Things to take note to prevent e-auction fraud when a consumer participating in an e-auction.
Auction refers to market mechanism by which buyers make bids and sellers place offers. Competitive and dynamic nature determines the final price. Auctions can rapidly disposal of items and offer trading opportunities for both buyers and seller. The most popular type of auctions is an electronic auction (e-auctions) which means auctions conducted online.
I would like to share a list of tips you can use to prevent e-auction fraud when participating in an e-auction.
First, learn how the auction runs. Find what obligations you have as a buyer, and what obligations the seller has before you make a bid. Seller will not liable to help you if you do not follow proper prevention measures.
1. Observe how the auction functions.
Search the buyer and seller obligations before bidding. If there are no proper prevention measures, seller is not liable to help the buyer
2. Do not disclose personal data simply
Disclosing personal data easily such as credit card number, account number, or password cause many problems.
3. Feedback forum
It allows the buyer and seller to build up online trading reputations. For an example, eBay uses this method to reduce fraud. The users have the right to comment their experience with others. Also, the information and history can be acquired through the feedback forum.
4. Be aware of “Advanced-fee demand”
Before receiving goods or services, the buyer should be alert with the seller who requires the buyer to send checks or money orders immediately to a post office.
5. Escrow Service
It is an independent third party. It verifies the payment of the buyer and alerts the seller when everything checks out.
6. Grading service
It is used to determine the physical condition of an item. For an instance, trading cards are graded from A1 to F1.
7. Read the comment left by previous buyers
A reputable seller can be determined. Also, the seller identification can be verified.
8. Inspect the item
Make sure the delivered item is physically in good condition. Third parties will evaluate and identify an item through a variety of means such as "DNA tagged"
References:
1.http://www.crimcheck.com/background-check-news/whats-internet-auction-fraud-and-how-do-i-prevent-it
2.http://www.usatoday.com/tech/columnist/2002/05/07/yaukey.htm
3.http://www.idea.gov.uk/idk/core/page.do?pageId=939784
Things to take note to prevent e-auction fraud when a consumer participating in an e-auction
Corporate Blogging: A new marketing communication tool for companies

Nowadays, corporate blogging is widely used to accomplish organization goals. The number of blog reader increase when current browsers such as Firefox and Internet Explorer provide the direct link. Based on research of NewPR Wiki, 58 (11.6%) of the Fortune 500 were blogging as for 7/5/2008. Corporate blogging divided into internal and external.
Internal
Employee can view the blog through intranet. Furthermore, any employee has the right to do a new post.
External
It is a public space where the company employees, teams, or spokespersons share their views on explaining and clarifying policies, reacting on public criticism, announcing new products and services as a window to the company culture.
Examples:
Amazon Web Services Blog is an example of successful corporate blog that discusses Amazon web services, products, tools and developer information.
Mobile 88 is another example for corporate blog. The main purpose is to allow enthusiastic members to voice out their idea and build its brand image.
Pros:
-Posts and comments are easy to reach
It serves as centralized hosting.
-Interesting
Interest generates based on a person beliefs. Most of people keen of beliefs than corporate vision.
-Handle queries from customers
Customers can ask questions and give their ideas in the comment part.
-Lower cost
Readers can give their thought within an hour compare with other method
Cons:
- Invasion of privacy
There is a tendency of invasion which causes loss of company confidentiality.
-Tricky to drag public comment
Without first routing, it may be tricky to get the public comment through the sanitizing filter of a press office.
As a conclusion, corporate blogging is very important. Furthermore, there are more advantages than disadvantages.
Related links:
1. http://money.cnn.com/2006/02/28/news/companies/pluggedin_fortune/index.htm
2. http://www.thenewpr.com/wiki/pmwiki.php/Resources/CEOBlogsList
3. http://blogs.wsj.com/biztech/2008/06/30/most-corporate-blogs-are-unimaginative-failures/
4. http://en.wikipedia.org/wiki/Weblog
5. http://www.kommunikationsforum.dk/default.asp?id=2&mode=kronologisk
6. http://www.ximnet.com.my/thelab/articles/default.asp
7. http://www.punchaboveyourweight.com/index.htm
E-Government in Malaysia: Its implementation so far and citizen’s adoption strategies
E-Government in Malaysia: Its implementation so far and citizen’s adoption strategies
E-government is a small form of electronic government. E-government is an activity that takes place by digital process over computer network. It builds interaction between the government, public and private sector. E-government may define as new or transformed ways to build relationships and improve government process between citizens and government by networks.
E-government was launched and led Malaysia to Information Age. It is used internet as a platform in exchanging the information, providing services for citizens of Malaysia. It seeks to improve the convenience, accessibility and quality of government services. It improves information flows and processing speed of deal with government.
Implementation of e-government includes several government processes and services online such as:-
e-Procurement – purchase and sale of supplies and services through the internet. It provides real time bidding solutions for buyers and sellers that bring an unprecedented level of profitability, control and simplicity to corporate procurement and liquidation processes.
Project Monitoring System – system uses to monitor the implementation of government’s development projects from the high-level management down to activity levels. This enables government agencies to have a better management and access information.
Electronic Labor Exchange – provide a one-stop job search and job advertisement platform for Malaysian job seekers and employers.
E-Syariah – provide a case management structure that integrates the processes related to management of cases for the Syariah Court.
Human Resource Management Information System (HRMIS) – provide a single interface for government employees to efficiently and effectively manage the human resource processes.
Citizen’s adoption strategies of e-government in Malaysia:-
1) Improve legislation on personal data protection, privacy and security so that consumers are protected. Hence, they feel more confident and safer performing online transactions with government.
2) Narrow the digital divides especially in urban so that the citizens are ready and able to adopt online government services.
3) Provide e-Citizen education, skills and training to every citizen about the benefits of using e-government services.
Reference:
1.http://en.wikipedia.org/wiki/EGovernment
2.http://www.gov.my/MyGov/BI/Directory/Citizen/Home.htm
3.http://www.american.edu/initeb/ym6974a/egovernment.htm

MOL AccessPortal Berhad
Type E-commerce
Founded 2000
Headquarters Malaysia
Key people Ganesh Kumar Bangah
Industry E-commerce
Website http://www.mol.com/
MOL was recognized as one of Asia Pacific’s fastest growing technology companies in the Deloittle Technology Fast 500 Asia Pacific Awards in 2005 and 2006 and has won a Merit Award for the Best of E-Commerce Applications in the MSC Asia Pacific ICT Awards and is a Microsoft Certified Partner.
MOL.com was created on 9 February 2000 under the MOL AcessPortal Berhad. The mission for MOL is to become a leading e-services powerhouse focusing on e-payments with a firm and strong presence locally regionally and globally. As a key payment product, MOLePoint has provided various channels to enable the user or consumer to reload and make payment for their purchases. Some of the channels are 7-eleven, epay, Mr Kiosk or One point outlet. Other than that consumer also can choose to transact via Maybank2U, Ambank, FPX, PosPay, M Money, Dolarmaker and Mobile Money. With the enough point in the consumer’s account, they can purchase the online game reload from the www.gameshive.com which is a MOLAccessportal’s online gaming portal. Other than purchase the online game reload, users also can purchase, telecommunication reloads, IDD Call Card, ISP reloads, mobile content, travel & leisure, gifts & flowers, courier services, magazines, domain names and DVDs/VCD using MOLePoint.
There are four versions of MOLePoints, namely an international version,
1. MOL Global;
2. MOL Greater China, covering China, Hong Kong, Macau and Taiwan;
3. MOL India, servicing the Sub Continent, and a localized version MOL Malaysia
4. MOL Singapore to cater for the local residents. MOL is also localizing in various other Asian countries.
The purpose of this website and what types of audience will enter into this website
The MOL (www.mol.com) is an online payment services provider for games, contents and services in Asia. It is an e-commerce website that purposely help other company to selling product through it portal and provide an online payment system for purchases other product. For those users who want to use the MOL website to buy any item or product, the first thing that they must do is open a member account. With this member account, the user can top up and reload their MOLepoint by e-banking or other ways. For the method provided, there are several ways for user to top up which are through saving account, credit card, ATM card, mobile money, 7-11 outlet and so on. For using this method to buy product, member can use their MOLepoint which they already reloaded to purchase what they need and want. Most of the audiences are youngster who not more than 30 year old and preferred for playing online games will more using this website.
For the overall impression for this website, it is gaining a good impression. The MOL.com also has a good system security to protect the information of those customers. Using this website can allow the user purchase the items through this payment services conveniently.
Reference
1.http://en.wikipedia.org/wiki/MOL_AccessPortal
2.http://www.mol.com/v2/molap_au.aspx
Prepaid cash cards
Prepaid cash cards are plastic cards, which fall under the pay first category of plastic payments. It is a rechargeable stored value smart card used to transfer electronic payment in online or offline. Prepaid cash cards can be used to make payment for goods and services and withdraw money. The user needs to reload before the user can use it. Prepaid cash cards are designed to be used as an alternative. It is a convenient smart card which is widely and commonly used by everyone to settle payment in ease
Application of pre-paid cash card for consumers
1. Pay bill – Bills such as rent, utilities, insurance, car payment, and cell phone bills can be paid instantly.
2. Convenient- The users can shop anywhere as long as the card using is accepted at different retailers. The users can pay fuel at the patrol station, purchase pay by phone, and shop on the Internet.
3. Withdraw cash at ATMs- The cash can be withdrawn any time.
4. Transfer money – Some prepaid cash provides money transfer service via bank wire transfers. For some prepaid cash card they provide the convenient such as send or receive money via bank wire transfers, between two cards.
5. Pay for toll – Touch n Go can be used at all highways in Malaysia, major public transports in Klang Valley, selected parking sites and theme par.
Furthermore, prepaid cash cards can be used as a replacement for travelers’ cash. Customers buy prepaid debit cards and them to withdraw cash at ATMs or pay for goods or services. It is indeed a great way to carry prepaid cash card as it is much safer and more secure than carrying large amounts of cash.
Reference
1)http://www.moneysupermarket.com/cards/prepaid-cards-guide1.asp
2)http://usa.visa.com/personal/cards/prepaid/index.html
3)http://www.mastercard.com/us/personal/en/aboutourcards/gift_prepaid/
4)http://www.electronic-payments.co.uk/solutions/Splash_plastic_card
5)http://images.search.yahoo.com/search/images?&p=touch+n+go+card&rs=0&fr=sfp&fr2
What is credit card? Credit card is any card that may be used repeatedly to borrow money or buy products and services on credit. Credit Card is issued by banks, savings and loans, retail stores, and other businesses. Nowadays, credit card debts are major cause of bankruptcies each year. It is because perspectives when get a new credit card or not
The following are some point of causes and prevention for credit card debts:
Causes of credit card debts
a)Poor money management
Poor money management is one of the reasons that debts occur on many families. It is because they unaware of their spending limits. Some of them do not realize their spending on the items that is worthless. Thus, it leads on rising in debts by using credit cards unwisely.
b) Banking on a windfall
Spending wisely is advisable because using credit card refers spending tomorrow money.
c) Unemployment
When the main breadwinner of the household unemployed, credit card can be use temporary for maintaining current lifestyle. Therefore, a rise in debt happens
Prevention of credit card debts
a) Making an budget
People have to create clear budget and stick on it such as monthly bills, food, clothes, entertainment and miscellaneous expenses which will prevent from overspending and fall under deeper debt load.
b) Self control and discipline
One of the best practices is to have a direct set up so that able to pay back the full amount for each month. Thus, overspending will not occur.
c) Cut up your cards so that you are not tempted to use them
Pick the one with the lowest interest rate and cut up the rest. The one you keep should be deemed as an ‘emergency card.”
The following are some references link:
1.http://www.mozdex.com/prevent-credit-card-debt/
2.http://ezinearticles.com/?Understanding-Credit-Card-Debt-Problems&id=1225936
3.http://www.fastweb.com/fastweb/resources/articles/index/102925
4.http://www.bankrate.com/brm/news/debt/debt_manage_2004/top-10-causes.asp

Electronic currency is also called e-money, which is one of several terms used to describe digital money. It is also known as electric cash, digital money, digital cash and digital currency, which is essentially a payment or transfer of funds that is initiated and processed electronically within current offline bank payment systems.
Nowadays, multiplication of computers, modems and modern telecommunication links, the market for electronic money products has grown voluminously. Electronic money is the digital representation of money, or more accurately, the digital representation of currency which is exchanged only electronically.
It must be noted that the words money and currency, although it is used interchangeably and often synonymously. Does the fact mean different things? Money is simply a means of communicating value, while currency is the physical manifestation of money, currency gives money visible form. Although the term electronic currency is usually used in expressing the movement of currency through computer internet network, digital currency is the more precise term, differential it from analog electronic currency, which is theoretically possible to create. Using electronic when referring to currency's historic development up to the present, whereas digital will refer to currency in the future.
Electronic Funds Transfer (also known as EFT) and direct deposit are examples of electronic money, which is a system for transferring money from one bank to another without using paper money. Its use has become widespread with the arrival of personal computers, cheap networks, improved cryptography and the Internet.
Since it is affected by financial fraud, the Electronic Funds Transfer (EFT) Act was implemented. This federal law protects the consumer in case a problem arises at the moment of the transaction.
Related link:
1) http://theauctioneer.wordpress.com/2008/07/30/e-money-defined/
2) http://en.wikipedia.org/wiki/Digital_cash
3) http://www.selfseo.com/story-6264.php
4) http://www.transactmoney.com/transaction-articles/electronic-funds-transfer.htm
5) http://work-at-home-scam-review.com/Understanding_the_E-gold_scams.html
Mobile payment systems in Malaysia: Its potentials and consumers’ adoption strategies
Mobile payment is transaction of money payment made through a mobile device. Mobile exec and Mobile Money are the examples of mobile payments. Both are using the concept of making payment via mobile device such as mobile phone to purchase goods and services. Also there are other companies use this concept as well.
Currently, mobile payment still developing in Malaysia. It can provide customers with admission which can be coded uniquely. It also covers prepaid and postpaid service billing.
There are few types of mobile transaction
-Premium SMS(Short message service) transaction
-WAP(mobile web)
-Mobile payment providers
1)Premium SMS transaction
Wallpaper, music and ringtones can be purchased via SMS.However, it requires the user to send a certain code to confirm the person who is willing to purchase those products.
2)WAP(mobile web)
Before the user purchase the product, the user is required to select the product from the web and confirmation message shows the details of the product.
3)Mobile payment providers
It provide the service of extending the ability of mobile payment. Mobile Money is an example of mobile payment provider. If the user registers an account with mobile payment provider,the user can top up the user's credit and use it to purchase goods and services.

Potentials
There is big potential in this market as consumer's confidence on mobile payment has increased.
-Consumer are more comfortable with low-value transactions over such non-traditional means.This also includes parking,retail outlets and e-tickets.
-Market is at developing stage as there are many mobile phone users. Also, there is low competition.
Strategies
-Educating consumers
It refers the mobile payment functions such as bill payment
-Enhance security
It gives the mobile users when mobile payment system is secured
-Collaborate more banks and companies
The purpose is widening the ability and increased the customer satisfaction.
Related link(s):
1)http://mobile-money.com.my/about_us.htm
2)http://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci772807,00.html
3)http://en.wikipedia.org/wiki/Mobile_payment
4)http://www.mymode.com.my/html/new/index.jsp
5)http://www.theedgedaily.com/cms/content.jsp?id=com.tms.cms.article.Article_894885c0-cb73c03a-192d6040-bea9590f
6)http://biz.thestar.com.my/news/story.asp?file=/2007/5/8/business/17656075&sec=business Labels: week 5
The application of 3rd party certification programme in Malaysia


MSC Trustgate.com Sdn Bhd is the most famous application of 3rd party certification program in Malaysia. It was incorporated in 1999. It also licensed Certification Authority (CA). Its objective is open the network communication from both locally and across the ASEAN region. Its vision is to enable organization to conduct their business through internet.
Digital certificate have 3 functions
1) User authentication
It provides securities besides username and password
2) Encryption
It can secure data transmission.
3) Digital signatures
Integrity of the data can be ensured.
The transaction will be more secure as there is digital certificate.
Related links:
1)http://www.msctrustgate.com/

The threat of online security
Definition: An attack perpetrated using software and systems knowledge or expertise.
Issues of online security threat
Organization and users continue to experiences the threat of online security.
It will also cause financial losses. Nowadays, we still need more technology to defend online security threat.
Threat of online security fall under several general categories:
(1)Accidental action
(2)Malicious attacks
Third area of cyber vulnerability is online fraud
1) Accidental actions
-Problems arising from basic lack of knowledge about online security concepts
-Resulting from insecure information transfer
-Largely self-inflicted and avoidable
2) Malicious attacks
-Premeditated or malicious attacks
-Aim to do harm
-This viruses increased substantially, require more time and cost to recover.
Malicious code takes variety of forms-both pure and hybrid.
E.g. Computer virus, worm and trojan horse.
Computer viruses
~A program or a fragment of code that replicates by attaching copies of itself to other programs because it can clone itself independently.
~It can simply infect and spread over the operating system and cause the corrupt in the server system.
For an example: The May 2000 "I LOVE YOU" virus were propagated through Microsoft outlook e-mail and whose payloads were delivered as a Visual Basic for Application( VBA) programs attached to the e-mail messages. When recipient is unaware and opened the email, the VBA program looked up the entries in the recipient’s Outlook address book and send copies of the virus itself to the contacts in the address book.
Denial of Service Attacks
-Denial of service attack are carefully crafted and executed
-It usually involve one computer attacking another
-The use of multiple computers in a highly organized attack is becoming increasingly common Known as Distributed Denial of Service attacks (DDOS)
Online fraud
-Covering Internet transactions that involve falsified information.
-Identity theft is a major form of online fraud, or misrepresentation
-Data theft is the term use to describe not only the theft of the information but also unauthorized perusal or manipulate of private data
Related links:
1)http://www.bsagovernment.com/downloads/MajorOnlineThreats.pdf
Phishing is the new 21st century crime. It is the practice of sending out fake emails, or spam, written to appear as if they have been sent by banks or others organisations, with the intent of luring the recipient into revealing sensitive information such as usernames, passwords, account number, ATM pins or credit card details.
Example

Prevention Methods:
1. Never replying to e-mail or pop-up messages from companies that ask for personal, financial, or password information.
2. Do not use your personal email address on online forms or any public forum
such as such as newsgroups and mailing lists. Doing so may cause you be
flooded with spam.
3. Use anti-virus and anti-spyware software, as well as a firewall, and update them all regularly. Software can be use are such as AVG Antivirus, Avast, Avira and Norton. . Anti-virus software can detect and delete virus files
before they can attack a computer and firewall can protect computer from
being hacked into.
4. Always ensure that your login ID, password and other security number are protected at all times.
5. Review credit card and bank account statements as soon as you receive them to check for unauthorized charges. If your statement is late by more than a couple of days, call your credit card company or bank to confirm your billing address and account balances.
References
1) http://www.bankrate.com:80/brm/news/advice/Phishing-email.asp
2) http://www.comfsm.fm/~dleeling/training/phishing2.html
3)http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci916037,00.html
4)http://en.wikipedia.org/wiki/phishing
5)http://research.microsoft.com/apps/pubs/default.aspx?id=69363
Internet is a public network of nearly 50,000 networks connecting millions of computers throughout the world. As we interesting to become a member of this website, we should register by filling in some personal information such as name, date of birth, gender, address, telephone, e-mail address, occupation and interests. “Personal Financial Information” means any record containing a customer of a financial institution, whether in paper, electronic, or another form, that is handled by behalf of the institution or its affiliates.
The company will record consumer information such as names, addresses, phone numbers, bank and credit card account numbers and et-cetera if online purchase. However, is it security to protect consumer avoid utilize by other people?
Here are a few approaches on how to safeguard our personal and financial data:
• Do not reveal any personal information or particularly passwords to anyone. Remember to log out properly before leaving the Financial Data Center, after using any of the Financial Data Center or member services.
• Closing the browser window is necessary in order to prevent other users from reading personal information if share information with another user or use our service on a public computer.
• Avoid using passwords that can be easily guessed, such as the name of your favorite pet or your date of birth.
• Install antispyware and antivirus software. Symantec, Norton and Avast! antivirus are popular software use by computer users. Its clean computer and protect personal information, financial data and etc.
• Access control mechanism limits the actions that can be performed by an authenticated person or group and determines who can use the network resource and what resource can be used.
Related links:
1)http://www.privacyrights.org/fs/fs23-shopping.html
2)http://finance.yahoo.com/banking-budgeting/article/103893/Six-Ways-to-Safeguard-Your-Online-Assets
3)http://www.msisac.org/awareness/news/2007-03.cfm
Identify and compare the revenue model for Google, Amazon.com and eBay

Google
The Google’s revenue model is more on advertising such as Google AdWords. Google Adwords is one of the main sources of revenue for Google which generate more than 90% of the revenue. It offers advertising that pay per click that able the advertisers to show their advertisement instantly to the people who are looking for the information that are related to the advertiser offer. For the pay per click advertising is one of the payment ways that based on every time the advertiser have to pay when people click on their advertisement so it is easier to the advertiser to control costs.
eBay
The eBay website is the world’s largest e-auction site. For eBay the revenue model is e-auction which allows people bid for products and services though the internet. The bids also can be places anytime. Besides that, sellers and bidders can participate at anywhere though the internet by the computer. It had increased a lot of bidders and sellers to use their services because these services had brought a lot of convenience to them.
Amazon
Amazon.com started with online bookstore, but now Amazon.com had trying to diversify into variety product lines. Amazon.com was success in online-shopping. Therefore Amazon.com, is allows user to give feedback or comment to the web page of each product. They also can rate the product from 1 to 5 stars at the website. Amazon.com had provides an optional option for reviewers to indicate that the reviewer is one of the top reviewers. Amazon is pioneer affiliate partnership marketing. Amazon partner website can display Amazon books directly on their website. Beside that, Amazon pays some commission for referring customers to Amazon by placing links on their website to the Amazon homepage or to the Amazon specific product. Selling product on Amazon is become more popular nowadays as Amazon had expanded into variety product line and built a variety of features to support volume selling. It is unlike eBay, Amazon seller do not have to separate payment accounts.
Related links:
1)http://www.ecommerce-guide.com/essentials/ebay/article.php/3522981
2)http://www.organicspam.com/google_revenue_model.asp

Toys “R” US is an example of an E-Commerce failure. The company breach of contract claim. There is a case happened on Kimberly Alguard made an order by 7th December and requested three to six days delivery. However, she was told by representatives that the order will be delivered by 22nd December. On that day, she noticed the order was not going to arrive by Christmas whereby the order was used as a Christmas gifts for her child. She was ended up by searching other stores to replace the gifts for two days.
In my opinion, there are few causes for an E-Commerce failure
-Shipping delay and holidays may delay the delivery process.
Holidays affect the efficient of the company. Shipping product requires manpower and holidays tend to slow down the delivery process
-The company fails to handle the traffic and deal with many orders.
Toys “R” US heavily promoted its Internet site but it was unexpected that there is huge amount of traffic (1.75 million visitors weekly). It shows that order and delivery are two different issues. However, remedies of US$100 will be given to unsatisfied customers
-Insufficient capital in e-commerce industry.
E-commerce industry is considered as a large expansion. Most companies cannot afford not to put in that investment.
Related links:
1)http://72.14.235.132/search?q=cache:ofw0uWgw_0IJ:teaching.fec.anu.edu.au/INFS3002/_private/New_Folder/LecturePresentations/Wk8-EbusOrgInfrastructure.ppt+toys+R+us+e-commerce+failure&hl=en&ct=clnk&cd=10&gl=my
2)http://www.digital-web.com/articles/etailer_or_efailure/
3)http://www.ecommercetimes.com/story/2204.html

In 3rd September 1995, Pierre Omidyar, a French-born Iranian computer programmer founded a shopping website which enables buying and selling goods and services worldwide, which we all known it as, eBay. It is one of the successful e-commerce examples that come into our mind. There is 14 years old of history since founded and became public since 21st September 1998.
The causes of eBay success are
• Access
eBay has an open access, level playing field, transparency, equal access to information are attributes of any environment with positive outcomes.
• Connection
eBay enables individuals to connect and interact with one another such as market solutions, collaboration and wisdom crowds.
• Sense of Ownership
Skin in the game lets individuals feel there is an investment required to participate and accountability (e.g. reputation systems).
• Enjoying
The people enjoy the experience of the shopping bazaar and the competition of the bidding process. Also, eBay auction allows the users to bargain over the price.
• Practical place
It is a very practical place to buy and sell collectibles or commodities
• Attitude of the sellers
Most of the sellers in eBay are warm, decent, trustworthy and honest people.
Related links:
1)http://www.cs.brandeis.edu/~magnus/ief248a/eBay/history.html
2)http://en.wikipedia.org/wiki/EBay
E-Commerce was birth out of the World Wide Web (WWW). E-Commerce is a process of execution of commercial transactions electronically with the help of the leading technologies such as Electronic Data Interchange (EDI) and Electronic Funds Transfer (EFT). In the late 1970s ,these technologies appeared and allowed business companies and organizations to send commercial documents.
In 1984, electronic data interchange (EDI) was standardized through ASC X12. After this, it has become stable and reliable in transferring large amounts of transactions. So that, it guarantee companies would be able to complete transactions with one another reliably.
During year 1992, the first ‘point and click’ browser is available, when the Mosaic web-browser was made. The Mosaic browser was quickly adapted into a downloadable browser and Netscape, which allowed easier access to electronic commerce. The development of Digital subscriber line (DSL) was one of the key moment in the development to of e-commerce. DSL allowed quicker access and a persistent connection to the Internet.
In 1994, Netscape released the Navigator browser under the code name Mozilla. Pizza Hut offered pizza ordering on its Web page and the first online bank opened attempts to offer flower delivery and magazine subscriptions online.
The next development of e-commerce is Jeff Bezos launched Amazon.com in 1995. History of ecommerce is unpredictable without Amazon and eBay which were among the first Internet companies to allow electronic transactions. Amazon.com, Inc, famous e-commerce companies, founded in 1994 by Jeff Bezos and was one of the first American e-commerce companies to sell products over the Internet. Pierre Omidyar as AuctionWeb. Dell and Cisco who is the founder of eBay began to aggressively use Internet for commercial transactions.
During year 1998, the development of Red Hat Linux was gave users another choice in a platform other then Windows that was reliable and open-source. Microsoft faced with this competition needed to invest more in many things including electronic commerce. Besides that, Napster was an online application used to share music files for free. This application was yet another development in e-commerce. Many consumers used the site and were dictating what they wanted from the industry.
In 2000 a great number of business companies in the United States and Western Europe represented their services in the World Wide Web. The meaning of the word e-commerce was changed. The term e-commerce is the process of purchasing of available goods and services over the Internet using secure connections and electronic payment services.
History of e-commerce is a history of a new, virtual world which is evolving based on the customer advantage. There would be a glorious future of e-commerce in the 21st century. Ecommerce will further confirm itself a major tool of sale in the foreseeable future.
Today, the largest electronic commerce is Business-to-Business (B2B). Businesses involved in B2B sell their goods to other businesses. Besides, it can be seen that there will be a large growth in Business-to-Consumer (B2C) e-commerce, which online businesses is selling to individuals. However, even though B2C electronic commerce may be the most recognizable there are different varieties.
Related links:
1)www.ecommerce-land.com/history_ecommerce.html
2)www.flysyk02.netfirms.com/Ecommerce/History.htm
3)www.mapsofworld.com/referrals/internet/internet-history/history-of-e-commerce.html

I am Darton Tan Khee Hup. I am currently studying Bachelor in Business Administration Year 2 Semester 3. My hobby is playing table tennis. Playing table The top 5 websites that I like to visit are www.google.com, www.wikipedia.org, www.yahoo.com, www.thestar.com.my , www.facebook.com. Google and yahoo websites allow me to search more information about the relevant products. Wikipedia provides better information of most products. Facebook can maintain contact with my old friends. The top 5 internet activities are surfing net, chatting with friends, watch video through internet, send electronic mail and download song from internet.
My name is Ng Wen Ling. I am taking Bachelor of Business Administration in UTAR. I am currently Year 2 Semester 3 student. My hobbies are shopping and watching movie. The 5 websites that I always visit are www.utar.edu.my, www.friendster.com ,www.hotmail.com, www.google.com,and www.dygod.com. I always visit UTAR website to get all information such as the timetable, examination result, and the lecture notes. Friendster website can allow me to stay connected with all my friends. I creating an email account in Hotmail and I always login to check my mails. I use the Google.com to search my assignment information because it can help me find information that I need. Besides that, I always go to dygod.com to download all the movie that I like. The top five internet activities are watching, reading, listening, chatting and buying through internet. All this can be done through internet.
My name is Tan Hooi Ying. When I am free, I prefer go shopping, listen music as well as meet with my business partners. The top 5 website that I often visited are www.hotmail.com, www.google.com, www.questnet.com, www.sinchiew.com and www.yahoo.com. I prefer to visit these websites because they provide me all the information that I need when conducting research as well as improve my knowledge. Besides that, the top 5 internet activities that I used include msn, facebook, friendster, online games and search information.
I am Kong Chu Wei, currently I am study in UTAR and taking Bachelor of Business Administration course. My hobby is online, watching movie, play games. The website I visit the most is www.lelong.com.my because I can shopping at home by computer though the internet. Secondly is www.dygod.com , this website allows us to download movie by using peer to peer software. Thirdly is the www.cari.com.my , this website is a forum discussion. It allows me to contact many people. Many topics can discuss inside the forum. From there, I learn a lot of knowledge. The fourth is www.maybank2u.com.my , this website is an online banking website. I use this website to pay the electric bills, water bills, and telephone bills. The fifth is www.facebook.com , this website allows me to know a lot of people all around the world. I can upload my personal picture and share it with my friend. I also can visit their personal picture.
Labels:
week 2

