopping

E-tailing??
Do you have any idea about this term? E-tailing is the selling of retail goods in the Internet, which is short for ‘electronic retailing’ and used in Internet discussions as early as 1995.
Today, I want to share with you a review of a blog posted in My E-Commerce blog namedDIY Eye Glasses Online Shopping’.

It is a new business available in internet that allows us to order glasses with the spectacle frame designed by famous Italian designer, the lens incorporated the latest technology from US and assembled in Singapore. Consumer can even view the work-in-progress report through the online systems

Even this e-tailing able to give their consumer the cheapest price for the latest designed glasses and the best quality, it is still imposes some impediments when we purchase it online.

Firstly, when we are buying new glasses, we prefer to try on the frames to see whether it is comfortable to wear and it is fit our face sharp.

Secondly, we will worry whether the glasses fit our lens power if we cannot try on it on the post.
Moreover, this e-tailing only available in oversea optical online store therefore, we cannot find one in Malaysia. If we bought it online we can’t even get a warranty from the seller and can’t get repair from them.


As my conclusion, it is better going to the optical shop personally to purchase glasses that fit us the most even the price might be slightly expensive. Here I provide a list of Malaysian optical shop for those friends need a glasses now.

http://www.superpages.com.my/health/optical-shops/

Tuesday, June 17, 2008

How to safeguard our personal and financial information?

How to safeguard our personal and financial information?

Nowadays, we live in an increasingly online world, we can trade stocks, buy groceries, pay bill and even transfer money through online service provided by the those companies. Almost any financial transaction you need to make can be done in your own home within a few seconds. Nonetheless, those transactions required the user to fill up the relevant information about the user’s personal data and financial data. There is a threat that our information or even our credit card will be embezzled by other in the improper manner. So, I am going to share with all of my dear reader the proper ways to keep our information secure. Let’s check it out!

1. Only Make Purchases On Trusted Sites
For your information, many small online retailers do not have adequate secure payment system. Therefore, the best way to make sure that your information does not get intercepted is by simply sticking with trusted, well-known online retailers or smaller sites that use reputable payment processors like PayPal or Google Checkout. Regardless of which site you use, you should always make sure to look for the padlock icon on the bottom of your browser to verify that the page is safe.

2. Secure Your Network
If you have a wireless network at home or work, make sure that you secure it. A hacker can gain access to anything you do over an unsecured network in a matter of seconds.

3. Install Spam-filtering Software
We must be very leery of "spam" (or junk email) that works its way into your email inbox, which may contain Trojan horses (viruses) that can get into your computer and send your information back to their unsavory creators. For your advice, is better to install spam-filtering software (or ask your email provider whether it can add spam-filtering to your account). It not only wills this cut back on going through your daily pile of junk email, it can also keep your data safe.

4. Don’t Reuse Passwords
It is a good practice to use difference password for every account that you access online. By doing this way, if someone does find out what your password for the credit card they won’t not be able to access your checking, brokerage and email account.

5. Don’t Put Private Information On Public Computers
If you are using public computer make sure that you do not save any private information onto the computer. If you are accessing a private account at library or cyber café, male sure you log out completely from your account and never choose to save login information on these computers, for instance you username and password.

6. Firewall
Before you connect your computer to the internet, you should install a firewall which can be generally described as a security guard for your home computer. This guard can helps protect your PC against hackers and many computer viruses and worms.

As conclusion, if you want to secure your personal data then you must do these steps in predicting being take advantage of by making sure that you keep yourself safe online.

Sunday, June 15, 2008

Phishing: Examples and its prevention methods

Phishing is a fraudulent attempt, usually made through email and often directs users to enter details at a website, to steal your personal information. Such as, usernames, passwords, account number and credit card details. The word “phishing” is play on the word “fishing”, because the sender is fishing for your private account information. Typically, the sender will try to trick you into providing your user name and password so they can access to your personal account. Once they gain access, they can use your personal information to commit identify theft, change your credit card, empty your bank accounts and others.
Usually the sender will trick you by a trustworthy entity in an electronic communication. The common targets are eBay, Amazon.com and others. One example would be if you received an e-mail that appears to be from your bank, and it will request you click a hyperlink in the e-mail and verify your online banking information. After you finished doing the request, it will appear a message that stated in the e-mail for not following the link. When you realized the e-mail is a trap, you already lost all you things in that account and it is too late for you to cry.

example
Besides that, an example of PayPal phish shows that the spelling mistakes in the e-mail, lack of personal greeting, misspelling of simple words and the threat of consequences are those important clues to show the e-mail is phishing attempt. Nowadays, phishing is become seriously in the internet networks. Thus, we need find some prevention methods to solve this problem and reduce the number of people that got stuck by those phishing attempts.
There are several different methods to prevent against phishing. One of the methods is to train people to recognize those common phishing attempts. Besides that, we can prevent it by specialized spam filters. Those spam filters can reduce the number of phishing attempts that reach to addressees’ inboxes. Another method could be getting some anti-phish software from the internet because the software can detect the phishing attempt if you open it.
Phishing is an illegal activity from the internet. Thus, we need to prevent it since today. (361 words)

Friday, June 13, 2008

ReVenue MoDel =>> Google, Amazon.com and eBay

Google is the most general search engine when people need to find information. So that, it is attract many advertisers publish advertisement in Google. As a result, 99% revenue of Google revenue is come from advertisement and the 1% is generate from others services. It is conducting Adverting Revenue Model and Affiliate Revenue Model Revenue Model. Google provide service includes Google Adwords (a pay per click advertising program), Google AdSense (an advertisement program run by Google), Google answer (an Internet search and research service offered for a fee by Google), Froogle (a service from Google that makes it easy to find information about products foe sale online), and Cost-Per-Action. Pay-Per-Click is an online advertising payment model in which payment is based on qualifying click-througs. Nowadays, Google is testing a new advertising progeam that pays site owners based on a Cost-Per-Click model. The program, classed Cost-Per-Action, was revealed via an invitation e-mail from the Google Adsense team to Wed site owners.
Amazon.com is one of the pioneers of e-commerce and first major companies to sell goods by Internet, was launched by Jeff Bezosin 1994.

Amazon.com started as an on-line bookstore, but now they have expend their produce category such as DVD, music CDs, MP3 format, computer software, video games, electronics, furniture, food toys etc. the major source of income of Amazon.com is Sales Revenue Model. It have provide global shipping to certain countries for some of its products.

eBay is an Internet auction site that connects individual buyers and sellers eBay worldwide. is one of the Internet’s leading e-commerce sites, and the company sold $52 billion worth of collectibles, car, electronics and various other items in 2006. eBay generated overall revenue around $6 billion from its three primary business: auctions, payments (PayPal) and communication (Skype). eBay provide only technology platforms and tools for e-commerce and does not have inventory like Amazon.com. The major revenue of eBay is collect transaction fees from buyer nd seller as a Transaction Fee Revenue Model.

Thursday, June 12, 2008

Benefits of E-Commerce


E-commerce is the use of electronic IT to conduct business transactions among buyers, sellers, and trading partners without human intervention. We can categorize E commerce according to the parties involved in the business like B2B, B2C, C2C and C2B.

Cycle Time is the amount of time between a customer placing an order and receiving the goods. E-Commerce can reduce cycle time by eliminating steps in business processes. The steps may be redundant or can be replaced with more efficient technology solutions. The elimination of the steps speeds the overall process and reduces cycle time. E- Commerce reduces the time between the outlay of capital and the receipt of products and services, this is because Internet lets you source globally, verify and validate the information and use the information and guaranteed delivery to reduce cycle time. For example, Dell delivers B2B transactions to reduce cycle time.

Moreover, E-Commerce can also provide employee empowerment by providing employees with greater and easier access to information provided by the employer. E-Commerce allows the decentralization of decision making and authority via empowerment and distributed systems, but simultaneously supports a centralized control.

E-Commerce facilitates customer support by providing a wide range of technological solutions and communication opportunities. Additionally, E-Commerce supports self-help customer service so consumers can answer their own questions, it enables customers to shop or do other transactions 24 hours a day and provides customers with more choices.

Sunday, June 8, 2008

An example of an e-commerce success and its causes


There are a lot of successful examples which using e-commerce to do their business in the world which is eBay, Amazon.com and others. The successful strategy is they are having clear objectives for corporate e-commerce sites. For example, reaching new customers and increasing customer loyalty were the primary objectives for e-commerce merchants.
Now I would like to introduce an example of an e-commerce success which is eBay. eBay was founded in Pierre Omidyar’s San Jose living room back in September 1995. eBay doing their business using World Wide Web to built an online person-to-person trading community on the Internet. Buyers and sellers are brought together in a manner where sellers are permitted to list items for sale, buyers to bid on items of interest.
Nowadays, eBay is a very famous online business in the world. I think that is because eBay allows people to often times connect with some very fond and special early childhood memories. It could be anything from collecting baseball cards to toy soldiers to Barbie dolls to doll house, and so forth.
Another factor to consider, I think that people really enjoy the experience of the shopping bazaar. Besides that, the other factor is that I believe that they really enjoy the competition of the bidding process. Lastly, the other thing is that it has become a very practical place to buy and sell collectibles or commodities.
If you have the interest to buy or sell things in Internet, you can try to using eBay and also can go to eBay’s homepage (http://www.ebay.com.my/) to have a look. (261 words)


Saturday, June 7, 2008

The history and evolution of E-commerce

For your information, E-commerce consists of the buying and selling a product or service over electronic system such as the Internet and the other computer networks. Over the last 30 years, the term e- commerce has changed. History of e-commerce dates back to the invention of the very old notion of ‘sell and buy’, it takes several steps in the history of e-commerce.
The first step came from the development of the Electronic Data Interchange (EDI) and Electronic Funds Transfer (EFT) which been introduced in the late 1970s and standardized through ASC X12. It allows the businesses to send commercial documents like purchase order or invoice electronically and give an opportunity for users to exchange business information.
In 1980s, the growth and acceptance of credit card, automated teller machines (ATM) and telephone banking also a form of electronic commerce. In the following decade, e-commerce continue to be developed, it include enterprise resource planning systems (ERP), data mining and date warehousing. In 1994, internet had begun to advance in popularity among general public. It takes several years to develop the security protocols and DSL which allows rapid access to the internet.
In 20 century, a great number of business companies in United States and Western Europe represented their services in the World Wide Web. The term of e-commerce had been changed as the process of purchasing of available goods and services over the Internet using secure connections and electronic payment services.
Indeed, e-commerce has evolved from online billboards to a fully functional, personalized shopping experience over the past decade. The first two online purveyors are eBay (http://www.ebay,com/) and Amazon.com (http://www.amazon.com/). They were the first ones to offer one-click ordering that people expect to find. Today, the Amazon.com able to set a single-day record with more than 2.8 million units ordered, which make one of the most important milestones for e-commerce. (315 words)

Thursday, June 5, 2008

SteVe @.@ here ...

Hello, welcomes for viewing our group blog.
Long time no write article about my self. Still remember the latest I write is on my secondary school. Let me briefly introduce myself, my name is Yong Chun Siang, but my friend is cal me Steve. I am a city boy, come from Kuala Lumpur. My hobbies are watch movie and listen music. What type of movie and music I like? I am interested watch Hong Kong comedy movie and support Taiwan singer song. During holiday, I will join my friend go traveling. It is because traveling can open our mind, learn something we are can’t learn in our text book.
Hotmail.com is the most I visited. This is a mail box for me communicate with my friend. Beside that, I will through Internet to know new friend, every week I will visit Friendstar.com few time to up date my personal information like up loading photo and design my account to attract other add me as friend. The other websites I always visit include tvbnow.com, cari.com and google.com.
Online chatting is my daily activity, when I switch on my computer, I will sign in my live messenger and start chat with my friend. I will through Internet to download the latest song and movie. Beside that, when I feel boring, I will play some online game also.
Welcome share with me the nice movie, song, traveling and funny websites with me. (239words)

Wednesday, June 4, 2008

About ME-~yEn

Welcome to my group’s blog! Thanks for view our blog. This is my first post in blog. My name is Chew Cheng Yen, from Klang and i also a UTAR student. I’m a universal guy, nothing is special from others. My hobbies are playing games, sporting and eating delicious food. (Is it eating food also a hobby?)

The top five website that I visited the most are www.google.com , www.friendster.com, www.gougou.com, www.digi.com.my and www.utar.edu.my. I often browse Google website because I need to search some information about the assignment and Google has a greatest search engine. At friendster web site we can meet many friends and design self URL to let the whole world view your profile. When I want to search the information of the latest song I will click the www.gougou.com link. This website has much information about the latest song and hit song. I am a Digi user so I always search the Digi homepage to get the up to date information. The webpage has some flash that often change and we can have some fresh look about Digi. As I am a UTAR student, it is not weird that I visit UTAR website. At UTAR website we can know our time table, information of library and so on.


Nowadays, I think most of the people also sit in front of the computer for long time and their internet activities can be categories to many types. My internet activities are chatting with friends, downloading movie, searching information, playing games and online singing. The online singing game is a game that my friend introduces to me this few days. It is an online game, the performance time is eight minutes for each people. If you have free time try to search www.meetoto.com for more information.

That’s all for my post today, after view my post please give me some comment. Thank you.

Sunday, June 1, 2008

Myself-Stella

My name is Stella Kho Shu Qin. I come from Muar Johore, it is a nice place because you may able to breathe the fresh air in the village that you unable to get it in KL city. Besides, you also can find much delicious food there. You may take a trip there when you are free.
Now, I am studying in UTAR year 3 semesters 1. Even is the last year for my university life, I still feel so stressful and nervous. There are many challenges waiting for me in the coming periods, I hope I able to handle them nicely.
My hobbies is reading novel and listening music. My favorite author is Hiyawu. He is a talent and young author. I like the way he think, talk and the unique style he used in his article.
The top 5 websites I visit the most are http://www.google.com/ , http://www.baidu.com/ , http://www.utar.edu.my/ , http://www.friendster.com/ and http://www.neopets.com/ . Usually, I used google.com to search the information for the assignment and obtain extra knowledge from the various website available in Google. It is easy to use and provide a large number of website choices of the search result.
On the other hand, I use neopets.com to feed a pet. It name is darling_lala, when I am free I will log in to play with it and play games to collect points in order to buy food for my pet. In real life, I very scare about pet and animals, therefore this website provide me a chance to feed pets without physical touch.
Usually, I use window messengers to chat with friends who are studying or staying in other place, it is a good and convenient way to keep in touch with them without spending a lot of money and time. I also like to use internet to read the latest issue around the world, with internet we can obtain the latest news in the shortest time.
Finally, i would like to introduce my e-coomerce group assignment's members, who are Steve, Hedy, Cheng Yen and I. I wish we can enjoy when doing this assignment and have a great learn from it. Wish all of you have a nice day.

Myself--Hwei Chuin

My name is Loh Hwei Chuin, you all also can call me Hedy. Now I am 20 years old but after 05 Nov 2008, i will become 21 years old. I born in Kuala Lumpur. My hobbies are listening music, watching movie and others.In my family, i got father, mother and two brothers who love me so much. Although sometimes i will make them angry but they also will forgive me. When school holidays, i will stay at home if i no going out with my friends. This is because when i study i need to stay at hostel which located at Bandar Sungai Long and it is far away from my hometown. Hence, i can not go back home often.
Now i am studying at UTAR and I am going to finish my degree level soon and graduate at next year May. In my university life, i learns a lots and meets a lot of new friends. I was very happy with them when we were doing assignments and other things together.
I like to visit "Malaysia International Blackie Lollipop Fans Club" website. This is because i can know more and every move about my idols. Moreover, this website will also update the latest news, pictures, and everything about them. Besides that, i also will visit others websites in my free times. Such as, UTAR intranet, WBLE, Yahoo and Google. I can easily find the information which can help me in my studies from those websites.
When i came back from school, the first thing i do is swithch on my laptop immediately and sign in my MSN account. This is because i can chat with friends and my friends also can find me when they miss me. Besides that, i also like to write blog and upload new photos in my MSN spaces. Usually i will write and upload about those things that happening around me. On the other hand, on my free time i also will play online game and watch video clip on Youtube.
After finished reading this post, i think all of you will know more about me. I wish you all have a nice mood everyday.