Powered By Blogger

Welcome To The Marvelous World

Welcome to the Marvelous blog. We the Marvelous are From University Tunku Abdul Rahman Year 3 Semester 1. Our Group consist of 3 members included myself Eric known as Marvelous number 1. Sathiyasilan as Marvelous number 2 and Hon Fei as Marvelous number 3. Our Blog explain about how are we going to deal with our weekly assignment title about E-Commerce. Please anjoy and hope our information may help you all to gain more knowledge about E-Commerce

Wednesday, June 11, 2008

Review on My E-Commerce blog (week 4)

After reviewing http://ecommerze.blogspot.com/search/label/Internet%20Security I realize that how dangerous computer viruses and the different types of viruses may have different type of threat to our computer. According to the sites, among 130mil population internet user in China there one million of them got infected by viruses.

We should be proud that our Malaysian government has spend an amount of RM43 million to set up an International Multinational Partnership against Cyber terrorism. This centre offers the world best brain and facilities to help fight cyber security threat by eliminating viruses that roaming in the internet in our country.

On the other hand, Spamming is also one of the internet threats where its function is flooding of electronic mail systems with “junk e-mail”. Also known as unsolicited bulk messages sent through the electronic messaging systems. There are various types of spam such as PDF Spam, Piggyback Spam, and Greeting Card Spam where each of them pays a different role of their own.
Downloading movies or even mp3 in the internet may cause a threat because you may invite unwanted hackers hack into your computers. For example, one of the military pentagons was hacked and taken of 1500 emails account offline. After the incident, the US military band using e-mail anymore. Not only PC, mobile phone also is a victim Malware or known as mobile malicious software that act like a virus attack in your mobile phone.

In conclusion, we should use the internet wisely in order to prevent virus attack. Install a reliable anti virus software.

Safeguarding your Personal and Financial Data (week4)

Since that E-Commerce has been a very popular and convenient way for users, Internet users nowadays are lack on confident by revealing their personal data online, this has been a barrier to them. No worries, I have successfully found out a website that may solve your problems. http://www.onlinebackupvault.com/. This program is the one source for secure reliable online offsite data backup storage. The web was designed to be user friendly by utilizing simple but extremely powerful backup software allowing easy backups and easy restores. This site is subdivided to two types of protection which are the business services and residential services.


The business services are one source for online, offsite, secure data backup. It provides an easy automated encrypted solution for backing up all your data servers and workstation. The packages include software clients for virtually al server operating systems and server applications. Besides that, it also offers unlimited retention dates that allowed business user to hold in storage as many revisions of files as you would like.



As for the residential service, it include a plans named “Smart Search” technology which automatically backups all your files including my documents desktop and also internet favorites. A new technology “Dailintomypc” that may remotely connect to your computer and assist you in selecting your files that you would like to backup as well as show you how to view your backup logs.

Phishing. Example and Prevention (week 4)

There are 2 types of phishing. One is the Phishing Attacks and the other one is the Spear-Phishing Attacks. A simple explanation about phishing is that there are a numbers of fake online website that tries to lure online users to leak out their personal data and password, especially the credit card number.

Many have been solicited by fake eBay and Citibank requests for additional personal information. Research has found that there are occasional an e-mail from eBay advising user to update their account. There is a click button of right-click and View Source on the e-mail send and whenever you click it will link you to the other destination rather than eBay sites. This is one of the techniques that use by the phisher to hope that they will lure users with the threat of their account being closed or worse, hoping that they will provide their personal information.

There are several ways to prevent phishing which is through education. Gain additional knowledge on how to suspect corporate e-mail, even if it comes from a reliable authority. For example a company can hire security experts to spear-phish their own organization by looking for weak links and educating employees. Companies also can stop sending out links within IT, HR, and accounting-related e-mail rather than refer employees to an intranet, password-protected home page. Companies should also use secure Web forms rather than e-mail to transact personal information such as social security numbers and the like.

http://www.cnet.com/

Threat of Online Security (week 4)



The online security is the practice of protecting and preserving private resources and information on the Internet. There are several famous online security threats such as Internet Attacks, Vulnerabilities, Malicious Code, Phishing, Spam and Security risk as well as future trends. Most online users will fall as a victim to identity the theft, for example lost or stolen of credit cards of wallets. Moreover, maybe there could be careless transaction when you are buying sometime online, you may not realize that when you pay your goods by credit cards, the transaction of your personal information may accidentally leak out to others. This may allowed them record your password and use your credit card number without any limitations.



In order to make sure our data is safe, Zone Labs has released ZoneAlarm Pro 6.5 and ZoneAlarm Internet Security Suite 6.5, the first security software apps I know of to offer real-world identity protection, monitoring, and recovery. By partnering with an identity management company, Intersections, Zone Labs is making the promise that it will educate you, provide you the services you need to stay safe online and off, and should someone steal your identity, the team will be there to help you recover with personal assistance. Had you purchased similar services from an identity management service directly, you could easily double the purchase price of ZoneAlarm Internet Security. But for ZoneAlarm Pro and Internet Security Suite customers, the monitoring is free.

http://www.zonealarm.com/


Friday, June 6, 2008

The Revenue Modal of Google, Amazon and eBay (week 3)



Google is a major player in the online advertising industry. Every time you search Google, you will see ads displayed along with your results. Those ads are never "mixed in" with the results - there is no "pay to play" on Google which is one of the reasons Google became the most popular search engine in the first place. But the sponsored text-link ads above and to the right of the results generate a great deal of money for Google. These ads are known as "Google Adwords." Those who wish to advertise via Google can learn more on Google's Adwords page.

Google AdWords is a pay per click advertising program of Google designed that allow the advertisers to present advertisements to people at the instant the people are looking for information related to what the advertiser has to offer.

By using Pay-Per-Click (PPC) is the best way to send immediate, targeted traffic to your website. It is an online advertising payment model in which payment is based on qualifying click-through. An advertiser has to pay every time his ad receives a click. The Advertisers decide the keywords relevant to their offer that should display their ad and the maximum amount they are willing to pay per click for that keyword.

As for http://www.amazon.com/, it is a well known E-Commerce nowadays. From a sellers books and CDs musical product to a multi seller which include electronics, homes, grocery and many more. The main revenue from amazon is that it sell it product online. Besides that, amazon.com allowed others to published their advertisement in their website. By charging certain commision from the advertiser, it become one of the revenue beside selling their product.

Finally, http://www.ebay.com/ are slightly different from amazon where it dont have their own product to sell. ebay is like a middle person where the website allowed others to post their product on the site and sells them. Transaction fees will be received from those who interested to post their product using the name of ebay. If the product was successfully sold, yet another commision will be received.

When a user searches Google’s search engine, ads for relevant words are shown as "sponsored link" on the right side of the screen, and sometimes above the main search results. Google generate most of the revenue from Google AdWords.

Thursday, June 5, 2008

E-Commerce Failure (week 3)


No doubt about it, if there is a success there must have a failures. IBM’s World Avenue Mall is one of the main failures of E-Commerce.

The reason is because IBM was probably launched too early before online usage became sufficiently popular to justify IBM’s investment in that project. Merchants participating in the World Avenue Mall also complained that IBM did not adequately promote the project. IBM claims it learned another valuable lesson from the project that IBM’s name alone is not sufficient to bring enough customers traffic to the site to make it a success.

One year after it was launched, that failure was attributed in the press to a variety of factors including the weakness in the music industry that year leading to deep discounting by retailers because the site was not easy to use, consumers seemed to prefer ordering through traditional stores.

As a conclusion, it is not surprisingly that there are also problems which may slow down the growth of e-commerce. The U.S. Federal Communications Commission may permit telephone companies to charge special rates for accessing the Internet. U.S. state governments continue to try to collect sales and use taxes on transactions consummated over the Internet. Some traditional "brick-and-mortar" stores are feeling threatened by Internet-only retailers, and are pressuring major manufacturers to stop selling through that channel.

E-Commerce Success (week 3)

The reason of the Success in E-Commerce is because by creating a website online can direct and indirectly deal with every single person around the world because people may use global search to get to the website they desired and they can do it anytime 24/7/365. Besides that, the creator of the site may change their catalog with a fast and convenience updating. Besides, it also may shrink the market competition gap by competing with all others equal footing product with much bigger company. Also a 24 hours stalling may increase profit and reduce unnecessary phone calls and mailing. Most important is to reduce cost on labor, customer services and sales support.


In the 21st century, the United State and Canada has begun discussing the disproportionately large number of online users. According to their research, there are top four E-Commerce successes in the internet was reviewed. One and the most well known is the http://www.amazon.com/, which is an online book, CD and video retailer.

Follow by, http://www.ebay.com/ which operates an online person-to-person exchange in an auction format, permitting trading of personal items such as antiques, coins, and other items.

Thirdly, http://www.etrade.com/ which provides on-line investing services, including automated stock, bonds and mutual fund order placement at low commission rates; portfolio tracking; and real-time market commentary and analysis.