The webpage is downloading with moderate speed as pictures size are small and system running in well conditions. The webpage is very useful since the users can easily find out the essential information of flights and make the transaction of booking flights in a very convenient and easy way. Along with its vision and mission, AirAisa was operating successfully according to its significant philosophy of “NOW EVERYONE CAN FLY”.
Friday, July 10, 2009
Review A Local, Transactional E-Commerce Site!!
The webpage is downloading with moderate speed as pictures size are small and system running in well conditions. The webpage is very useful since the users can easily find out the essential information of flights and make the transaction of booking flights in a very convenient and easy way. Along with its vision and mission, AirAisa was operating successfully according to its significant philosophy of “NOW EVERYONE CAN FLY”.
Wednesday, July 8, 2009
E-government in Malaysia : Its implementation so far and citizen's adoption strategies
Besides, information obtained by citizen are secured and safe. The ability for a nation to function and prosper relies heavily on its level of security and safety. Thus, it enables trade, businesses and organizations to grow as well as encourages foreign investments. The national identity, crime prevention, fire and rescue, health related emergency and national defense can also be detected. Furthermore, citizens can obtain other information and services such as legal matters, public amenities and utilities and health easily.
Monday, July 6, 2009
Causes And Prevention Of Credit Card Debts
CAUSES
1) Poor Money Management
If you have no plan for monthly spending and didn’t pay your bills monthly, you wouldn’t know where your money is going. Maybe you will spend RM800 every month, but you do not realize it.
2) Lower salary, higher expenses
If parents have such situation and lose his/her job, debt arises obviously.
3)Underemployment
Are you underemployed? If yes, this means that your salary is not enough to cover your expenses. So, you need to cut down on your lifestyle. Forget about shopping at Pavilion every weekend if you only work for RM 800 per month. However, if you have salary RM5000 per month, then you can think about the luxury brand- LOUIS VUITTON.
4) Credit cards as a “crutch”
Many people use credit cards as a “crutch”. They will buy the things they desired notwithstanding they cannot really afford it. Then the accumulate amount of principle and interest is terrible.
PREVENTION
- Well planned financial management to guide you become an organized consumer.
- Always pay on time to enjoy lower interest rates because this is the crucial factor that manages your payment schedule.
- Credit card should be use only when emergency happens, unless you plan in paying the entire balance off immediately.
- Spend less to avoid credit card debts.
Related links:
http://www.mozdex.com/
http://www.scribd.com
http://www.linkroll.com
A discussion on E-learning offered in Malaysian universities: Pros and Cons from the students perspective
What does government mean by e-learning?
There are two categories of e-learning, which are:
- Knowledge database --> This is the most basic form of e-learning. It doesn’t seen as actual training. You will see the software questions with step-by-step instructions to perform specific task.
- Asynchronous training--> This training is more focus on traditional sense of the word. It is the place of a live instructor with the links to reference materials. In addition, it consists of online discussion group, online bulletin boards to access with instructors.
- Students can learn on their own pace and under less pressure. For those students who have a job, they can learn to fit their busy schedule.
- There is no travel cost, because e-learning is quick and easy to get the information in anytime and everywhere. For example, high networks capacity will make learning available to people 24 hours a day in the 21st century.
- Web-based allows instructors update timely information. Thus, students can retrieve information immediately.
- Teaching through online can improved interactive and collaborative among students. For instances, case studies, chat rooms, project teams, discussion group and etc.
- E-learning will reduce social and cultural interaction among students and lecturers. Students will feel they don’t communicate enough with their lecturer when they are floating in space.
- It is easy for students to misunderstand the demands from their lecturers.E-learning required new skills, technical training and responsibilities from students. However, some of students may have weaknesses in internet skills and computer skills.
- E-learning required technology to participate in the virtual classroom. For example, those minor students who have low bandwidth and low memory computer will be difficult to access the internet as well as download course material.
Related Links:
Saturday, July 4, 2009
The Application Of Pre-Paid Cash Card For Consumers
Prepaid cash card can help to manage your money safer, easier, and cheaper. Prepaid Visa and Prepaid MasterCard act like a checking account where individuals and businesses deposit money and withdraw funds from their protected account. Certainly, the money is safe in the prepaid card accounts instead of carrying it around in cash. Thus, it's very convenient to sign up for a prepaid cash card.
The usages of prepaid cash card for consumers can be used in a variety of ways :
- It can use to shop, pay bills online, hotel & car rental reservations, and purchase goods & services. To shop online, you'll find the item you want to buy and click on to the website's "checkout" page before filling in your details and those of your prepaid card.
- Prepaid cash card is secured. For instance, users do not need to carry a lot of cash around while u go shopping. It enables consumers to control their spending according to a budget as well.
- Apart from that, prepaid cash card can also be used to withdraw cash from ATM with the available amount of money in your account. But, it will cost you a higher service charge.
- Some of the pre-paid cash cards provide you the service by sending and receiving money via bank wire transfer, between two cards.
- Act as a portable access point to checking account.
There are some examples of prepaid cash cards:
1) Touch 'n Go (TnG) smart card
- used by Malaysian for electronic payment system at all highways in Malaysia, major public transpots, selected parking sites and also theme parks.
- Enhances the speed of paying.
- Convenient as users no longer need to queue up at the cash lane to make payment.
- It is expanding its business to retail purchase by starting cooperate with fast food industry that enables consumers to buy doughnut, burger or other fast-foods from 21 outlets such as Burger King, 7-Eleven, Dunkin’ Donut.
- Issued by Four Oaks Bank & Trust Company
- Give opportunity for consumers with poor credit record and young children by not over spending than the balance in their card.
- Visa permits travelers access to money at automated teller machines (ATM) in 65 countries and book the train tickets by using Metro Card.
Friday, June 26, 2009
How to safeguard personal and financial data?
Here are the methods that you’re privacy data to be secured:
1)Do not share your personal information to others which is including your Social Security number, passport number, birth certificate number, driver’s license number and credit card numbers.
2)It is important to keep your user name and password confidentially. Password is required to secure for your data. For example, combination of alphabet and numbers can be used as a password. BUT make sure that you can memorize the password.
3)Do not give out information unless you know the party with whom you are dealing. Must be ensure that the information given to the authorized users only. For examples: your customer, supplier and banker.
4) Use Biometric systems
Biometric systems refer to method to recognize human physical and behavioral traits uniquely.
It can be divided to :
- Physiological – shape of the body. For examples, DNA, biometric fingerprint systems, biometric iris recognition.
- Behavioral – voice scan and keystroke monitoring.
Firewall is a part of a computer system or network is to block unauthorized access n a company’s private network and the internet. Function- set of devices to allow, deny, encrypt, decrypt, or proxy computer traffic between different security domains followed by a set of rules and other criteria.
3rd Party Certification Programme In Malaysia
What is Secured Sockets Layer (SSL)?
- Technology which employs the essential functions of mutual authentication, data encryption, and data integrity for security transactions.
- Also known as an electronic file that enables secure confidential communications and identifies individuals and websites uniquely.
- Issued by a trusted third party called Certification Authority (CA). Authenticity is ensured when certificate is issued once establishes with its organization’s public keys and signs with CA’s private key.
1) VeriSign SSL Certificated
- Provides a crucial layer of intelligence and security that protect data and deliver information through internet safely to ensure data integrity and confidentiality.
- All information transmitted over the internet is encrypted using the 128-bit SSL.
- Reduce problems of lower shopping cart and other transaction abandonment which will increase visitor-to-sales conversions consequently.
- Besides that, internet users also get benefit from EV SSL Protection as Mozilla Launches Firefox 3. It leads “Site Identity” button attach to the location bar and immediately reassurance that authenticity has been verified by VeriSign. It helps organizations to build trust and confidence among their current or prospect customers.
- Maybank2U.com is the largest online banking which verifies by VeriSign and can be classified as VeriSign Secure Site.
2)MCS Trustgate
- which was established in year 1999 under Digital Signature Act 1997 (DSA).
- It is a licensed Certification Authority which operating with the Multimedia Super Corridor to provide digital certification services.
- The services included digital certificates, cryptographic products, and software development. It is used to secure the open network communications for both locally and across the ASEAN region.
- MPKI service is one of the services provided by Trustgate. It is designed to increase the security of intranet, extranet, as well as internet application. It enables the organizations to create their own multiple digital certification program with efficiency and cost-effective through this flexible managed service.
- Besides, Trustgate also provides digital ID which governed by Digital Signature Act 1997. It is needed to ensure that the information is remained private and will not expose or alter by others.
- Trustgate also included PKI capability. MyKad created by government with PKI capability allows citizen to perform the online transaction between government and private company. MyKey is the ultimate PKI solution for MyKad which allow the holder to authenticate themselves online and digitally sign document or transaction.
Please click on the picture below to login to Trustgate.com if you would like to get more information about it.
Thursday, June 25, 2009
Mobile payment systems in Malaysia : Its potential and consumers' adoption strategies
Some of examples of mobile payments available in Malaysia are mobileExec and Mobile Money. Both are using the concept of making payment transactions just through a mobile device to pay for goods and services anytime without having cash on hand, cheques or even physically present a store. This will be easier and more convenient for users as they go about anywhere to make purchasing.
Companies such as Maxis; HGL Capital Berhad; CELCOM are also coming up with this concept to cater for their customers convenience. Mobile payments services indeed have a great potential and advantage. Consumers are more comfortable with low-value transactions over such non-traditional means. Common applications will include payment for transportation, parking, restaurants, convenience stores, retail outlets, e-tickets to name a few – typically for low-value items. This helps especially when consumers are in need of cash but doesn’t have any in hand, therefore with mobile payments they do not need to even search for an ATM machine to withdraw the needed money for the payment.
The threat of online security
Virus is a piece of software code that inserts itself into a host, including the operations systems. The virus is activated once its host program be executed and attempts to copy itself into more program. Viruses may simply infect and spread; others do substantial damage such as deleting files or corrupting the hard drive. For example, "I LOVE YOU" virus caused over $100 million
Worm is a self-replicating software program, consuming the resources of its host in order to maintain its capable of propagating a complete working version of itself onto another machine. It uses networks to spread itself or spread through instant messages; it does infect a computer or hand held device without human intervention. Macro virus or macro worm is executed when the application object that contains the macro is opened or a particular procedure is executed.
A program that appears to have useful function but contains a hidden function which presents a security risk is known as Trojan horse. Trojan horse is unlike a worm, it requires user cooperation. Once on your machine, Trojans then function as independent programs that operate secretly. Commonly, Trojans steal passwords or perform "denial of service" attacks. Examples of Trojans include Backdoor and Nucker.
Sunday, June 21, 2009
Corporate blog- a new communication tool for the companies
Corporate blog consists of 2 main types which are internal and external blog.
1) Update easily- Blogs will keep the content new and dynamic because it is easier to update whichever internally or externally.
2) Two-way communications channel – Blogs allow readers to post their comments or participate in the discussion. The company also need to provide additional message which different with those information that they get from the company website.
3) Time management – It will just take some time to update compare with pod casting. Hence, it is easier to manage and communicates the company news, culture, information with all the people around the world quickly and easily.
Although corporate blog is easier to create, but there is still some mistake which is done by some of the company.
1) No specific goal – Easy to set up result in the various types of new blogs. Thus, it is difficult for the company to be special and caught the readers’ attention.
2) Not keeping maintains – Treated as an experiment.
3) Not sourcing content – Hard pressed to write a good content if does not make editorially.
The examples of corporate blogs:
Johnson & Johnson: JNJ BTW
Yahoo!'s Yodel Anecdotal
Network Solutions, Solutions Are Power
Coca-Cola Conversations
SUPERSEED (charity blog, Asia)
eBay Ink
We are here sharing the video relates to usefulness of corporate blog
http://vizedu.com/2009/03/corporate-blogs-challenges-and-success-factors/
Electronic currency
Why electronic currency is created?
As there is the increasing of the criminal case, it creates a lot of troublesome issue if carried a lot of paper money in hand. In order to protect for the users, credit cards, debit cards, online banking, exchanging of electronic currency ahs been created. It has lessened the usage of the paper money and convenient to the users.
There are some advantages of the electronic currency.
1) E-currency provides the confidentiality and privacy for the users. When users sent an e-currency amount to the businesses, it does not contain any private information to the businesses. It is totally different with the credit card system.
2) Security of E-currency is strengthened by using the encryption which is known as RSA cryptography. It requires the authorities to use a trustworthy system and eliminate the risk of breaking the code of a digital signature.
3) As the users are able to transfer the e-currency through the internet, it saves time for the users without going out to the bank to make transaction.
However, there are still some drawbacks of the electronic currency.
1) The major problem may occur is fraud. If users accidentally misplace their private key, the perpetrator may use this opportunity to withdraw their money.
2) Peer-to-peer double spending of digital coins. Let say the users choose not to involve bank as an intermediary. If the digital coins are sent to the wrong places, they have to bear their losses.
Electronic currency has brought a lot of benefit for the users. Nevertheless, there is still need more improvement in the research and development to reduce the risk of disadvantages faced by the users especially fraud.
Ebay is one of the example that are using e-currency.
Friday, June 19, 2009
Another example of e-commerce success and its causes
1) Customers and suppliers
Dell perceived that both customers and suppliers must be treated as collaborators and co-workers. They have approached their customers in the best products and provide effective services. For instance, Dell can meet customer’s needs quickly by delivering the products in the right time. Instead, they tend to build a good relationship with their suppliers and customers and bring up open communications with each other.
2) JIT system
Dell known as a leader in supply chain management and just-in-time manufacturing. By using just-in-time system, dell successes to increase their revenue by eliminate inventory cost and storage cost. The key to accomplish this strategy is keeps the same suppliers and increase supplier to manage inventory for Dell.
Dell believes that their team will continue to develop, retain, and grow in e-commerce. Dell holds a Platinum councils twice a year in each region of the world. This meeting consists of around 100 members of company’s senior management and customers to share their concerns and discuss the technology changes. Their main purpose is to know the needs of the customer and fulfill their needs.
Dell is using personalization and customization tools. Dell create a special Premier Page to its own main corporate customer. Premier Page involves all products that covered purchasing contracts and special pricing under the contract with that firm. This can guarantee customer will get a fair price for each purchase.