For more in-depth details, please visit the web sites below:
http://www.debtfirms.com/credit-card-debt.html
http://www.3debtconsolidation.com/creditcardmistakes.html
Hi, my dearest readers. Today I’m going to share some information regarding the electronic currency with you guys. Yet, before I provide the detail information about it, let me take this opportunity to share some basic knowledge first. As we know, the improvement of technology and internet has driven the use of electronic currency in the world. Besides, it also plays a major role in most of the transactions which perform or done through the internet. Thus, it is important to know about what is electronic currency as well as their pros and cons.
Now, let me ask you a question. What is the electronic currency? Isn’t something like traditional money that can be seen and touch? The answer definitely is NOT! In fact, electronic currency is an intangible money that cannot touch and it is money or scrip that just can be exchanged electronically.Thus, it is safe for us to use the electronic currency, we do not need to worry that the money will be lost. E-money, electronic cash, electronic currency, digital money, digital cash or digital currency is another term of electronic currency.
The examples of electronic currency are Electronic Funds Transfer (EFT) and direct deposit. EFT is used to perform financial transaction electronically by using computer-based systems while direct deposit is used to transfer money by using certain system.
There are many companies that provide electronic currency in the world. One of the companies using this currency is PayPal. PayPal is an e-commerce business which allows payments and money transfers to be made through internet. Besides, a PayPal account can be deposited from bank account through electronic debit or by credit card.
Click and buy is also another company that provides electronic currency. It allows customers made payment through the internet without ever providing their personal bank or card details again. This system is currently used by Skype, Msn, T-online, Playboy, Electronic Arts and etc.
However, there are pros and cons using this electronic currency. One of the major benefits is security, by using electronic currency you do not need to worry about the exposure of your private information to stranger. You can made payment through internet without giving any private information.
Second benefit is lower cost transaction. Unlike other business which may eat up an unreasonably fees from your profit, electronic currency trading allows you to earn more from your business which require minimal fees only. Another benefit is globalization, which allows you to assess into global market with no restriction and control from local currency.
One of the limitations is failure of technology. Breakdown of network, defected by worm or virus and etc will cause the data and record to be disclosed to outsiders which may become the barrier of using electronic currency. On the other hand, additional hardware is required by the company in order to perform this electronic currency software and the installation cost is quite costly. Thus, cost of implementation can be considered as a big issue for the company.
If you want to know more about the electronic currency, please do not hesitate to visit the following links which might be useful for you.
i) Electronic Currency
ii) Electronic Currency Trading
iii)Benefits of Electronic Currency Trading
Thanks for viewing our blog.
Labels: Hui Chew, week 5Reason Dell expanding business to brick-and-mortar
Loss on market share
Feel and touch the product
Target User
Others reasons
Scenario 1: Andrew, a fresh graduate is willing to buy a camera online but he does not have experience in online shopping. Therefore his first question might ask: “Will I be cheated when I entering my credit card number?”
Technical attack
Denial of service (DoS) or distributed denial of service (DDoS)
Trojan horse
Virus and worm
Nontechnical attack
Application of 3rd party certification programme in Malaysia
Hello, today i will continue to share another important topic with you again. As we know, there are many competitors in the business market and customers are more demanding and sophisticated as compared to before. Therefore, it is important for the local organisation to provide a secure information security system to their customers. In order to let you understand more about this system, I will share "the application of third party certification programme which is used in Malaysia" in this post.
Before I introduce the applicant, let me explain what is the meaning of 3rd party for this system. It means that, anyone who is issued digital certificate in order to provide verification that your website does practically represent your company and it is called certificate authorities (CAs). The most famous applicant in Malaysia is MSC Trustgate.com Sdn.
There are few products and services provided by Trustgate which include SSL Certificate, Managed PKI, Personal ID, MyTRUST, MyKAD ID, SSL VPN, Managed Security Services, VeriSign Certified Training and Application Development.
On the other hand, there are millions of business transactions performed over the unsecured network. This unsecured network will increase the possibility of private information to be exposed and altered by others. Thus, digital ID is needed in order to ensure that the information is remained private. This digital ID can be considered as personal ID, without the digital ID in electronic transaction your request will be rejected. Trustgate’s digital ID is governed by Digital Signature Act 1997.
MyTRUST for mobile phone is to enable customers have a more secure mobile banking and other financial services. It runs on Wireless PKI platform and Mobile Operator infrastructure. The picture below shows the process of this service.
MyKad designed by government with PKI capability is to allow their citizen to perform the online transaction with government and private company. MyKey provided by Trustgate is the PKI solution for MyKad and to allow the holder to authenticate themselves online and digitally sign document or transaction.
If you want to know more about the services provided by Trustgate, please do not hesitate to visit the links below:
i) MSC Trustgate.com Sdn
ii) Third Party Certification
Last but not least, I want to comment that through the services provided by Turstgate we are clear that 3rd party certification is playing a major role in our daily life now. Hence, the websites owner should use this 3rd party certification program to enhance the confidence of their customers. Labels: Hui Chew, Week 4
According to About.com, there are a few examples of phishing identified.
Secondly is the Citibank phishing scam. The attacker claims to be acting in the interests of safety and integrity for the online banking community by instructing readers to visit a fake website and enter critical financial details.
Thirdly is the PayPal phishing scam. This PayPal phishing scams tries to trick recipients by pretending to be some sort of security alert that urges recipients to confirm their account details via the link provided where clicking the link actually takes the recipient to the attacker's website.
Example of email phishing scam
Example of website phishing scam
According to some tips from Windows Live, below are some signs of phishing for prevention purposes.
Unsolicited requests for personal information - Most businesses and organization would not ask for your personal information because they should already have this information in their file. If you get a request for personal information, call the company first and make sure the request is legitimate.
The phrase “Click the link below to gain access to your account.” - HTML-formatted messages can contain links or forms that you can fill out just as you’d fill out a form on a Web site. The links that you are urged to click may contain all or part of a real company's name, but the link you see is actually taking you to a phony Web.
The words “verify your account.” - A legitimate business will not ask you to send passwords, log on names, Social Security numbers, or other personally identifiable information through e-mail. Be alert of a message that asks for personal information no matter how authentic it looks.
Addressed as “Customer” - If your bank or other organization regularly addresses you by name in its correspondence and you get an e-mail addressed to “Dear Customer,” this may be a phishing attempt.
Alarmist warnings - Phishers often attempt to get people to respond without thinking, and a message that conveys a sense of urgency, perhaps by saying that an account will be closed in 48 hours if you don’t take immediate action, may cause you to do just that.
Mistakes – Another indication that could reveal phishing expedition is that phishers often slip up on the finer details and overlook typos, mistakes in grammar, and so on.
Below is a video that summarizes some prevention methods against PHISHING !
In my opinion, phishing will not succeed if we know how to identify it and also the preventions. Therefore, I hope this post will be useful to all internet users and let us be the "Phis-erman" =)
How to safeguard our personal and financial data?
Hi, fellows! Today I'll provide some information on safeguarding to all of you. First of all, what does your personal and financial data mean to you? Is it only a name, age, address to you or your income, savings in banks, and money? As today’s technology is becoming more advance where online shopping and e-bill are becoming common to us, it also has opened up new opportunities for people to commit crime such as computer hacking and identity theft.
Never thought of crimes in the online world? Well, you should start aware of it now! Here are some tips to safeguard your personal and financial data:
Fend off “phishing”- Do not provide personal information through phone, mail or over the Internet, unless you know who you’re dealing with. Criminal may pose as representatives of banks, government agencies or popular online retailer and ask for your personal data through e-mails or by other means.
- The web address should start with “http://”.
- You should see a closed lock shown at the bottom of your computer screen.
- There should be a symbol of a key that is not broken.
Password protection- Always set a strong password to protect your access data and change the password once a while.
Install and update antispyware and antivirus programs- Install an antivirus program such as AVG antivirus, Norton antivirus, Kaspersky Antivirus and others to protect your computer from viruses that might steal or modify the data stored in your computer. In addition, scan the computer frequently to remove infected files.
Avoid clicking on pop-up ads or downloading information from unknown sites- Some of the pop-up ads itself is a virus, your computer will be infected once you click on it. Besides, a lot of video, images that available for download from some of the websites contained virus. Nowadays, even MSN messenger deliver virus through sending links which invite you to view something such as pictures.
So what are you waiting for? Let us start to prevent the outflow of our personal or financial data through internet right now!
Nowadays, e-commerce has become relatively popular and many companies have been thinking to be benefited from e-commerce. But how does Amazon.com gain more competitive advantage and stand the best above others?
Evidence generated from case studies and literature reviews have shown that the success of amazon.com is depends on four main factors: customer service, variety of product, easy navigation on its website, and the value position.
Customer Service
Amazon.com is proud of its customer services and desires to be the best customer centric company. A study shows that more than half of the Amazon.com’s customers are repeat customers. This success is based on customer value proposition, which is conducted by Bezos, founder of Amazon.com. He suggests that amazon.com must give a positive impression to its visitors, so that the potential buyers will visit the virtual store again. For example, a cookie file will be store in the users’ computer and next time, the users will be greeted with the words such as “Welcome back, Marcus Shopper”. After that, shoppers will proceed to recommend new book from the same genre by Amazon.com according to shoppers’ previous purchases. Besides, Bezos also mentioned that Amazon.com need to fulfill their promises such as on time delivery. As a result, Amazon.com can strengthen its customer relationship.
Variety of product
Initially, Amazon.com is an e-tailing pioneer selling books via an electronic catalog from its websites. In order to cope with changing environment and meet customer needs, Amazon.com has expanded its business from selling books to variety of products and services which include media, electronics, other merchandise, and other services.
Easy navigation
The homepage is a company’s first impression to customer and most important opportunity to serve the customer. Easy for use and navigate must start from the homepage to give customer convenience. Amazon.com’s homepage provides personalized product recommendations, e-mail notices, reliable payment system, and interactive support for all the customers.
Value position
Value is like a goal of the organization and plays an important role in Amazon.com’s success. There are 2 strong values that are practiced by Amazon.com. These include customer satisfaction and operational frugality (cost saving). The value of customer satisfaction can be referred back to the “customer service”. In the other hand, the operational frugality helps Amazon.com to save cost in order to spend huge money on branding and business expansion. For example, Amazon.com’s employees are paid based salaries that are obviously less than competitive rate. However, Amazon sustains employee loyalty through employees’ ownership of company shares and let employees benefit from the business success with their contribution.