E-CoMm3eRcE

W3 BeL0nG ToG3tHeRz...

Showing posts with label by Wei Chien. Show all posts
Showing posts with label by Wei Chien. Show all posts


One of the many challenges facing the countries in the Asia-Pacific today is preparing their societies and governments for globalizatio
n and the information and communication revolution. Policy-makers, business executives, NGO activists, academics, and ordinary citizens are increasingly concerned with the need to make their societies competitive in the emergent information economy. Information and communications technologies (ICTs) are playing an increasingly vital role in the daily lives of people, revolutionizing work and leisure and changing the rules of doing business. In the realm of government, ICT applications are promising to enhance the delivery of public goods and services to citizens not only by improving the process and management of government, but also by redefining the traditional concepts of citizenship and democracy.

What is e-Government?
Definitions of e-government range from “the use of information technology to free movement of information to overcome the physical bounds of traditional paper and physical based systems”to “the use of technology to enhance the access to and delivery of government services to benefit citizens, business partners and employees.” The common theme behind these definitions is that e-government involves the automation or computerization of existing paper-based procedures that will prompt new styles of leadership, new ways of debating and deciding strategies, new ways of transacting business, new ways of listening to citizens and communities, and new ways of organizing and delivering information.



The implementation of e-government in Malaysia started since the initiation of Multimedia Super Corridor (MSC) in 1996 by the Malaysian government. Ultimately, e-government aims to enhance access to and delivery of government services to benefit citizens. More important, it aims to help strengthen government’s drive toward effective governance and increased transparency to better manage a country’s social and economic resources for development. e-Government aims to make interaction with citizens, businesses, government employees, government agencies and other governments more convenient, friendly, transparent, inexpensive and effective.


The 7 pilot projects of the Electronic Government Flagship Application:
1. Project Monitoring System (SPP II)

2. Human Resource Management Information System (HRMIS)











3. Generic Office Environment (GOE)

4. Electronic Procurement (EP)















5. Electronic Labour Exchange (ELX)



6. Electronic Services(e-services)






7. E-Syariah




Citizen’s adoption strategies
Any sound e-government policy must consider a citizen-centered approach. This means that e-government should be an end-user or demand-driven service. However, many citizens do not use e-government for several reasons, among these unfamiliarity with ICT, lack of access, lack of training, and concerns about privacy and security of information. While e-government may provide ease and convenience in the delivery of public services, and offer innovative government services, none of these will prompt citizen use unless the concerns mentioned above are first addressed.

References:
E-Government

The Malaysia Government's Official Portal

e-Government in Malaysia

Implementation of Electronic Commerce in Malaysia



Did you believe that money makes the world go around? If so, then does the world spin faster when money can circle the globe in a fraction of a second? “Money” itself comes in multiple such as coins, paper, negotiable bonds and now bits of data residing on computer servers or pulses of light flowing through a fiber optic network. Changes in currency are causing ripple effects in everything from crime to the stability of governments. One of the challenges will come from the move to electronic currency. Electronic currency refers to several systems which enable a buyer to pay electronically by transmitting a unique number (digital certificate) similar to a banknote number.


Unlike credit card payments where the identity of the buyer can be established, digital cash acts like real cash is anonymous. This electronic currency also been implemented for lack of controls and security of anonymous payments systems like bank notes and coins. For example, lack of proof of payment, theft of payments media and black payments for bribes, tax evasion and black markets. It is commonly involved in computer networks, internet and the digital stored value systems. Some examples of electronic currency are Electronic Funds Transfer (EFT) and direct deposit.

The difference between electronic currency and other forms of electronic payments is that issuer backs currency. There is no need for a recipient of the funds to trust the person with whom they are transacting as long as they trust the issuer. A transaction with electronic currency places real funds into a seller’s account whereas an electronic payment system places only a promise to pay in that account. This technology provides a technological innovation that may require people to have faith in companies and other private sectors.


References:
http://dsns.csie.nctu.edu.tw/research/crypto/HTML/PDF/C82/199.PDF
http://www.businessdictionary.com/definition/digital-cash.html

Unauthorized Tapping Into Home WIFI - Teenager is facing a Jail term.


When I saw on this post, I can’t stop laughing on it!


Unbelievable, it is the first time I heard about that unauthorized tapping others’ home WiFi ended in the jail. When I first saw on the title, I get very excited and curious how it could happen by continue reading on the post. However, the post did not give much information; therefore, I have googled it to prove to myself and also others who are feeling the same like me right now.


It is a true story! It really happened, whereby a 17 years old teen in Singapore, Garyl Tan Jia Luo, is the first person to be charged with tapping into someone else’s wireless internet connection under the Computer Misuse Act. She is facing up to 3 years in prison for piggybacking his neighbour’s WiFi.


Piggybacking is actually means when someone finds an unlocked or open network and log into it without permission. So, now everyone knows what most of us have doing so far is actually called PIGGYBACKING. If piggybacking is a crime, I believe most of us will also end in a jail like Garyl. So, everyone may starts to ask, is it piggybacking really a CRIME? What’s wrong with piggybacking?


Whether piggybacking is a crime is actually depends on each country’s norms and regulation.


In my opinion, yes, it can be considered that piggybacking is a kind of wrong doings because by legally you do not pay for and use it without permission. It means that you are actually stealing someone else’s signal. Stealing is a kind of crime in the first place because you are taking services that you aren’t entitled to, whether or not the person concern about it. If someone left their car doors opens, that is not an invitation for you to take it or even to sit in it. Same situation applies there.


However, some might be thinking that the owner of the home WiFi has the responsibility too. The owner who sets up the WiFi, if unwilling to let others to have access on it, he or she should have set a security password on it as the WiFi has such function. However, the owner did not do so. Therefore, in another way, it is actually implies to the internet users that it is a free and open WiFi available to be accessed. It should not be a crime for that reason.


So, unauthorized access to someone else’s network is an unethical act unless it is a public available WiFi. Even though some owner may not concern about it, it is better not to do so because you may not know one day you might be the next Garyl.


References:

Singapore teen faces 3 years' jail for tapping into another's wireless Internet


Singapore teen faces 3-year ‘computer misuse’ jail term


Wi-Fi Piggybacking? Watch out for the Fine


Wi-Fi piggybacking is OK, say silicon.com readers


FISHING?? Or Phishing?

Most of the average home computer users like us are always bamboozled by the technology jargon. Why is it they have to use such technology jargon? The best answer will be to WARN people about the most serious security problem! That is what we so called “GEEK SPEAK”, to confuse the net users. Lol…

So, what is PHSHING actually?

In computing, phishing is a form of criminal activity using social engineering techniques. Social engineering is a type of nontechnical attack that uses social pressures to trick computer user into compromising computer networks to which those individuals have access. Phishers attempt to fraudulently acquire sensitive information, such as passwords and credit card details, by masquerading as a trustworthy person or business in an electronic communication. It is often done by impersonating legitimate web sites such as eBay, PayPal and online banking. Phishing is typically carried out using email or an instant message.

Phishing is a significant and growing problem which threatens to impose increasing monetary losses on businesses and to shatter consumer confidence in e-commerce. Phishing attacks have the potential to become much more sophisticated, making user-based protection mechanisms fragile given the user population of non-experts.

Wants to know the victims of phishing in Malaysia?

In September 2004, a Citibank phishing e-mail started to spread around via e-mail in Malaysia, trying to warn the customers of possible fraud which affecting their accounts and urge them to log in to check the status.

Remark: Click to enlarge

In year of 2006, RHB Bank was also once became the target of phishing scam. Such fake e-mail is sent by unauthorized party to deceive the users.

Remark: Click to enlarge

Of course, the most recent case happened in Malaysia is Phishing scams e-mail from Maybank Malaysia. This took place during March 2009. The fake e-mails are widely sent to mislead customers and even the public who are not Maybank's customer.


Prevention is better than cure!! Therefore, there are several steps available for computer users like us to avoid being phished.

1. Don’t ever T
RUST
Don’t ever trust e-mails that urgently requesting personal financial information. Phishers want you to react immediately and therefore include many upsetting or exciting statements which trigger fear or happiness. The most popular method is by presenting you as the winner of a lottery. (So don't be silly, there's no free lunch in the world).


2. Don’t CLICK anything

Avoid clicking any links directly from your e-mails. Rather, open a new browser to open the links. This is because users may overlook the links which sometimes being masked, meaning that the link you see does not take you to that address but somewhere different, and usually an illegitimate Web site.

3. Check the SENDER’s e-mail

When the users receive any e-mail asking them to verify their account information, the users should check the sender’s e-mail address. When the e-mail address is not the domain of a legitimate bank, then the possibility of a phishing e-mail is obviously ascertain.

4. Check for “Https” rather than “http”
Users should always check whether there is an “s” after the “http” in the URL. When there is a “https” appears, most probably that it is a phishing e-mail. To make the phishing e-mail messages look even more legitimate, they may place a link in the e-mail which appears to go to the legitimate Web site, however, it actually brings you to a phony scam site or possibly a pop-up window that looks exactly like the official site.



References:
Don't Click Anything

Anti-Phishing Game To Help Raise Awareness

Recognize Phishing Scam and Fraudulent E-mail

Mobile Device To Defends Against Phishing


Powered By Blogger

No. of Visitors

web counter

Time and Date

About This Blog

~ W3 B3L0nG ToG3tHeRz ~

We are from UTAR BAC 11, this blog set up is of course for the purpose of blogging. But it is all about E-COMMERCE.
Our group members included:

1) Clara Cheng Hwee Ling
2) Quek Chaw Mien
3) Sia Chee Ying
4) Yap Wei Chien

好开心

好开心

Lovely ~~

Lovely ~~

Lets Chat


ShoutMix chat widget

Followers

Music Player