BLOGGER TEMPLATES AND TWITTER BACKGROUNDS
Showing posts with label by Chui Li. Show all posts
Showing posts with label by Chui Li. Show all posts

Sunday, July 5, 2009

Review (Legal) : Rules on Internet Cafe Soon


Teenagers love to spend their time at the internet café or cybercafés after school or sometimes until midnight. This issue has become a potential problem in Malaysia. Internet café or cybercafé is a place where one can use a computer with internet access by paying a fee per hour or minute or pay unmetered access with a pass for a day or month.

According to the Deputy Housing and Local Government Minister Datuk Hamzah Zainuddin, there will be some new guidelines to be enforced soon on internet and cyber cafes in order to control these businesses. Among the new guidelines are all cyber café had to closed by midnight daily and they must be located at least 200 meters away from secondary and primary schools. Besides this, it requires teenagers or children aged 12 and below should go to the cyber cafe accompanied by their parents or guardians and they are only allowed to stay until 10.00 pm.

Hamzah also further explain that cyber cafes were also banned from other co-business activities including having games, gambling, pornography, music, and publications with negative elements. Cigarettes and alcohol also cannot be sold or consumed in the cyber café because it is not good for health.

Furthermore, the cyber cafés are only allowed to operate from the ground floor of the premises and are banned from using tinted glasses in their premises. On the other hand, there must be a book log to record the entry and departure time of the patrons.

With the implementation of the new cyber rules, teenagers will not be able to linger at the cyber cafes freely anymore. The students can concentrate more on their studies and parents can keep an eye on their children so that they will not be influenced by negative elements available from the internet. Potential criminals like gangsterism can be reduced if the time spent on the cyber cafe among teenagers can be reduced. In our opinion, these new rules should be carried out as soon as possible with proper enforcement by the Government and cooperation from the public. With this, the problems arised from cyber cafes can be reduced and solved in the long term.



E-Government in Malaysia: Its implementation so far and citizen’s adoption strategies.

In those days, when you or your parents want to pay bills, pay income taxes, apply for something from the government, you will say it is troublesome. Why will you say so? You need to queue, purchase the form, waited for some time, in terms of hours or days or months to get things done. But today, things have changed. We do not need to travel and waste our time and energy for doing these tasks anymore. Thanks to E-Government that has been implemented since the late 1990s.

Electronic government or e-government is referred to the use of information and communication technologies that provides and improves government services, transactions and interactions with citizens, businesses and other arms of the government. It is implemented since the initiation of Multimedia Super Corridor (MSC) by the government of Malaysia. E-government is one of the flagship applications from the MSC project. The objectives are to jump start and accelerate the growth of MSC, enhance national competitiveness to creation of high value jobs and export growth, to help reduce digital divide and to make MSC a regional hub and bed. The implementation of e-government services would bring benefits to public administration and the Malaysian community.




These are the e-government main projects:
1. Generic Office Environment (GOE) - The objective is to introduce a fully integrated, distributed and scalable office environment that leverages use of multimedia technology.
2. Electronic Procurement (ep) - The aims is to re-engineer, automate, and transform current procurement system.
3. Human Resource Management Information System (HRMIS) - It provides a single interface for government employees to perform human resource function effectively and efficiently.
4. Project Monitoring System (PMS) - It is designed to provide a mechanism for monitoring the implementation of government project.
5. Electronic Labor Exchange (ELX) - It improves the mobilization of human resources.
6. E-syariah – It is implemented to focus the improvment of quality or services in syariah courts.
7. Electronic Services Delivery (e Services) – It allows citizens of Malaysia to engage in transactions with government and utilities payments such as telephone and electricity bills.














The current applications of e-government in Malaysia are
-E-Filling
-Renew Driving License online
-E-Judiciary
-E-Perolehan.
-E-Dafter

However, there are some barriers which could affect Malaysia’s government to implement these policies. First are Legislative and Regulatory Barriers. In order for e-government services to gain widespread acceptance, there must have the same standing as the equivalent paper processes and ensuring the privacy and security before advancing the online e-government services. So, it faces confusion over what exactly should be enplaced for good governance of the e-government services.

Besides this, there will also be budgetary framework problem because some government departments does not recognize ICT expenditure as a potential future investment. It is an important issue that government must realize the potential benefits of adopting e-government services to finance government services and shared infrastructure. The budgetary regulations should facilitate coordinated bids for new funds and the pooling of funds. Furthermore, technology changes also are one of the problems. Since technology moves rapidly, it is very difficult to anticipate the future impact in details.



The e-government citizen’s adoption strategies can be increased on its awareness through TV and radio advertisements and organizing workshops at shopping mails. On the other hand, citizens should be encouraged to show higher levels of satisfaction with the online service provided by the government. If the citizens felt unsatisfied with the services, they can give any suggestions and comments to the e-government websites. Moreover, providing the website with multiple language versions is also a helpful tool for implementing e-Government. For example, if some users lack of English language abilities, they can choose alternative languages like Chinese or Malay language to use the e-government services. Besides this, e-government also provides consultation services on how to use these services and the procedures needed to access the e-government services.








Wednesday, July 1, 2009

Electronic Currency


Electronic currency is also known as e-money, electronic cash, digital money, digital cash or digital currency. It refers to the money or scrip which is exchanged electronically. This involves the use of computer networks, internet and digital stored value. Examples of Electronic Currency include Electronic Funds Transfer, direct deposit and others.

Electronic Funds Transfer (EFT) provides electronic payments and collections. It is a system of transferring money from one bank account directly to another without any check payment made. Direct Deposit is one of the most widely used methods by employers because it is safe, secure, efficient, and less expensive as compared to used paper check payments. The payroll is deposited straight into an employee’s bank account. EFT can be used for both credit transfers such as payroll payment, and debit transfers like mortgage payments.

Electronic Currency Trading system (ECTS)


ECTS is an electronic currency trading investment platform that offers its clients an efficient way to trade foreign currencies against the strength and weakness of the US dollar. It has a remarkable trading session since January 1, 2008. The current market conditions with the fluctuating US dollar have created volatile trading conditions that are an advantage to ECTS. There has never been a better opportunity to take the best currency trading system in the US today. There are six major currencies of ECTS trading in the world which are Euro, Yen, Australian Dollar, Canadian Dollar, Swiss Franc and British Pound. It attempts to capture longer term moves, and it is not a day- trading system. All currencies are traded on the regulated markets of the Chicago Mercantile Exchange. All the exchange fees are done in public.

There are several companies with e-micropayment products such as Bit Pass (bitpass.com), Pay stone (paystone.com), Pay Loadz (payloadz.com) andPeppercoin (peppercoin.com).



Bitpass was one of the online payment systems for digital content and services. The co-founder was Kurt Huang in November, 2005. Besides, it also partnered with major technology and financial services companies such as Microsoft, PayPal, the Royal Bank of Scotland and First Data.

Bit Pass system works similarly to a pre-paid telephone card as like you sign up for the service and put money into your account using a credit card or PayPal, which gives you credit towards the purchase of content.

Bitpass announced that they are shutting down due to "circumstances beyond control," on January 19, 2007. The CEO, Matthew Graves wrote an e-mail to customers and operations were officially closed on January 26, 2007

Links:

http://www.webpronews.com/topnews/2003/06/02/electronic-currency-using-sim-access-profile
http://en.wikipedia.org/wiki/Electronic_currency

http://www.electroniccurrencytradingsystem.com/
http://en.wikipedia.org/wiki/BitPass




Tuesday, June 23, 2009

Phishing : Examples and Prevention Methods


Nowadays, phishing has become a serious network security problem in the organization. It has caused consumers and e-commerce companies suffer billions of dollars financial loss. Therefore, phishing has made e-commerce distrusted and less attractive to normal consumers.


What is phishing?

Phishing is a new type of network attack where the attacker creates a website to fool users to acquire sensitive personal information such as user names, passwords, national security ID and credit card details which are carried out by e-mails and instant messaging. The most frequent method which attackers used is to send e-mails to victims which look like it was sent by the bank or online organizations and then they will make up some causes like re-enter login credentials or providing update services. Paypal and ebay websites are the common targets for them.


Phishing attack procedure methods

In general, phishing attacks are performed with four steps.

1.) Phishers will set up a counterfeited website which looks exactly like the legitimate Web site. It includes setting up the web server, applying the DNS server name, and creating the web pages similar to the Web site.

2.) Send large amounts of spoofed e-mails to target users in the name of those legitimate companies and organizations. They try to convince the potential victims to visit their Web sites.

3.) Receivers receive the e-mail, then open it, and click the spoofed hyperlink in the e-mail, and input the required information.

4.) Phishers take this opportunity to steal the personal information and perform their fraud such as transferring money from the victims account.


How to identify the fraudulent e-mails?


1.) Update personal information- If you receive an e-mail from Microsoft that requires you to update your credit card personal information, there is a phishing attempt.

2.) Generic greeting- Phishing e-mail usually sent out in bulk such as “Dear User” or “Dear Customer” and does not contain your first name and last name.

3.) Sense of urgency-Phishing e-mail generally uses scare tactics. These messages convey a sense of urgency so that you will respond immediately without thinking. This e-mail stated with if customers do not take action within 24 hours, the customer account will be closed. It you see about this might be suspicious.

4.) Fake links-Normally, phishing e-mails will hide the true URL and the URL list in the email is not relates to the company URL. The websites where it is safe to enter personal information begin with “https”, the s means for secure. If you not see the word “http”, you must not process it.


Below are the examples of phishing:


Example 1














Example 2









Example 3













Example 4















How to prevent phishing ?

There are several steps to prevent phishing .Firstly, detect and block the phishing Web sites in time. When we detect the phishing Web sites, we must block the sites and prevent phishing immediately especially two master keywords of a legal website that periodically scans the root DNS for suspicious sites. For example, www.1cbc.com.cn vs. www.icbc.com.cn


Second, use strong passwords protection. Users must use several passwords instead of just one password. The passwords should combine uppercase and lowercase letters, numbers and symbols in order to avoid the phishers detect it. If you use different passwords between your blog and e-mail account, when a phisher gains access to your blogging account and e-mail address, they will be unable to access your account.


Third, do not click on suspicious links in emails. If you receive an email that requires you to update private information by clicking the link directly from the email, do not copy and paste links from messages into your browser. It is because the link might not be trustworthy. You may go to the organization website directly by typing the address in URL.


Fourth, do business only with companies you know and trust. Users should use well-known, established companies with a good reputation for quality services. Basically, the business web site should have a privacy statement that specifically states that the company will not pass personal information to others.


Fifth, install online anti-phishing software in the computer. When a user visits a Web site, the anti-phishing tool will search the address of that site in a blacklist store in a database. If the visited site is on the list, the anti-phishing software will warn the users. The tools include ScamBlocker from the Earth Link company, PhishGuard and Netcraft and others.


Lastly, use a browser that has a phishing filter. User can use the latest versions of browsers such as Firefox 3x, Internet Explorer 7, and Opera 9x. These browsers included phishing filters that provides safer web browsing experience without being interrupted by phishing activities.


Links:

http://www.digitalpurview.com/ways-to-identify-phishing-email/

http://www.microsoft.com/athome/security/email/phishing.mspx?ifs=0

http://office.microsoft.com/en-us/outlook/HA011400021033.aspx

http://www.uni.edu/its/security/phishingexamples.html

http://research.microsoft.com/en-us/um/people/chguo/phishing.pdf


Wednesday, June 17, 2009

An Example of an E-commerce Success and Its Causes -Ebay












Ebay is a major auction service on the Web. It popularises the concept of buying and selling online,and both individuals and commercial enterprises list items for sale. The process of buying and selling is through price bidding, whereby the person with the highest price bid will be able to purchase the product and a transaction will be taken place. EBay is one of the successful examples for e-commerce and also the most favourable website among online shoppers.

EBay's incorporation was launched in 1995. It is founded by a French-born Italian computer programmer Pierre Omidyar who wrote the code for an auction website that he ran from his home computer. In the earlier stage, it is meant to be a marketplace for the sale of goods and services for individuals.



Nowadays, EBay is the world’s largest online marketplace. It has built an online person-to-person trading community on internet, using the World Wide Web. Every user or seller can sell or purchase anything throughout this website (www EBay.com). They can browse the listed items in a fully automated way. The items are arranged by topics, where each type of auction has its own category. These facilities are easy for the buyers to explore and enable the sellers to immediately list an item within minutes of registering.





The factor that causes EBay to be successful is the provision of an open trading platform where the market determines the values of items that are sold. EBay also provides many things for users to buy such as accessories, toys, clothing, and household goods to attract people to browse through eBay. It brings convenience and saves time for us because we can buy those goods without going shopping to shopping malls. Besides, it is a secured online transaction because it uses credit card payments under the Paypal service to make purchases so that the users will have lesser risks in terms of payments.

Furthermore, the users really enjoy the competition of the bidding process. They enjoy looking around for merchandise and gather more information from many sources so that they can make comparison of prices and product details for the same product. It gives more comfort for people to make use of purchasing goods and services online.