A review on a post on Legal from My E-Commerce blog

Feb 23, 2009

After I had review from few posts form my e-commerce blog. Surfing internets are part of the life style for the newest generation. All sorts of information and entertainment can be found in the World Wide Web. Some of the web site provide free download of music, movie, software, and many more to internet users. Internet users should aware that download free songs, movies and etc from web site are offending the law. In UK, UK government is proposed new law toward to those use their account to access pirated material. These illegal downloading of music and movies are costing the entertainment industry lose few million of pounds in a year. It happens to Hong Kong most successful drama production company “TVB

There are many ways for us not to get involved in this situation, actually there are some web sites and software program provide such service to internet users with reasonable value for downloading a single track of music, movie, software and more. For example: Apple’s iTunes, Window media and etc. Cd’s key and license’s key were used for gaming’s Design company and software Design Company in order to prevent it products turn into pirated material.

As for our country “Malaysia”, government establishes education program helps to reduce of piracy. Government has recognized a two way approaches:

Enforcement (Ops Tulen) and,
Continuous raiding companies that use illegal software as well the illegal vendors selling the pirated software. A total of RM12.63 million worth of pirated hardware and software has been seized since 2002. A lot of the IT malls in Malaysia has been raided for the past few months.

Education (Sikap Tulen):
To educate the relevant groups on the importance of respecting Intellectual Property and stay away from pirated software. Those targeted groups are professionals, companies, public and IT malls
reference link:

A local e-commerce site review

Feb 22, 2009

Nowadays, along with widely use of e-commerce, lots of merchants more toward to have an attractive web site more than an attractive storefront, regardless to costs or customers, trading via web site seem to be more convenient to people.

The benefits are imaginable. The merchants will have expanded geographical market and customer base; always open for business; reduction of marketing and sales costs and so on. That is why this new created business models are broadly accepted.


For me, the web site that I will visit to be updated periodically is http://www.lb-lebliss.com/.


This is actually a web site that provides online shopping. The site provides key-words-search feature, so that its customer can key in the product’s name directly to get the information which is requested. Besides that, the point that attracted me to visit it repeatedly is the user-friendly web design. When you want to order an item, you can first add it into your shopping cart and continue shopping. Until everything have been done, just click the top button on your right and proceed to checkout. There are many of discounted items or stock clearance which listed at the left of the site. The methods of payment are various such as mobile money maybank 2 u and so on, mentioned at the bottom of the site. Everything is so comprehensive just at the first glance.






An article “7 ways to improve e-commerce sales in your online store” has been posted to remind the e-commerce web site to fulfill all kind of characteristics that a successful site needs to possess. First, it is to simplify shopping cart process. Second, offer a live text chart service. Third, give visitor real reasons to buy from you. Fourth, clearly show online security and hacker safe seals. Fifth, use customer review to influence visitors buying behavior. Sixth, offer related item during browse and checkout. Seventh, improve browse and product search results.
In Lebliss’s site, most of the criteria have been fulfilled. It is all shown on the home page and “about us” page. Only the online security and hacker seals do not be shown clearly. As a whole, the features in site of Lebliss are actually quite complete, just some further improvements are looked forward to be realised.















Reference:
(1) http://www.xantec.com.my/xblog/?p=109
(2) http://www.optima.com.my/solutions_ecommerce.html

Things to take note to prevent e-auction fraud when customer participating e-auction

Feb 17, 2009

Auction is a process of buying and selling goods or services by offering them up for bid,taking bids,and then selling the item to the winning bidder. It may refer to any mechanism or set of trading rules for exchange.

There are some types of auction which divide into primary and secondary type. Primary types include english auction, dutch auction, sealed first-price auction and vickery auction. Secondary types include all-pay auction and combinatorial auction.

Some tips for prevent e-auction fraud as followings:
(1)understand how the auction works
majority online auction will simply list the items that seller want to sell. Actually they don't verify the merchandise whether exists or not and would it described accurately. Sometimes
they can't guaranty the seller will keep their promise.

(2)check out the seller before bid
feedback forums with comments about seller based on customer's experience of auction sites should be aware by other customer.The negative information is a good warning sign,but the clean complaint record doesn't guarantee the transaction will go smoothly.

(3)be careful if seller is private individual
most of the concumer protection law doesn't apply to private sales, through goverment agencies may take action if there are many complaint the same individual or criminal fraud involved.

(4)get the information about seller
such as name,physical street address,email address and phone no are helpful for checking the seller out and following up if there is a problem.

(5)be wary of claims about collectibles and other expensive items
since customer can't examine the merchandise or have it appraised until after the sale,don't assume that claims about its condition or value are true.Save a copy of the description and any information to document claims that were made.

(6)aware about delivery,returns,warranties and service before made payment
ask about the return policy and get teh definite delivery time and insist that the shipment is insured.

(7)look for information on the auction site about insurance
some auction site will provide insurance that covers customers to a certain amount if somethings goes wrong.Read the terms of insurance carefully .Sometimes, there would be a deductible and limitations or requirements that apply.

(8)look for bonded sellers
some seller are bounded through programs that have investigatedd their business background and credit histories and guaranty your money back if they don't fulfill their promises.

(9)using escrow service for expensive purchase that aren't covered by insurance or bonding
it takes customer payment and forward it to seller once customer had confirm satisfactory delivery.If there is dispute, escrow service may act as referee.

(10)inform auction site about suspected fraud
the auction may have policies to remove sellers from the sites if they use"shills" or don't live up to their obligations.

referrence links:http://en.wikipedia.org/wiki/Auction
http://www.fraud.org/tips/internet/onlineauctions.htm

Corporate Blogging: A new marketing communication tool for companies

Corporate Blog ? What is Corporate blogging? Wikipedia simple define a corporate blog is published and used by an organization to reach its organizational goals. Nowadays, many corporate had started to create their own corporate blog, but how a blog help a organization to reach a goal?

A corporate blog is use to publish the information about the organization and the organization goal. It also can publish a news about the organization and also the news on the product. For example, a company can announce the date and some information about a coming new product. It can let a potential customer easy to track a company recent news and event.

Some corporate blog the blogger is only the CEO in the organization. These kind of corporate blog are call CEO blog. CEO can use their personal blog to announce the future planning of the organization. For example The CEOs blog of Jonathan Schwart, CEO of Sun Microsystem - Jonathan's Blog
Another type corporate blog is external blog, external corporate blog have the role to be a new marketing communication tool for a company. It allow the employee, the customer, the spokeperson to publish the post to the blog. It may give a stage to let the employee to tell their job satisfaction on the company, beside customer also can write a post about the feedback on a product. In Malaysia the very famous corporate blog is AirAsia Blog - http://blog.airasia.com/.
From the blog, we can see that many of the AirAsia flight passenger are sharing their trip experience and also some post about event organise by AirAsia. That was why a corporate blog become a new marketing communication tool for a company.

A review on a post e-tailing from My E-Commerce blog

Feb 15, 2009

E-tailing is the selling of retail goods in the internet. The most success example of e-tailing of all time are Amazon.com and Dell's computer. After review on My e-commerce blog, malaysia had implemented an e-tailling service to public.


Touch n Go card are commonly use by Malaysian in toll collection and transportation. Now, it had expended the usage and service towards the retail purchases, starting with particularly the fast food industry.

It enable Touch n Go users buy burgers, dougnut or fastfood from particular outlet.




These are the particular outlet that involve in Touch n Go service:


1.A&W SungeiBuloh(PLUS Overhead Bridge)
2.A&W Kota Damansara
3.A&W IkanoPower Centre1.




1.Burger King SungeiBuloh(PLUS Overhead Bridge)
2.Burger King MutiaraDamansara
3.Burger King Mid Valley
4.Burger King MasjidJamek
5.Burger King MRR2 Karak
6.Burger King Sri Hartamas1




1.Dunkin Donuts SungeiBesi
2. Dunkin Donuts Sprint Highway
3. Dunkin Donuts Mutiara Damansara
4. Dunkin Donuts SgBuloh
5. Dunkin Donuts BHP Karak



1.Caltex LDP –HentianSebelahPenchala
2.Caltex LDP –Bandar Sunway
3.Caltex AwanBesar–Shah AlamExpressway
4.Caltex KawasanRehatUSJ(ArahSelatan)
5.Caltex Taman KinraraPuchong








7-Eleven, The Curve, MutiaraDamansara










Cathay Cineplexes, CineleisureMutiaraDamansara






Touch N Go not only the can pay for what we purchase. In some country, mobile phone are use in purchase. Amazon.com have move further, it not only provide online shopping. Amazon had moving further with text-message shopping (SMS Shopping) on 1st April. These is how users using text message-shopping.
  • Customertext (SMS) the name of the product with its description/ID to 262966 ("Amazon" on keypad).
  • Amazon will return 2 results at a time, if the stock matches the order.
  • Customer will be then can choose between the two options by texting 1 or 2.
  • They also can request for more option by texting "M" (More).
  • The system will call them and walk through the checkout process using an automated voice system.
  • Confirmation will be sent through text message and e-mail (entered during the registration process earlier)
  • Order status can be checked through the web site of Amazon.com.

With such amazing life style, we need not bring so much cash out with us. In the future, i think Touch N Go and mobile is no longer appicable. With the advance of technology, biology may do the trick.

Mobile Payment system in Malaysia: it's potentials & consumers' adoption strategies

Feb 12, 2009




Over the past decade, the introduction of new technologies has transformed the payment industry and consumers’ payment/purchase behavior. Alongside shifts in payment channels, payment instruments are also changing. So, what’s next? Industry experts cite mobile payments—the exchange of financial value between two parties using a mobile device [e.g., mobile phone or personal digital assistant (PDA)]—as the wave of the future.

Malaysians can now enjoy a secure and convenient way to conduct mobile commerce using a GSM cellular phone. TeleMoney, the country's first mobile payment service via multi-channel access for Internet and wireless transactions, was launched Tuesday, and is expected to fully operational in the first quarter of 2002.


It is a service free of banks and telco dependence; a customer with a credit card or debit card with a cellular phone can register for this service.


All one needs is a GSM phone and a TeleMoney personal identification number, connecting it to a credit card, debit card, stored valued card, bank account or even the phone account.


Systems@Work is the mover behind TeleMoney and Hong Leong Bank has picked the former as its master merchant while the bank acts as a settlement, clearing and payment bank for the service in Malaysia.

mailto:Systems@Work chief executive officer Ng Fook Sun said the company is now working with four companies who will offer Internet and mobile commerce services via TeleMoney: Cordoda Corporation, Nanyang Online, Xchange.com.my and HP Mobile e-services Bazaar.
Meanwhile, Celcom, a telco with a 2.1 million active subscriber base in the country, is also collaborating with Systems@Work in a bid to support the growth of mobile commerce in Malaysia.

Celcom's senior vice-president of group corporate planning and product development Zubir A Rasid said he hopes at least 50,000 out of its 800,000 post-paid customers will sign up for TeleMoney.

"It will initially be offered for our post-paid subscribers," he said.
Celcom subscribers signing up for TeleMoney can use the telco's micro-bill mode of payment which allows them to charge transactions below RM50 (US$13.16) to their phone bill.



Reference:
http://www.neowave.com.my/mobilemoney_overview.asp
http://www.mobile-money.com/

Application of Pre-paid Cash Card

Since human life development growth rapidly, pre-paid cash card system has bring much more convience for business transaction, especially for customer. Pre-paid card system enables customers to make purchases,calls and participate in a survey using an authorized card. Such system include four major functional components which include plurality of cards, host computer, plurality of on-site activation terminals and processor. Each component has a security number associated therewith. The card typically formed of cardboard,paper or plastic and may include security number in cleartext under a suitable blackout.

Pre-paid cash card always need a personal identification number to be keyed in for the transaction to be authorized. It also can act as security for card holder to prevent other people use such card unless the personal identification number had informed to other people. If someone steals the card information or physical prapaid cash cards, card holder also no need to worry about them using the money. So pre-paid cash card are considered the most secure and safe financial transaction cards.

Pre-paid cash card are like a portable access point tho card holder checking account. The automated teller machines are evrywhere and card holder can use it to withdrawal, deposit funds from or into checking account in cash or even make account balance inquiry. Such automated teller machine is convience for card holder since they don't have go to the bank anymore. Besides that, the convience fee charged by machine is much smaller than the fee charged by bank.

Although pre-paid cash card has many advantages, but it also has some downside. The card holder can't use them to make"card not present" purchase, such as buying something online. Pre-paid cash card also can't use in"quick pay" terminals that have a card reader but no keypad to enter the personal indentification number.

reference links:https://www.obopay.com/resource/prepaid-cash-card.html
http://www.google.com.my/patents?
http://www.patentstorm.us/patents/6502745.html

Credit Card Debts: Causes and Prevention

Feb 10, 2009

Nowaday, the requirement to apply a credit card is much lower than before. Many of the fresh graduate students can easily to get a credit card after 3month getting the job. With the credit card the purchasing power was increased. It can help the economy in the Country. As a credit cardholder, we need to be smart in using the credit card. If the cardholder using the credit in the wrong way. It can bring him a huge credit card debt. The most common credit card debt was come from the interest charges on the late payment on debt. This interest chardges will compound every month if the debt cannot be clear. Many of the cardholder alway spend the credit to buy the thing they like without any cash on hand. It may also cause the interest charge on debt at the end of the month.

Besides, many of the e-commerce website are using credit cards to make transaction. It may cause the credit card data been theives and use the credit card to buy item on internet. Somestimes, the cardholder only can detect it when the card was embezzled.

To prevent having the huge amout of credit debt. Credit Card Holder should set a limit of spending using the card and also doing record on it. Furthermore, using Debit card was one of the way preventing the credit card debt. Debit card holder can only use the total amount in your card account, it was imposible to let you spend out of the money you have, so it will not bring you a debt in the future. Last but not lease, do not buying item in internet using credit card by using public computer, such as the computer at cyber cafe, University and etc... It will increase the risk the credit card theives and bring you a unrealise debt.

the threat on online security

Feb 9, 2009

Nowadays, the threats on online security become so common. Various types of threats make our data no longer safe. Passwords, encryption and other prevention method have been suggested, however, threats still exist to cause harm.

Mainly, threats have been divided into technical attacks and non-technical attacks. Technical attacks mean attacks perpetrated using software and systems knowledge or expertise. They are:

(1) Denial-of-service (Dos) attack
an attack on a web site in which an attacker uses specialized software to send a flood of data packets to the target computer with the aim of overloading its resources;

(2)Distributed denial-of-service (DDos) attack
A denial-of-service attack in which the hacker gains illegal administrative access to as many computers on the Internet as possible and uses these multiple computers to send a flood of data packets to the target computer.

(3)Malware
A generic term for malicious software. The severity of the viruses increased substatially, requiring much more time and money to recover. Malicious code take a variety of forms-both pure and hybrid. There are a lots of it such as virus, worm, macro virus or macro worm and trojan horse (rookit).






For non-technical attacks, they uses trickery to trick people into revealing sensitive information or performing actions that compromise the security of a network.


Another form of non-technical attack, is called social engineering. It is a type of attack that uses social pressures to trick computer user into compromising computer networks to which those individuals have access.


Other than that, phishing is to collect information through fake websites. An email may be sent to unsuspecting customers to trick them into providing or updating their information on the fake web sites. To safeguard against phishing, users should always go to the website directly rather than via links in emails.



In order to prevent both kind of the attacks, education and training needed to be provided in order to make explanation about the techniques used by hackers and others. The policies and procedures needed to be developed for securing confidential information.






References:
http://en.wikipedia.org/wiki/Timeline_of_computer_security_hacker_history
http://www.readwriteweb.com/archives/top_online_security_threats_for_2009.php

Example and Prevention Method of Phishing

Feb 8, 2009




Phishing, act of stealing sensitive personal information, such as usernames, passwords and credit card details via the internet environment for the purpose of committing financial fraud. It has become a significant criminal activity on the internet, especially the popular social web sites, auction sites, online payment processors and etc.

Phishing technique was described in detail in 1987, and the first recorded use of the term“phishing” was made in 1996.Phishing largely used in PayPal, banks, credit card and eBay.

In an example PayPal phish, spelling mistakes in the e-mail and presence of IP address in the link are both clues that this is a phishing attempt. As a real email from PayPal would, large warnings about never give password or sensitive information in case of phishing attack. It instead invites users follow a link to “verify” their accounts. It will take users to further phishing website, engineered to look like PayPal’s website and will ask for users’ sensitive information.

Another example, eBay phishing become the most popular example. In eBay, scammer wishes to obtain eBay ID’s which used to sell fake or non-existent goods or accounts which can be sold further in the underground market.

There are some prevention methods which include legislation and technology created specifically to protect against phishing

One method of them is training people to recognize phishing attempts, and deal with them. Through the education,it would have more effective results, especially where the training program provides direct feedback.

Besides that, people can slightly modifying their browsing habits. For an example, when an account needing to be "verified", it's a sensible precaution to contact the company or customer from which the e-mail apparently originates to check that the e-mail is legitimate.

Another way, some bank's website such as Bank of America, that ask users to select a personal image, and display their user-selected image with any forms that request a password. Customer or online users of the bank's online services are instructed to enter password only when they see the image they selected.

Some banks and other organization likely to suffer from phishing scams round-the-clock services to monitor,analyza and assist in shutting down phishing websites.

reference links:http://en.wikipedia.org/wiki/Phishing
http://www.uscert.gov/reading_room/phishing_trends0511.pdf

A review on a post internet security from My E-commerce blog

Feb 7, 2009


Now a day, with the advancement of technology, E-commerce tends to give us a simple and comfortable life style in our daily life with a single click on the web-site, it slove all the problem in a second by provided our information or biodata. For example; e-billing, we can pay our bills online without going out. E-shopping, thing such as cloths, books, toys, service and many more can get by accessing World Wide Web. But, how our confidential information are protect from third party. After review some of the article in my E-commerce blog. It give me an idea, how our in formation may dispose to third party and the way to prevent it.

Year to year, people accessing online had been increase tremendosly and more that millions of new viruses can be found on web. Trojan horse is one of the most common virus that created and it can be many form. These viruses were spread by one person called "Hacker". How Hacker can gain control on our infromation? Spamming is one of the way that use. Spamming is the the flooding of electronic mail systems with “junk e-mail”. Also known as unsolicited bulk messages sent through the electronic messaging systems. Now, the spammers are coming out with new tactics to outsmart this anti-spam software. These new tactics are PDF Spam, Piggyback Spam and Greeting Card Spam.

In order to prevent this happen, caution step need to be consider before taken. These are the steps that should take to prevent hacker hack in.

  • Keep Your Personal Information Private
  • Avoid Using One Password For All Accounts You Create
  • Use 'Alpha-Numeric' Passwords
  • Don't Use a Password That Can be Found on Your Blog
  • Avoid Using Public Computers
  • Set Your Browser According to Your Preferred Security Level
  • Use Anti-Virus Softwares on Your Computer
  • Register and Use Your Own Domain Name
  • Always Back-up All Your Post / Content





How to safeguard our personal and financial data?

Feb 5, 2009

Today privacy data being expose to the public is more easy then before. The innovation of INTERNET usage make every single transaction, every electronic data and so on exchange and flow easily. All the privacy data like credit card, or other data which need to be secure could be flow from user to collector with a single click in the INTERNET. In the phenomena where every transaction could be done easily and conveniently it should be a delighting case for people, however there are some devil advocate which appear to interrupting and creating worries for people when they want to make any secure transaction via the Internet.

These troublesome tries to steal those privacy data from every possible computer in order fulfill its satisfaction, either to misuse the stolen data or to gain fame or having fun from the hacking action. Although there are risk when using Internet for doing any secure transaction but as the advancement of the technology, those vendors who provide these payment gateway are trying to minimize the risk to make sure that transactions in within the service are being secured.

There are risk which can be protected by the vendors itself, but there are also risk which can't protected by the service providers. And there risk possible would be the viruses, worms, Trojan, and so on that had been invade in the particular computer. These malicious would have the possibility to steal all the information in the infected computer and transfer it to those who spread the lethal malicious program. As a normal user, the most basic step which we have to do to protecting our computer from those malicious and Trojan is to install a quality anti virus software in our computer. Besides, make sure that the anti virus software is updated frequently, since malicious and Trojan programs are produced and modified every moments.

Besides on installing anti virus software, try not to visit those web site which is not familiar with you, and those site which been warned by our anti virus. These site contain down loadable malicious programs which hided in the some file which you do not know. In order to minimize the probability of infection, as a user, we should try to aware of these particular issue when surfing the net. For an example, try not to click those link which contain sweepstakes like “Free money”, “Free lottery”, Free porn”, and so on.

As a Internet user, we should have the common knowledge on how to preventing Internet scam. According to the Internet scamming report (You can find it in Google), the fraud and scam cases increasing yearly by yearly. The government should education its citizen on how to prevent those scam before its happened. One of the common example case in scamming people privacy data like credit card would be phishing site. In additional, we should not using public computer like cyber cafe to do financial transaction or others secure transaction, these is to make sure that social engineering would not happened.

History and Evolution of e-commerce

Feb 2, 2009

What Is E-Commerce?

E-commerce is the online transaction of business, featuring linked computer systems of the vendor, host, and buyer. Electronic transactions involve the transfer of ownership or rights to use a good or service. Most people are familiar with business-to-consumer electronic business (B2C). Common illustrations include Amazon.com, llbean.com, CompUSA.com, travelocity.com, and hotels.com.

E-commerce can be divided into:
· E-tailing or "virtual storefronts" on Web sites with online catalogs, sometimes gathered into a "virtual mall"
· The gathering and use of demographic data through Web contacts
· Electronic Data Interchange (EDI), the business-to-business exchange of data e-mail and fax and their use as media for reaching prospects and established customers (for example, with newsletters)
· Business-to-business buying and selling (B2B)
E-commerce began before personal computers were prevalent and has grown into a multi-billion dollar industry, but where did it come from? By looking at the evolution of e-commerce, it will be easier to judge its trends for the future.

1984
EDI, or electronic data interchange, was standardized through ASC X12. This guaranteed that companies would be able to complete transactions with one another reliably.

1992
Compuserve offers online retail products to its customers. This gives people the first chance to buy things off their computer.

1994
Netscape arrived. Providing users a simple browser to surf the Internet and a safe online transaction technology called Secure Sockets Layer.

1995
Two of the biggest names in e-commerce are launched: Amazon.com and eBay.com.

1998
DSL, or Digital Subscriber Line, provides fast, always-on Internet service to subscribers across California. This prompts people to spend more time, and money, online.

1999
Retail spending over the Internet reaches $20 billion, according to Business.com.

2000
The U.S government extended the moratorium on Internet taxes until at least 2005.
Referred links:
history.htm

Identify and compare the revenue model for Google, Amazon.com and eBay

Feb 1, 2009

Google is a well-known and common use search engine. The main source of google's revenue came from advertising, an amount of US$10.492 billion was gain by it advertising which reported in year 2006.


Google AdWords is one of the advertising program or known as pay per click.This program designed to allow advertisements to people at instant the people looking for the information . Pay by click is the best way to send an immediate, traffic to website. It is an online advertising payment model in which payment is based on qualifying click through


Google AdSense is an ad serving program. First quarter of 2002, google launched Absence for search, this program serve as distribute relevant ads from it advertiser for display with search result. AdSense for content was launched first quarter of 2003.

Amazon.com was founded by Jeff Bezos in year 1995. Amazon started as online store then it expanded it business by selling other product such as VHS,DVDs, Mp3, Games, computer software, toys, furniture and many more.Each product was given a fix price and will be rated by customer.


eBay is the world well-known auction web-site which bring along between both individual seller and buyer around the world. Millions of collectibles items, computer hardware, books and other cool stuff are listed, sold and boughts in a day.eBay generate revenue by charging fees on the particular item.

  1. Insertion fees-Charge when an item listed on eBay, which ranges between 30 cents an $3.30 depending on the seller's opening on the item

  2. Promote fees- A fees is charged for additional listing promote the item, such like highlighted or bold listing


  3. Final value-Fee that charged at the end seller's auction which range form 1.25% to 5% of the final sales price

Reference link:

1. http://www.organicspam.com/google_revenue_model.asp

2.http://ecommercesite.wordpress.com/2008/06/12/identify-and-compare-the-revenue%20model-for-google-amazoncom-and-ebay/

3.http://mansgroup.blogspot.com/2008/06/identify-and-compare-revenue-model-for.html

An example of an E-commerce failure and its causes

Jan 31, 2009

In this century, many people are try to set up a simple e-commerce website to sell and promote the products, some e-commerce website was very helpful to their business, but there are also many failure example in e-commerce. The largest European dot-com failure was Boo.com


Boo.com was a United Kingdom fashion store launched on year 1999 with the huge capital invested by few famous entrepreneurs. Because of this, boo.com had become a high profile e-commerce website and everyone was look forward to this website. The vision for Boo.com is to create a European brand and become the world larger global fashion e-retailer.

Bad news for Boo.com came on May 2000, Boo.com was closed on May 18th 2000. Why did Boo.com fail as an E-tailer on Fashion?


Failure to plan and poor financial control
The main reason that cause Boo.com fail is the investor fund cant meet the spiraling marketing, technology and wage bills. Boo.com was spend the huge amount of fund into the programming for multli-currency sales and product delivery, and the high maintenance expenses in creating the 3D photographs for the product everymonth. Boo.com also giving the excessive employment benefits and luxurious spending to attract "some of the brightest brains in Europe" suggest by Leander and Malmsten. Therefore, investors rufused to invest any more cash into this business because they are disagree with the suggestion.

Poor web design
Moreover, the web design for Boo.com are poor because the website system was limit the amount to make only three transactions in twenty minutes and in year 1999 to 2000 the internet bandwidth was not sufficient for the average internet user to view the 3D website. These kind of approach would not entice a customer to shop at this site again and also discourage the potential customer from shopping over this website.

Bad Marketing
Traditionally, customer are attracted to buy over interner by the lower price. Boo.com was fail to do that because Boo.com are selling the premium and quality fashion goods. The goods wan come with the high cost and the high maintenance expensive on the website have increased the clothes selling price.

reference: http://www.davechaffey.com/E-commerce-Internet-marketing-case-studies/Boo.com-case-study

How E-commerce Reduce Cycle Time,Improve Emplyees' Empowerment & Facilitate Customer Support

Jan 22, 2009

E-commerce is the process of buying,selling or exchanging products,services and information via computer networks or internet.Those business activities using electronic data transmission technologies,such as www(World Wide Web).

Besides that, it also can defined as a modern business methodology that address the needs of organizations,merchants and consumers to cut costs while improving the quality of goods and services and increasing the speed of service delivery,by using Internet.

E-commerce has many advantages to customers,business,and society.Those advantages include reduce price,global marketplace,24 hours access,low-cost advertising and etc.

Cycle time is the total time from the beginning to the end of process,it include process time and delay time. E-commerce also can reduce cycle time by eliminating steps in business processes.Those steps may be redundant or be replaced woth more efficient technology solutions.Elimination of those steps speeds the overall process and reduces cycle time.

Employee empowerment is the term used to express the ways in which non-managerial staff can make autonomous decisions without consulting with manager.E-commerce also provide employee empowerment by providing employees greater and easier access to those information which provided by employer since the internet be more popular and convience for anyone.

Customer service and support(CSS) is the part of a company's customer relationship management(CRM) department that interacts with a customer for their immediate benefit which include component likes contact center,help desk and call management system.
E-commerce will facilitates it by provide wide range of technological solution and communication opportunities.Besides that, cussumers also can answer their question while e-commerce supports self-help customer service.

Referred links:

1)http://www.newagepublishers.com/samplechapter/001390.pdf
2)http://shc-staffweb.hct.ac.ae/skhartabil/Skhartabil/TEACHING%20RESOURCES/E-BUSINESS%20FOR%20MANAGERS/Electronic%20Commerce%202004%20A%20Managerial%20Perspective,%203e/EC2004IM_ch01.doc

It's all 'bout me

I’m Cheng Ling from Cheras. I am now taking degree courses in UTAR and it is the final year for it.

When i was studied in Tsun Jin High School, my hobbies are playing volleyball and reading. However, after graduation, life has changed. My hobbies are now more fascinating me such as shopping, watching drama and so on. It is because life has become stress and more forces to work hard, human needs to be life-balanced…=)

But, of course, nowadays, most of the time, I will spend on surfing internet. This is the common way students used to spend their time. For me, I have my top five web sites which I visit the most. They are:

This web site is full of different types of games which provide different choices to serve the needs of different people. The challenges, sometimes, help me a lot in brainstorming.

(2)
www.hotmail.com

I have to visit here in order to check my mail since interaction between students and lecturers or tutors is dependent on e-mailing. Any messages about questions on studies or even for appointment are encouraged to be delivered via e-mail.

(3)
www.friendster.com

This is my way to keep in touch with all my secondary school mates and all my friends. It is so easy to update my status to them. I can just post on new photos or comments or sending warm messages to them.
Besides that, I have been a fan of some online boutiques. I can also window shopping whenever I want. The catalogue of new accessories, clothes and lots more will be posted there. They also accept for online ordering and the price and the quotation of postage will be clarified before the transactions have been deal.

(4)
www.988.com.my

I will only tune to this e-radio to update my information about current trends. This radio has been developed so many years and the producers of it have showed a great capacity for effective actions. If people go deeply to the organization, they will realize that the enrichment of its programs is invulnerable and the sincerity of the workers is so impressive.

(5)
www.google.com

When I want to search certain music, lyrics, news, hot gossips and so on, this search engine helps me lots more since its wider information range and also high accuracy for getting right information regarding to just few key words. It really saves time!!

About Myself !!!

Jan 21, 2009


Before i introduce myself. i would like thank to this repetitive subject because i have the opportunity to get involve in web-blog. Actually, i do not really know about web-blog. What is Web-Blog?? Me myself doubt curious about it.. Is it the place to express our feeling or give useful information to help other people??


My name is Lee Kah Chuan, who born in a small town called "Seremban". I have sibling of four where I'm the eldest in the family. I like to spent my time with my family and friend.


My hobbies are have a good game of basketball and fishing with my friend at hometown, usually we will do it on Sunday morning because most of friends is working and this is the time where we can meet up each other. I like movie , surfing web and i was so addicted to online-game.



This is the top 5 web-site i use to surf:


This is the place where i can get connect with all of my friend, knowing their status about what happen to them. Other that getting connect with my friends, this website also provide awesome mini-game.


Hotmail is like a big mail-box for me. This is another way that i connect with other people. Sometimes, i use this web save part of my assignment so i would not be scare that it will gone.




I use to visit this web-site for the latest Japanese's manga, in here have many type of manga can be read.




This is the website i use the most to search information for assignment along the semester. Other that search information for assignment. In this last year of study, google will give me along of help in finding journal for our final project.



This web have all sort of video clip, i use to check for latest movie trailer, watch music video, drame and many more...

About me..

Jan 20, 2009


My name is Foon Lai Yan,from kepong.3 years ago just graduate from Chong Hwa Independent High School.Besides that,this year should be the final year which i taking Commerce Accounting in University Tunku Abdul Rahman.

My hobby is watching drama,especially Hong Kong and Korea drama.My another hobby is reading,but i didn't prefer reading any book about financial,such as investment,financial and etc.I think the money and time i spend for bookstore would be the most in my life until now.


The top 5 website which i visited are:
Besides the forum and daily news provided which made me know the lastest news in Malaysia.It also suitable for malaysian since it has 3 type of language,bahasa malaysia,english and chinese.I think it should be the reason why people like it most.


Since the network be more popular,checking the mail should become habit of people who studying or working also.


It becomes the website i visted most since last year only.I can keep in touch with my primary or secondary friends,viewing photo and etc.


When i needed some information about anything for knowledge,assignment or whatever.It helps me so much and cut down the time or cost spend for the searching activities.


The offical website of utar and would be visted when release the examination results every semester or the timetable of new semester.I also can get any lastest information about my course.