Mobile payment system in Malaysia is a point-of sale payment made through a mobile device. It enables consumers to receive and send money using mobile device such as mobile phone, Smartphone, Cellular telephone and personal digital assistant (PDA). With that, consumers no longer need to bring any cash or credit card while travelling, they just need to use their hand phone as their credit card to make the payments. It is more convenient for consumers especially in this fast growing market. The largest credit card payment system is visa which launches a universal system and signed with mobile giants. Mobile giant like Nokia launches this service in Nokia handset which allows customers to remote payment, person-to-person payments, and contact fewer payments.
Mobile Money International Sdn.Bhd is a Mobile payment system in Malaysia which implements the MM wallet and allows customers to send a payment request through an SMS text message by personal identification number (pin) authorization to pay their bills. Consumers can SMS-transfer money to anyone, anywhere, and anytime.
There are many benefits of Mobile Money system as following:
(1) This system is easy to sell to anyone, anywhere and anytime. The trader can sell goods to customers of other countries and receive payment on time.
(2) It provides safe and secure transaction. The Mobile Money Payments System is subjected to strict requirements by Bank Negara and certain banks. Therefore, consumers not need to concern about fraud or mistake during the transaction.
(3) The transactions get done almost instantly. Mobile Money guarantees those merchants are paid in two working days, whereas other payment systems need more days than that to process it.
(4) Merchants can use multi-methods to request for payments. For example: merchants can choose to pay the payment through the sms, Mobile Money website, online storefront system, or others. It is easier for merchants to choose which methods are more convenient for them.
Other than that, G-cash is an online payment service provider which has simple goal of converting a mobile phone into a wallet. G-cash can also be used to make purchase transactions and allows consumers to make the payment in the web. The transaction payments include government taxes, medicine, boat fare, food, insurance company, internet service and so on.
Besides that, G-cash also provides some benefits such as cash can be retrieved quickly and transferred safely using transaction technology. Based on the personalized account, people have full control over their money. Another benefit is G-cash also provides safe and secure transaction every time. This is because this system incorporates encryption technology to make transactions complete and to make sure the transaction of account is safe and secure.
Lastly, with the introduction of mobile payment systems, customers no longer need to queue up to pay their bills. Now it will make consumers’ access to the financial institutions and payment processing network even more effective and easy.
How to enquiries on Mobile Money ??
How Mobile Money Works ??
Thursday, June 26, 2008
Mobile Payment systems in Malaysia: Its potentials and consumers' adoption strategies.
Labels: week 5
Posted by tiffany_lim at 10:12 AM 0 comments
Credit Card debts: Causes and prevention
Credit card debts result when the user of a credit card purchases an goods or service through the card system. When the user of credit card does not pay for the money spent, the debt accumulates and increases through interest and penalties which usually in high rates.
The causes of the great amount of debts are mostly unconsciousness of user on the amount used to pay for goods or services by credit card. Some of the users only realized that they had great debts on credit card when the monthly statement is received. Great debts frequently come into the picture for those who are addicted to shop and make payment using the credit card. The knowledge and understanding of the credit card user is not sufficient to make planning in using the credit card and repaying the debt. Purchasing goods or services by credit card can also rephrase as purchasing goods or services using the future money which has not be earn. Therefore, the debts also commonly caused by credit card user unable to repay the debts because usually they spent more than what they earn which cause the user only affordable to repay the minimum amount for long period.
There are prevention and signal to show that the credit card users are on path to fully repay the debts. Purchase goods or services for petty amount by available cash or by debit card is the best. The raw idea of using credit card is to think twice before payment is made on some of the goods or services that are not in priority in the daily life, this will avoid the user from being trap by debts. The key to remember in using credit card is spent more pay more, spent more than earn debt is also more. There is expert suggested that pay the balance with the highest annual percentage rate first then move onto the debt with the next-highest interest rate. This will help the user to reduce the interest burden in repaying the debts. Good signal to be given if the credit card user able to repay the debts more than the minimum amount require for each month because it tells that the debts can be repay in less interest and in shorter period. For credit card user, it is advised to have full understanding on credit card and the consequence in using it. Comprehensive planning on using credit card and repaying the debt is a “must” to prevent attacked by creditors and warning letters.
Causes of using credit card and prevention on unlimited debt that has been discussed can be references to pre – credit card user to consider and be alert.
Labels: week 5
Posted by Boss at 9:59 AM 1 comments
Electronic currency
Say hello to Safe and convenient new electronic currency
But, now technological progress has undoubtedly created a new direction in the means of payment. The Internet and E-commerce have become an increasingly commercial area, where daily payments are rendered for goods, information and services.
Electronic currency is essentially a system that allows a person to pay for goods or services by transmitting a number from one computer to another. These transactions are carried out electronically, transferring funds from one party to another, by either a debit or credit. These funds are instantly cleared and secured by using strong encryption, thus eliminating the payment risk to the consumer. As a result, electronic payments are becoming the central part to online business between customer and seller.
There are few benefits on the electronic payment system. For instance, privacy and confidentiality of customer’s information are adequately protected. The systems unlike credit card companies, they are invading consumer's privacy by collecting their spending habits and reselling the data to third parties. Besides, the security of electronic currency is provided by the use of encryption. The enacted digital signature statutes require a certification authority to use a trustworthy system. Therefore, even though there is speculation about the security of the Internet, electronic currency consumers are probably more secure in their transactions than the more traditional ways of doing business.
Apart from that, let me introduce you others type of electronic currency which is electronic micropayments. This is the system where it solves the problem of purchasing inexpensive items by using credit cards. If you are interested, please go and click the words of 'electronic micropayments' that i highlighted and read through the article. It can help you to gain the knowledges about it.
Labels: week 5
Posted by ah may at 9:55 AM 2 comments
The application of pre-paid cash card for consumers
Money can be loaded onto a prepaid card by cash at bank, post office, Pay Point Terminal, bank transfer or even by another credit card. Applying for a prepaid credit or debit card is an extremely simple process, because it does not involve a credit search or any kind because you are not being offered credit. The application is quick and painless. Some of the prepaid card does not require that you be 18 years old in order to be approved for a card, which is a greater way to teach teenagers how to manage their finance properly. MasterCard and Maestro prepaid cards are available through participating financial institutions are retailers. People can apply it as well.
A prepaid cash card is good to use because there is no debt risk. With a prepaid card, users are no chance of spending too much as you are limited to the amount you put on your card. Prepaid card are an ideal way to budget for yourself or help to manage your children spending. There are some benefits for using Visa prepaid card at http://www.corporate.visa.com/pd/consumer_products/prepaid.jsp
Labels: week 5
Posted by kylly at 9:47 AM 0 comments
Thursday, June 19, 2008
Phishing : Examples and its prevention methods
Phishing also referred to spoofing or carding. Phishing is type of electronic fraud that uses social engineering. Phishers pretend to be a trustworthy party such as a bank in attempt to steal sensitive information like passwords, bank account numbers, or credit card details. A Phishing attack is carried out electronically, commonly through email or instant messaging. Typically, the messages appear to come from well known and trusty websites such as eBay, PayPal, and BestBuy. However, it can also occur through voice phone calls, text messages, or other electronic communication methods. Once a phisher has collected this sensitive information, it can be used to take money from an account or simply shuffle money back and forth to make it harder to audit where money flows.
There are some methods of anti-phishing. The followings are:
- Do not use the links in an email or instant message if we suspect the message might not be authentic or we do not know the sender or user's handle. Instead of using the links, we should call to the company or log on to the website directly by typing in the web address in our browsers.
- Besides, we should avoid filling in the forms in email messages that ask for personal financial information. The account information or credit cards numbers should be given via a secure website or telephone from the authority company.
- In addition, we are encouraging to make it a habit to enter the address of any banking, shopping, auction, or financial transaction website our self and not depend on displayed links because phishers are now able to spoof or forge both the “http://” that we normally see when we are on a secure web server.
- Furthermore, we must regularly check our bank, credit, and debit card statements to ensure that all transactions are correct. If anything suspicious or the transactions are not recognized, we must contact our bank and all card issuers immediately.
- Moreover, user education is also important. If users been educated about how to detect a phishing mail or site and how to securely access the website, a lot of phishing attacks will not succeed. At the mean times, related authority could put the security tips and advises up on the user’s login page or send it as emails. The method varies depending on the type of business and channels available to reach the user.
- One of the best ways to prevent a phishing attack is to use phishing software. There are many products on the market and many come with or are included in anti virus and anti spam software. Most anti phishing programs works by using a filter, much like an anti spam filter. The program filters through our incoming emails searching for any content within the message or in URLs that may be phishing related or carries phishing software. If such emails are found they are deleted while the normal email gets filtered through to our inbox.
Lastly, although phishing is not as popular as it was before, it is still around and can cause us a lot of stress and even money loss, so it is always important to take anti phishing methods to ensure we will never fall victims to their attacks.
Labels: week 4
Posted by ah may at 10:09 AM 2 comments
The threat of online security: How safe is our data?
There are a lot of threats surrounding and saturated in the website by the hackers. Technically, one of the most common threats is the use of malicious software in tracking and exploiting the trust and confidential information in between the transaction. The typical malicious softwares are virus, worm, Trojan horse and rookit. As viruses become more sophisticated bait, even the messages containing virus payloads are getting slicker There is also Denial-of service crash computers or issue floods of commands to overwhelm websites to swipe personal information, such as bank and credit-card numbers. Distributed denial-of-service comes into picture to gain illegal access to multiple of computers and send a flood of data packets to the target computer. Spam is being release to monitor user’s email or personal database for other illegal purpose usage. Social engineering and phishing are also often used to trick customer into providing their information on the fake website. Social networks, Internet calling systems, and smart phones could be more vulnerable to hackers in the coming future as shown in network security expert research by Aaron Ricadela.
To promote safety of users data in online transaction, the Symantec had enclose worldwide security intelligence data gathered from a wide range of sources through their products to ensure security. Future more, it attracts email from around the world to measure global spam and phishing activity to provide an extensive antifraud community of enterprises and consumers; and receive fraudulent Web site addresses for alerting and filtering across a broad range of solutions. There is more products and services provided by Symantec to secure data and reduce the risk of being attack by hackers. For safeguard of non technical threats, enterprises are given advice to secure their own data and customer data by setting up an outside personal storage device and well manage their web based asset.
Therefore, certain degree of data safety can be ensured by accompanying the step proposed by online security expert as shown in http://www.symantec.com/business/
Labels: week 4
Posted by Boss at 9:37 AM 1 comments
A review on a post on Internet Secuity from My E-commerce blog.
Malware is software designed to harm or damage a computer system without the owner's consent. Nowadays, there are more than one million types of worms, Trojan horses, computer viruses, spyware and dishonest adware in the computer network. The virus issues are very serious in our life, this is because they might corrupt or erase all data in a computer, spread viruses to other computers through our e-mail program, or even delete everything on hard disk. Most common way is spread by attachment in e-mail message or instant messaging message or attachment of some funny images, greeting cards, video and audio files.
Users can use protective tools like firewalls, anti–virus such as AVG Free Anti-Virus, Panda Software Anti-virus product, anti spyware and others to protect or secure against Trojan Horses, Worms, Spyware, Adware and theft of your identity. Other than that, users can keep their computer virus database updated with the latest updates and antivirus tools. Most virus scanners try to deal with common Trojans with varying degrees of success. That is also called as “anti-Trojan” scanner.
Besides that, there are some methods to prevent malware problem.
For example: (1) user must keep their computer’s software patched and current. The operating system of computer and anti-virus software must be updated on certain period of time. (2)Install and operate firewall. Firewall is hardware or software which block outside users from getting into your computer.
The methods are following:
Normally blogger will provide their personal details in the blog such as things which they
- Users should not post any photos in the blog. Photos can invite trouble or unwanted
- Users can post the blog anonymously. In order to protect our personal detail, user
- Blogger can create different email and login addresses.
For example: blog name: blogname.blogspot.com
Login name: notmyname@gmail.com
Email address: anothername@gmail.com
User: screen name
If email and login address are the same, it will be easier for hackers to figure what your login name is and they can use program to crack the user’s password.
Finally, if bloggers follow the methods as above, it will make the users safer and more secured in the blog.
Labels: week 4
Posted by tiffany_lim at 9:36 AM 0 comments
How to safeguard our personal and financial data
Labels: week 4
Posted by kylly at 9:36 AM 0 comments
Thursday, June 12, 2008
The history and evolution of E-commerce
The history of e-commerce is a history of two information technology has transformed business processes. EDI (Electronic Data Interchange) is widely viewed as the beginning of e-commerce if we consider e-commerce as the networking of business communities and digitalization of business information. EDI is a set of standards developed in the 1960’s to exchange business information and do electronic transactions. The evolution of e-commerce has change rapidly from unprofitable good idea to a profitable good idea. In year 1984, an EDI was standardized. This guaranteed that companies would be able to complete the transactions with one to another reliably.
In year 1992, the compuserve has offered online retail products to its customers. This has gives people the first chance to buy things through their computer. After two years, Netscape has been arrived in year 1994. It has provided users a simple browser to surf the internet and a safety online transaction technology called Secure Sockets Layer.
In year 1995, two of the biggest names in e-commerce are launched. There are Amazon and eBay. There allow users to shopping through online. When it comes to year 1998, there has come out the DSL (Digital Subscriber Line). It provides a fast, always-on internet service to subscriber. This encourages users to spend more time and money to online.
In year 1999, there has a new channel called business.com. This allows people to have a quick find anything for the business such as construction, health care, technology, and so on. There are over 65,000 business categories. All these are the evolution year by year. There is increased confidence in online order fulfillment, the security of personal data, and easier online return option. Nowadays, the evolution of significant changes as wireless e-commerce has been grown.
Labels: week 3
Posted by kylly at 3:59 PM 0 comments
An example of an E-commerce success and its causes
E-commerce contains buying and selling of product or service information, exchanging the product over computer network such as internet and the World Wide Web. An example of an E-commerce success is eBay. It is the world’s largest and most prevalent online marketplace which can buy and sell easier locally, nationally, and globally. Business and individual can perform their business such as buying and selling mobile phones, computer, clothing, shoes, accessories, camera and so on through the internet and web so that business can make profit and individual can earn a great living from selling on eBay.
eBay succeeds because it takes advantage of the internet opportunity, targets the right customer need that is by providing online auction at the right time. Before that, auctions are not popular among people but it has then become common at eBay. Now eBay has created customer need that is by creating an auction for everyone at anytime and anywhere. Auctions are just one click away from the mouse and this is also the time when number of internet users increases tremendously. This is why we say eBay targeted the right market at the right time.
The cause for eBay’s success is because it has taken the same role as the government that plays in the wider economy. For example: eBay sets the rules for commerce and implement them in order for transactions to be fair, cheap and foreseeable. Majority of the consumers can buy and sell with reasonable confidence as well as they will also get what they were promised, even though eBay still have flaws that are not perfect such as fraud and irregularities. Nowadays on the eBay marketplace, they continue to innovate and amalgamate the policies and technologies that make day-to-day activities even more faithful, honest, and efficient.
Labels: week 3
Posted by tiffany_lim at 3:54 PM 0 comments
An example of e-commerce failure and its causes
Labels: week 3
Posted by ah may at 3:50 PM 0 comments
Discuss how e-commerce can reduce cycle time, improve employees' empowerment and facilitate customer support
E-commerce able to reduce the time cycle from the inception of an idea to its implementation on the trading market in the sense of the ability in providing customers with a service faster than other competitors and gaining competitive advantage. For instance, organization which sells digital product are providing electronically delivered products with supporting raw intelligence data to customers to reduce the time and effort and increase the quality of reporting. This may reduce the inconveniency and time to setup a retail store to make the sales. E-commerce effectively helps the salespeople and customer service employees who are being empowered to increase customer loyalty by making customer feels convenience, fast and happy. Customers no longer need to wait the agent to call up the higher management level for negotiation and customer can satisfy with every negotiation done by empowered agent for instant. Especially these days, the truth of empowerment to employee cannot be denied. In fact, Terrence Foran, chairman and CEO of the Cleveland-based Lake West Group, shows that business-to-business sales is important in this century and retails managers must accept e-commerce business with the employee who can meet the creative, technological and strategic demands of setting up a site to be delegated the authority. E-commerce fac ilitates the customer support where it can be used to properly collect and analyze the relevant customer data. This helps in studying the document online customers or visitors patterns to acquire and retain users. In relations, customer support system is being setting up in most of the organization for providing the customer support service with respect to a consumer product and helps in storing product-related information database to be used. The customer support service system setup for e-commerce helps customer grant access to acquire the product and make application through electronic application form rather than a hardcopy of form.
Labels: week 3
Posted by Boss at 1:47 PM 0 comments
Self-introduction-ah may
My name is Chia Hui Gan. My nickname called Ah May. I have a dark color skin, a pair of big eyes, and a short height. I have 5 family members. They are parents, sister, brother and me. I was the youngest and my sister was the eldest. My lovely mother and sister was the most closet people to me. We are always sharing the happiness and sadness. My hometown was at Tanjung Sepat, Selangor. There was a very nice and peaceful place. The people in my hometown all are very friendly and the food there are also very tasty like ‘ba kut teh’, ‘seafood’, ‘bao’, ‘ban mee’, and so on. Then, my hobbies are traveling, shopping, listening to music, and chatting. The website that I most frequently visit is http://www.msn.com/ . I often chat with my friends and sister through the msn messenger. It helps me save a lot of money instead of by making a call. Besides, I can receive the email from my friends which can be a file contained of photos or information regarding the assignment. In addition, the website that I second frequently visit is http://www.google.com/ . I search information very often through this website. It is very useful for me because I can get the searching in a very short minute by just typing the keyword of the title that I wanted to get. Subsequently, I was able to grab a lot of knowledge and information from the sources that I found from the searching. Moreover, I used to visit http://www.youtube.com/ . In this website, I can watch many video clips which are very funny. Besides, I also can watch Hong Kong movie series by without buying any DVD at outside stores. Indirectly, I can save a lot of money and can enjoy the various types of movies at the mean time. In addition, the website that I quite often visit is http://www.utar.edu.my/ . I enter this website to check my examination results, looking for journals, downloaded the past year questions and so on. Sometimes, I will also visit http://www.matta.org.my/ to have a look for when is the matta fair been held. The reason is because I like traveling and I hope I can get a cheap package to go for vacation during my holidays.
Labels: self-introduction
Posted by ah may at 10:32 AM 1 comments
Wednesday, June 11, 2008
Self-introduction-KYLLY
My name is KEE LEE KIAN from Sabah Sandakan. I have five family members. I have many hobbies. There are swimming, listening to music, watching Taiwan series, “yamca” with friends, sleeping and so forth. All these that I like is because of it is able to lead me relaxing my mind especially after take a nap. Swimming can make me healthy. However, I will not go to swim when the weather is very cold. The top five websites that I visited the most are http://www.google.com/, http://www.hotmail.com/, http://www.friendster.com/, http://www.youtube.com/, and http://www.nst.com.my/. The reasons that I visit http://www.google.com/ are to search information regarding to the assignments. Moreover, google engine can search music that I like, free softwares that I want. For the hotmail website, I always use it to reply mails when I received mails from my friends. The hotmail website has many advertisements and promotions from companies. I also can forward the important mails to friends so that I can share those mails with them. Furthermore, the friendster website is a website which quite enjoyable because I can keep in touch with old friends. Besides that, there are able to make new friends and upload my “beautiful” photos. For the youtube.com, I could find a lot of funny videos, clips and musics. For the nst.com.my, there are many news on what are happening around the world. This website has a lot of articles. When I read through the articles, I can gain a lot of knowledge from there. For the internet activities, almost everyday I will open my MSN to chat with friends. Via MSN, I can share my feeling to my best friends. In addition, I always online to watch television movies in 8TV when I have free time. Moreover, when there I new movies, I will use “xun lei” or flashget to download those movie. I also will use e-banking to pay electrical bills and telephone bills. Furthermore, online to listen MYFM is my favourite.
Labels: self-introduction
Posted by kylly at 12:02 AM 1 comments
Saturday, June 7, 2008
Self-introduction - wenwen
My name is Lim Hui Woon. Most of my friends will call me Tiffany. I come from Muar, Johor. My hometown is a small town which is renowned for its delicious and inexpensive food at the street of food greed. There are some famous foods such as otak-otak, asam fish, fried oyster omelette, wanton noodles and others.
I have quite a big family which consists of 8 members. They are my parents, one elder sister, two younger sisters and brothers. I always go back to my hometown during the weekends, but sometimes time does not allow me to go back every time. I love my family very much. Besides that, my hobbies are playing badminton, basketball, squash, and listening to music. I like sports very much.
The website that I frequently visit is http://www.msn.com/ . This is because I can chat or share information with friends during my free time. We can even discuss the assignment through the msn messenger which is a good way that benefits students. Besides that, I also use the webcam to video chat with my old friends or my love ones. Other than that, http://www.youtube.com/ is the website that I normally visit. I like to watch movies such as Taiwan’s drama and some comic movies when I am free. These types of movie will make me feel more relax and happy during my study life, but because of assignments, thesis, and midterm which are a lot at the same time, I am not able to watch them frequently. Moreover, I always search for information through http://www.google.com/ which is quite useful for my assignments and my personal knowledge. I can also know the latest’s world news in Malaysia and some entertainment news such as the latest movie available and so on. Other http://www.utar.edu.my/ is the website that I frequently visit. I can search the website for my examination results and new time table for every new semester. Besides that, I can also search for journals as well as renewing the library’s book which proves to be very convenient. The last website I always visit is http://www.friendster.com/ as this website can let me get know to a lot of friends and also uploading my photos.
Labels: self-introduction
Posted by tiffany_lim at 11:05 PM 1 comments
Friday, June 6, 2008
Self Introduction-DingDongChuChu
My name is HAN NGEE TING from SANDAKAN, SABAH. My nickname is “eating”. There are five members in my family—father, mother, sister, younger brother and me. My hobbies are eating, drinking, watching movie, thinking, and playing piano. Unfortunately, all this can only enjoy in my hometown.
As for the websites and internet activities, http://www.airasia.com/ of course is the most I visit because my hometown is in East Malaysia and cannot like most of the friend in the university going back hometown easily, so I have to look for cheap flight fares. And I often buy the fare through this website by using credit card payment. http://www.google.com/ is also the website I frequently use to search information for personal use and for assignment purposes. There are many results which is need can be found by using this search engine. Other than that, http://www.gangqinpu.com/ is the website I normally visit. This is the website where there is melody sheet and melody from the most classic to the most modern, even the music we listened in the movie shows and popular music all can be found in this website. It is all in melody in notes without lyrics. So I will download what melody sheet and melody I want from this website easily. Without ignoring http://www.msn.com/ that is often look for the mail and newsletter sent by the external party, sometimes I also use to access the features available in the web page. The fifth website that is frequently visit is http://www.utar.edu.my/ where I can access to look for exam result, timetable, and link me to wble.
Labels: self-introduction
Posted by Boss at 12:27 PM 1 comments