Things to take note to prevent e-auction fraud when a consumer participating in an e-auction.
Auction refers to market mechanism by which buyers make bids and sellers place offers. Competitive and dynamic nature determines the final price. Auctions can rapidly disposal of items and offer trading opportunities for both buyers and seller. The most popular type of auctions is an electronic auction (e-auctions) which means auctions conducted online.
I would like to share a list of tips you can use to prevent e-auction fraud when participating in an e-auction.
First, learn how the auction runs. Find what obligations you have as a buyer, and what obligations the seller has before you make a bid. Seller will not liable to help you if you do not follow proper prevention measures.
1. Observe how the auction functions.
Search the buyer and seller obligations before bidding. If there are no proper prevention measures, seller is not liable to help the buyer
2. Do not disclose personal data simply
Disclosing personal data easily such as credit card number, account number, or password cause many problems.
3. Feedback forum
It allows the buyer and seller to build up online trading reputations. For an example, eBay uses this method to reduce fraud. The users have the right to comment their experience with others. Also, the information and history can be acquired through the feedback forum.
4. Be aware of “Advanced-fee demand”
Before receiving goods or services, the buyer should be alert with the seller who requires the buyer to send checks or money orders immediately to a post office.
5. Escrow Service
It is an independent third party. It verifies the payment of the buyer and alerts the seller when everything checks out.
6. Grading service
It is used to determine the physical condition of an item. For an instance, trading cards are graded from A1 to F1.
7. Read the comment left by previous buyers
A reputable seller can be determined. Also, the seller identification can be verified.
8. Inspect the item
Make sure the delivered item is physically in good condition. Third parties will evaluate and identify an item through a variety of means such as "DNA tagged"
References:
1.http://www.crimcheck.com/background-check-news/whats-internet-auction-fraud-and-how-do-i-prevent-it
2.http://www.usatoday.com/tech/columnist/2002/05/07/yaukey.htm
3.http://www.idea.gov.uk/idk/core/page.do?pageId=939784
Things to take note to prevent e-auction fraud when a consumer participating in an e-auction
Corporate Blogging: A new marketing communication tool for companies

Nowadays, corporate blogging is widely used to accomplish organization goals. The number of blog reader increase when current browsers such as Firefox and Internet Explorer provide the direct link. Based on research of NewPR Wiki, 58 (11.6%) of the Fortune 500 were blogging as for 7/5/2008. Corporate blogging divided into internal and external.
Internal
Employee can view the blog through intranet. Furthermore, any employee has the right to do a new post.
External
It is a public space where the company employees, teams, or spokespersons share their views on explaining and clarifying policies, reacting on public criticism, announcing new products and services as a window to the company culture.
Examples:
Amazon Web Services Blog is an example of successful corporate blog that discusses Amazon web services, products, tools and developer information.
Mobile 88 is another example for corporate blog. The main purpose is to allow enthusiastic members to voice out their idea and build its brand image.
Pros:
-Posts and comments are easy to reach
It serves as centralized hosting.
-Interesting
Interest generates based on a person beliefs. Most of people keen of beliefs than corporate vision.
-Handle queries from customers
Customers can ask questions and give their ideas in the comment part.
-Lower cost
Readers can give their thought within an hour compare with other method
Cons:
- Invasion of privacy
There is a tendency of invasion which causes loss of company confidentiality.
-Tricky to drag public comment
Without first routing, it may be tricky to get the public comment through the sanitizing filter of a press office.
As a conclusion, corporate blogging is very important. Furthermore, there are more advantages than disadvantages.
Related links:
1. http://money.cnn.com/2006/02/28/news/companies/pluggedin_fortune/index.htm
2. http://www.thenewpr.com/wiki/pmwiki.php/Resources/CEOBlogsList
3. http://blogs.wsj.com/biztech/2008/06/30/most-corporate-blogs-are-unimaginative-failures/
4. http://en.wikipedia.org/wiki/Weblog
5. http://www.kommunikationsforum.dk/default.asp?id=2&mode=kronologisk
6. http://www.ximnet.com.my/thelab/articles/default.asp
7. http://www.punchaboveyourweight.com/index.htm
E-Government in Malaysia: Its implementation so far and citizen’s adoption strategies
E-Government in Malaysia: Its implementation so far and citizen’s adoption strategies
E-government is a small form of electronic government. E-government is an activity that takes place by digital process over computer network. It builds interaction between the government, public and private sector. E-government may define as new or transformed ways to build relationships and improve government process between citizens and government by networks.
E-government was launched and led Malaysia to Information Age. It is used internet as a platform in exchanging the information, providing services for citizens of Malaysia. It seeks to improve the convenience, accessibility and quality of government services. It improves information flows and processing speed of deal with government.
Implementation of e-government includes several government processes and services online such as:-
e-Procurement – purchase and sale of supplies and services through the internet. It provides real time bidding solutions for buyers and sellers that bring an unprecedented level of profitability, control and simplicity to corporate procurement and liquidation processes.
Project Monitoring System – system uses to monitor the implementation of government’s development projects from the high-level management down to activity levels. This enables government agencies to have a better management and access information.
Electronic Labor Exchange – provide a one-stop job search and job advertisement platform for Malaysian job seekers and employers.
E-Syariah – provide a case management structure that integrates the processes related to management of cases for the Syariah Court.
Human Resource Management Information System (HRMIS) – provide a single interface for government employees to efficiently and effectively manage the human resource processes.
Citizen’s adoption strategies of e-government in Malaysia:-
1) Improve legislation on personal data protection, privacy and security so that consumers are protected. Hence, they feel more confident and safer performing online transactions with government.
2) Narrow the digital divides especially in urban so that the citizens are ready and able to adopt online government services.
3) Provide e-Citizen education, skills and training to every citizen about the benefits of using e-government services.
Reference:
1.http://en.wikipedia.org/wiki/EGovernment
2.http://www.gov.my/MyGov/BI/Directory/Citizen/Home.htm
3.http://www.american.edu/initeb/ym6974a/egovernment.htm

MOL AccessPortal Berhad
Type E-commerce
Founded 2000
Headquarters Malaysia
Key people Ganesh Kumar Bangah
Industry E-commerce
Website http://www.mol.com/
MOL was recognized as one of Asia Pacific’s fastest growing technology companies in the Deloittle Technology Fast 500 Asia Pacific Awards in 2005 and 2006 and has won a Merit Award for the Best of E-Commerce Applications in the MSC Asia Pacific ICT Awards and is a Microsoft Certified Partner.
MOL.com was created on 9 February 2000 under the MOL AcessPortal Berhad. The mission for MOL is to become a leading e-services powerhouse focusing on e-payments with a firm and strong presence locally regionally and globally. As a key payment product, MOLePoint has provided various channels to enable the user or consumer to reload and make payment for their purchases. Some of the channels are 7-eleven, epay, Mr Kiosk or One point outlet. Other than that consumer also can choose to transact via Maybank2U, Ambank, FPX, PosPay, M Money, Dolarmaker and Mobile Money. With the enough point in the consumer’s account, they can purchase the online game reload from the www.gameshive.com which is a MOLAccessportal’s online gaming portal. Other than purchase the online game reload, users also can purchase, telecommunication reloads, IDD Call Card, ISP reloads, mobile content, travel & leisure, gifts & flowers, courier services, magazines, domain names and DVDs/VCD using MOLePoint.
There are four versions of MOLePoints, namely an international version,
1. MOL Global;
2. MOL Greater China, covering China, Hong Kong, Macau and Taiwan;
3. MOL India, servicing the Sub Continent, and a localized version MOL Malaysia
4. MOL Singapore to cater for the local residents. MOL is also localizing in various other Asian countries.
The purpose of this website and what types of audience will enter into this website
The MOL (www.mol.com) is an online payment services provider for games, contents and services in Asia. It is an e-commerce website that purposely help other company to selling product through it portal and provide an online payment system for purchases other product. For those users who want to use the MOL website to buy any item or product, the first thing that they must do is open a member account. With this member account, the user can top up and reload their MOLepoint by e-banking or other ways. For the method provided, there are several ways for user to top up which are through saving account, credit card, ATM card, mobile money, 7-11 outlet and so on. For using this method to buy product, member can use their MOLepoint which they already reloaded to purchase what they need and want. Most of the audiences are youngster who not more than 30 year old and preferred for playing online games will more using this website.
For the overall impression for this website, it is gaining a good impression. The MOL.com also has a good system security to protect the information of those customers. Using this website can allow the user purchase the items through this payment services conveniently.
Reference
1.http://en.wikipedia.org/wiki/MOL_AccessPortal
2.http://www.mol.com/v2/molap_au.aspx
Prepaid cash cards
Prepaid cash cards are plastic cards, which fall under the pay first category of plastic payments. It is a rechargeable stored value smart card used to transfer electronic payment in online or offline. Prepaid cash cards can be used to make payment for goods and services and withdraw money. The user needs to reload before the user can use it. Prepaid cash cards are designed to be used as an alternative. It is a convenient smart card which is widely and commonly used by everyone to settle payment in ease
Application of pre-paid cash card for consumers
1. Pay bill – Bills such as rent, utilities, insurance, car payment, and cell phone bills can be paid instantly.
2. Convenient- The users can shop anywhere as long as the card using is accepted at different retailers. The users can pay fuel at the patrol station, purchase pay by phone, and shop on the Internet.
3. Withdraw cash at ATMs- The cash can be withdrawn any time.
4. Transfer money – Some prepaid cash provides money transfer service via bank wire transfers. For some prepaid cash card they provide the convenient such as send or receive money via bank wire transfers, between two cards.
5. Pay for toll – Touch n Go can be used at all highways in Malaysia, major public transports in Klang Valley, selected parking sites and theme par.
Furthermore, prepaid cash cards can be used as a replacement for travelers’ cash. Customers buy prepaid debit cards and them to withdraw cash at ATMs or pay for goods or services. It is indeed a great way to carry prepaid cash card as it is much safer and more secure than carrying large amounts of cash.
Reference
1)http://www.moneysupermarket.com/cards/prepaid-cards-guide1.asp
2)http://usa.visa.com/personal/cards/prepaid/index.html
3)http://www.mastercard.com/us/personal/en/aboutourcards/gift_prepaid/
4)http://www.electronic-payments.co.uk/solutions/Splash_plastic_card
5)http://images.search.yahoo.com/search/images?&p=touch+n+go+card&rs=0&fr=sfp&fr2
What is credit card? Credit card is any card that may be used repeatedly to borrow money or buy products and services on credit. Credit Card is issued by banks, savings and loans, retail stores, and other businesses. Nowadays, credit card debts are major cause of bankruptcies each year. It is because perspectives when get a new credit card or not
The following are some point of causes and prevention for credit card debts:
Causes of credit card debts
a)Poor money management
Poor money management is one of the reasons that debts occur on many families. It is because they unaware of their spending limits. Some of them do not realize their spending on the items that is worthless. Thus, it leads on rising in debts by using credit cards unwisely.
b) Banking on a windfall
Spending wisely is advisable because using credit card refers spending tomorrow money.
c) Unemployment
When the main breadwinner of the household unemployed, credit card can be use temporary for maintaining current lifestyle. Therefore, a rise in debt happens
Prevention of credit card debts
a) Making an budget
People have to create clear budget and stick on it such as monthly bills, food, clothes, entertainment and miscellaneous expenses which will prevent from overspending and fall under deeper debt load.
b) Self control and discipline
One of the best practices is to have a direct set up so that able to pay back the full amount for each month. Thus, overspending will not occur.
c) Cut up your cards so that you are not tempted to use them
Pick the one with the lowest interest rate and cut up the rest. The one you keep should be deemed as an ‘emergency card.”
The following are some references link:
1.http://www.mozdex.com/prevent-credit-card-debt/
2.http://ezinearticles.com/?Understanding-Credit-Card-Debt-Problems&id=1225936
3.http://www.fastweb.com/fastweb/resources/articles/index/102925
4.http://www.bankrate.com/brm/news/debt/debt_manage_2004/top-10-causes.asp

Electronic currency is also called e-money, which is one of several terms used to describe digital money. It is also known as electric cash, digital money, digital cash and digital currency, which is essentially a payment or transfer of funds that is initiated and processed electronically within current offline bank payment systems.
Nowadays, multiplication of computers, modems and modern telecommunication links, the market for electronic money products has grown voluminously. Electronic money is the digital representation of money, or more accurately, the digital representation of currency which is exchanged only electronically.
It must be noted that the words money and currency, although it is used interchangeably and often synonymously. Does the fact mean different things? Money is simply a means of communicating value, while currency is the physical manifestation of money, currency gives money visible form. Although the term electronic currency is usually used in expressing the movement of currency through computer internet network, digital currency is the more precise term, differential it from analog electronic currency, which is theoretically possible to create. Using electronic when referring to currency's historic development up to the present, whereas digital will refer to currency in the future.
Electronic Funds Transfer (also known as EFT) and direct deposit are examples of electronic money, which is a system for transferring money from one bank to another without using paper money. Its use has become widespread with the arrival of personal computers, cheap networks, improved cryptography and the Internet.
Since it is affected by financial fraud, the Electronic Funds Transfer (EFT) Act was implemented. This federal law protects the consumer in case a problem arises at the moment of the transaction.
Related link:
1) http://theauctioneer.wordpress.com/2008/07/30/e-money-defined/
2) http://en.wikipedia.org/wiki/Digital_cash
3) http://www.selfseo.com/story-6264.php
4) http://www.transactmoney.com/transaction-articles/electronic-funds-transfer.htm
5) http://work-at-home-scam-review.com/Understanding_the_E-gold_scams.html
Mobile payment systems in Malaysia: Its potentials and consumers’ adoption strategies
Mobile payment is transaction of money payment made through a mobile device. Mobile exec and Mobile Money are the examples of mobile payments. Both are using the concept of making payment via mobile device such as mobile phone to purchase goods and services. Also there are other companies use this concept as well.
Currently, mobile payment still developing in Malaysia. It can provide customers with admission which can be coded uniquely. It also covers prepaid and postpaid service billing.
There are few types of mobile transaction
-Premium SMS(Short message service) transaction
-WAP(mobile web)
-Mobile payment providers
1)Premium SMS transaction
Wallpaper, music and ringtones can be purchased via SMS.However, it requires the user to send a certain code to confirm the person who is willing to purchase those products.
2)WAP(mobile web)
Before the user purchase the product, the user is required to select the product from the web and confirmation message shows the details of the product.
3)Mobile payment providers
It provide the service of extending the ability of mobile payment. Mobile Money is an example of mobile payment provider. If the user registers an account with mobile payment provider,the user can top up the user's credit and use it to purchase goods and services.

Potentials
There is big potential in this market as consumer's confidence on mobile payment has increased.
-Consumer are more comfortable with low-value transactions over such non-traditional means.This also includes parking,retail outlets and e-tickets.
-Market is at developing stage as there are many mobile phone users. Also, there is low competition.
Strategies
-Educating consumers
It refers the mobile payment functions such as bill payment
-Enhance security
It gives the mobile users when mobile payment system is secured
-Collaborate more banks and companies
The purpose is widening the ability and increased the customer satisfaction.
Related link(s):
1)http://mobile-money.com.my/about_us.htm
2)http://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci772807,00.html
3)http://en.wikipedia.org/wiki/Mobile_payment
4)http://www.mymode.com.my/html/new/index.jsp
5)http://www.theedgedaily.com/cms/content.jsp?id=com.tms.cms.article.Article_894885c0-cb73c03a-192d6040-bea9590f
6)http://biz.thestar.com.my/news/story.asp?file=/2007/5/8/business/17656075&sec=business Labels: week 5
The application of 3rd party certification programme in Malaysia


MSC Trustgate.com Sdn Bhd is the most famous application of 3rd party certification program in Malaysia. It was incorporated in 1999. It also licensed Certification Authority (CA). Its objective is open the network communication from both locally and across the ASEAN region. Its vision is to enable organization to conduct their business through internet.
Digital certificate have 3 functions
1) User authentication
It provides securities besides username and password
2) Encryption
It can secure data transmission.
3) Digital signatures
Integrity of the data can be ensured.
The transaction will be more secure as there is digital certificate.
Related links:
1)http://www.msctrustgate.com/

The threat of online security
Definition: An attack perpetrated using software and systems knowledge or expertise.
Issues of online security threat
Organization and users continue to experiences the threat of online security.
It will also cause financial losses. Nowadays, we still need more technology to defend online security threat.
Threat of online security fall under several general categories:
(1)Accidental action
(2)Malicious attacks
Third area of cyber vulnerability is online fraud
1) Accidental actions
-Problems arising from basic lack of knowledge about online security concepts
-Resulting from insecure information transfer
-Largely self-inflicted and avoidable
2) Malicious attacks
-Premeditated or malicious attacks
-Aim to do harm
-This viruses increased substantially, require more time and cost to recover.
Malicious code takes variety of forms-both pure and hybrid.
E.g. Computer virus, worm and trojan horse.
Computer viruses
~A program or a fragment of code that replicates by attaching copies of itself to other programs because it can clone itself independently.
~It can simply infect and spread over the operating system and cause the corrupt in the server system.
For an example: The May 2000 "I LOVE YOU" virus were propagated through Microsoft outlook e-mail and whose payloads were delivered as a Visual Basic for Application( VBA) programs attached to the e-mail messages. When recipient is unaware and opened the email, the VBA program looked up the entries in the recipient’s Outlook address book and send copies of the virus itself to the contacts in the address book.
Denial of Service Attacks
-Denial of service attack are carefully crafted and executed
-It usually involve one computer attacking another
-The use of multiple computers in a highly organized attack is becoming increasingly common Known as Distributed Denial of Service attacks (DDOS)
Online fraud
-Covering Internet transactions that involve falsified information.
-Identity theft is a major form of online fraud, or misrepresentation
-Data theft is the term use to describe not only the theft of the information but also unauthorized perusal or manipulate of private data
Related links:
1)http://www.bsagovernment.com/downloads/MajorOnlineThreats.pdf

