Showing posts with label Week 6. Show all posts
Showing posts with label Week 6. Show all posts

A review on a post on Legal from My E-Commerce blog

Sunday, February 22, 2009


The post that I review was How to lose your ID easily to fraudsters at home. The personal identity information is very important for all of us. This is because it have been recorded all our important information such as names, addresses, birth dates, ID numbers and bank account numbers.

If it is stolen, there is a possibility that our personal information will be use for some illegal activity purpose. The fraudsters will use this information to open bank account or apply for loans.

So it will create many trouble and inconvenience to us. Nevertheless, it will also bring the financial loss to us as well. So it is important and responsibility for us to keep our personal identity information in order to prevent the crime happens.

What is identity theft?

Identity theft can be described as a crime that involves one person appropriating the personal information of another to commit fraud. There are several types of identity theft such as true name fraud or business or commercial ID theft, account take over and criminal identity
theft.

For commercial ID theft, this occurs when an identity thief uses a victim’s data to open new accounts. Such accounts are used to make large purchases which the perpetrator never pays off. Shortly after opening the account, the thief will inform the institution that the billing address has changed, and in doing so ensure that the victim does not receive the accounts to find out about the crime that has been committed in his/her name.

The secondly is account take-over, When a credit card or cheque book falls into the wrong hands, these may be used to charge purchases to the victim’s account. On-line accounts may also be hacked to do transfers to other accounts.

Third one is Criminal identity theft; this happens when a person is arrested for a crime and then gives another person’s name to the police, instead of using his/her own. A person may therefore unknowingly become a suspect in a police investigation or get fines or have outstanding warrants against his/her name.

Furthermore, we need to keep track of credit card, debit card and ATM receipts. Never throw them out in the trash, or if you do, shred them or destroy them first. When we submitted any photo stated ID or passport, we must make sure write a SAMPLE word on it in order to avoid other people duplicating it.

Therefore, the personal identity information is very important and valuable to us. So, we cannot ignore it and just throw away that receipts which we feel as rubbish, but for the fraudster, it is become a treasure for them.

So whatever receipts or paper which consist our data, it is necessary for us to destroy it first then only throw it. By doing so, I believe that this could help us to avoid our personal identity information being used by others for doing the illegal things which may cause harm to us.

E-Government in Malaysia: Its implementation so far and citizen’s adoption strategies.

Thursday, February 12, 2009
The implementation of electronic government started since the initiation of Multimedia Super Corridor (MSC) by the Malaysia Government.E-government is one of the seven flagship applications introduced in MSC. Under the e-government flagship, seven main projects were identified to be the core of the e-government applications.The e-government initiative launched the country into the Information Age. It will improve the government operates internally as well as how it delivers services to the people of Malaysia. It seeks to improve the convenience, accessibility, and quality of interactions with citizens and businesses.

Malaysia government website (www.gov.my ) allow user to download various kind of form for any government department application, quick link such as government news, jobs, complaint, weather, policy feedback and many others, resource centre and polling center. This website has dual language such as Bahasa Malaysia and English, so user can choose for the language. There are 4 types of E-government services which are Government-to-Citizen (G2C), Government-to-Business (G2B), Government-to-Employee (G2E), and Government-to-Government (G2G).

According to the survey which done by Brown University on Rhode Island, United State, on international e-government ranking list, Malaysia is in the ranking of 25. Malaysia government has successfully implement the e-government. One of the most successful application are e-filling.E-filling is a method of filing of all income documents of tax payer in Malaysia, that uses an electronic format rather than a traditional paper format, from office or home through Internet. To use this services, taxpayers need to make a tax registration. Malaysia's Inland Revenue Board (IRB) will send the PIN for online tax registration through mail to the taxpayers.

The e-government projects are:
1. Project Monitoring System (PMS)
2. Human Resource Management Information System (HRMIS)
3. Generic Office Environment (GOE)
4. Electronic Procurement (EP)
5. Electronic Services (E-Services)
6. Electronic Labor Exchange (ELX)
7. E-Syariah

CITIZEN’S ADOPTION STRATEGIES:
1.Provide websites with multiple language version.
2.Increase awareness through TV and radio advertisements, and organising workshops at shopping malls.
3.Provide consultation services on how to use those services.
4.Simplify procedures needed to access to the e-government services.


Review a local e-commerce site

Thursday, February 5, 2009




http://www.blooming.com.my/ is the local e-commerce website which I choose to review. It is a local florist company called Blooming Florist Sdn Bhd. the mission of the company is to provide their customers QUALITY FLOWERS and QUALITY SERVICE.

The products and services of Blooming Florist includes:
a) Flowers
b) Hand Bouquet
c) Cookies and cake
d) fruit baskets, etc.





The speed of the website is fast which just a few second for display it. At the homepage, it has shown the variety of the products and services by clearly stated with the price. Click to the picture which you like to buy, it will show you the detail of the flowers and the materials. The arrangement or coordination of the list is made customers inconvenient for looking their products. However, this problem can solve by the search engine. The search engine helps consumers to search for the product which they want easily. Blooming Florist can accept customers’ payment by using online credit card payment, e-banking, mobile payment, cash payment and so on.

Blooming Florist has provide some useful information for consumer in the left hand side which stated “How 2s”. The information is such as floral arrangement tips and meanings of flowers.

The layout of the homepage is well which decorated with colorful picture of their products. However, the font size is small if compare to other website. This will give user uncomfortable. In conclusion, the Blooming Florist website provides convenient to consumer can order their products through online or visit their retail outlets.

Things to take note to prevent e-auction fraud when a consumer participating in an e-auction

Wednesday, February 4, 2009





The concept of e-auctions for steel by moving the entire process of auctions to the Internet or defined as a market mechanism by which sellers place offers and buyers make bids which conducted online and is characterized by the competitive and dynamic nature by which the final product is reached. With state-of-art technology and unique services to support buyers and sellers in the decision making, financing and logistics stages we make sure that our auction tools help enterprises realize their sales and procurement goals with considerable cost savings. The examples of e-auction were lelong.com.my, BuySellHub.com, mudah.my and etc.






The benefits of e-auction are as below:



  • Increased revenues


  • Optimal price setting


  • Removal of expensive intermediaries


  • Better customer relationships


  • Liquidation


  • Lower transaction costs


  • Lower administrative costs


  • Opportunities to find unique items and collectibles


  • Lower prices


  • Entertainment


  • Anonymity


  • Convenience


The limitations of e-auction are:



  • Possibility of fraud


  • Limited participation


  • Security


  • Auction software


  • Long cycle time


Most internet auction fraud cases involve straightforward scams where consumers allegedly win merchandise by being the highest bidder. All sounds good until they send the payment and never receive the merchandise.This is a video clip which showed that the e-auction fraud. This case is about scammers setup fake escrow services and websites. This way, the scammers can collect merchandise as well as collect payments. The victims never suspect a thing until they have already sent their payment to the fake escrow service or sent their merchandise off to the buyer thinking the payment is safely waiting in escrow.



There were several limitations of e-auction. Therefore, there were several ways or things to take note to prevent e-auction fraud when a consumer is participating in an e-auction. The following are action to prevent the e-auction fraud:



1. User identity verification such in IC number, driver’s license number or date of birth. For example, verified eBay user, the voluntary program, encourages users to supply eBay with information for online verification.



2. Authentication service. It is to determine whether an item is genuine and described appropriately. It difficult to perform because their training and experience, experts can detect counterfeits based on subtle detail.



3. Grading services which is a way to determine the physical condition of an item, such as ‘poor quality’ or ‘mint condition’. Different item have different grading systems. For example, trading cards are graded from A1 to F1, while coins are graded from poor to perfect uncirculated.



4. Feedback forum. It allows buyers and sellers to build up their online trading reputations. It provides user with ability to comment on their experiences with other.



5. Insurance policy. For example, eBay offers insurance underwritten, users are covered up to $200, will with a $25 deductible. The program is provided at no cost to eBay user.



6. Escrow services. Both buyers and sellers in a deal are protected with an independent third party. Buyer mails the payment to escrow services which verifies the payment and alerts the seller when everything checks out. An example of a provider of online escrow services s i-Escrow.



7. Non-payment punishment. To protect sellers, a friendly warning for first-time nonpayment. A sterner warning is for second-time offense, with a 30 day suspension for a third offense and an indefinite suspension for a fourth offense.



8. Appraisal services which use a variety of methods to appraise items. It includes expert assessment of authenticity and condition, and reviewing what comparable items have sold for in the marketplace in recent months.



9. Item verification which is a way of confirm he identity and evaluate the condition of an item. Third parties will evaluate and identify an item through a variety of means. For example, some collectors have their item “DNA tagged” for identification purpose. It provides a way of tracking an item if it charges ownership in future.



10. Physical inspection. It can eliminate many problems especially for collectors’ item.



Lastly, these are the action whereby a consumer can beware of the e-auction fraud. To be a wise consumer or bidder, we should notice it before making any decison.



http://en.wikipedia.org/wiki/Reverse_auction


http://www.allbusiness.com/legal/laws-government-regulations/332902-1.html


http://www.mjunction.in/metaljunction/products_services/what_is_eauction/


http://en.wordpress.com/tag/e-auction/