WeLcoMe 2 Our bLoG~~~

E-commerce is part of our-life....make things to be easier,convenience,efficient,accurate....lets discover it >>>>>>>>>>>>>>>@@@ E-Commerce @@@

Monday, July 7, 2008

Review a local e-commerce

https://www.etomei.com.my/ is a good example of local e-commerce site that sell jewelry through online store. E-tomei designed e-commerce website that gave customers the confident with having 3rd parties certification (Thawte SSL Certificates), that ensures all data passed between web server and browser remains private and secure.


Next E-tomei provided high quality of shopping cart with simple and easy to make an order. In this website interestingly were E-auction and Custom made Jewelry. E-tomei provided E-auction for its potential customer, indirectly is an efficient and effective way to make a market research on its product and market value of its product.



Followed by Custom make Jewelry which give customer to make their own alphabet that increase customer satisfaction on its product.


Beside that, E-tomei provided very convenience payment methods, which only require bank account in Maybank, Hong Leong bank or CIMB bank. The potential customers just need to have online E-banking, than can have their transaction done in a fingertip. Moreover, if a customer doesn’t have any bank account stated above, he/she can order through E-tomei order the item he/she likes, after make an order E-tomei support team will notify when the item will be ready to collect at the shop he/she selected.



In conclusion, E-tomei is well done designed in E-commerce web base to boost its business revenue and increase customer satisfaction in an efficient and effective way compare to its competitor like Lazo Jewelry (http://lazodiamond.com.my/store) which not well maintain it online store that maybe lost of large number of potential customer.



Sunday, July 6, 2008

E-Government in Malaysia: Its implementation so far and citizen's adoption strategies

Today, there are several current applications of e-Government in Malaysia such as e-Filling, Renewing Road Tax and Driving License online, KWSP’s i-Akaun, and E-Perolehan. The implement of e-Government is to provide citizens and organizations with more convenient access to government information and services and to provide delivery of public services to citizens, business partners, and those working in the public sector. to provide citizens and organizations with more convenient access to government information and services and to provide delivery of public services to citizens, business partners, and those working in the public sector.

Malaysia has seen a tremendous increase in the adoption of advanced technologies, particularly relating to online service delivery channels, whether business to business, business to consumer, and government to business, or government to citizen. In the case of the public sector, it is imperative that we keep pace with the technological advancements in I.C.T. We need to push forward to create and harness technological innovations in order to meet the needs of our citizens for faster, more convenient and more efficient means of interacting with the government.

The kiosks that have been set up for the public to interact with the Road Transport Department (JPJ) for various transactions have received good response – so good that more kiosks are being set up in and around the Peninsular.

Kiosks interact with the Road Transport Department (JPJ)

For examples, the Road Transport Department which had 200,547 hits by the public to mainly check and pay traffic summonses and the Employees' Provident Fund which recorded 106,206 hits on account statement enquiries rounded up the top five. Naturally, the top five downloaded forms charted by the www.gov.my portal were forms for job applications.

KWSP-i Akaun (www.kwsp.gov.my)











JPJ(http://www.jpj.gov.my/)


To promote on these e-Government, it should be deliver to the public through television advertisement, newspaper, radio, web sites and so on. Regarding these promoting, government should set up some guideline or so called demo for citizen how to adopt such e-Government application.

In conclusion, the e-Government is mainly seek to enhancing convenience, accessibility, and quality of interactions with citizens and businesses. Government implementing these e-Government, as a citizen, we should utilized it properly in order to cooperation within our country government to achieve a high-technologies challenge.

Things to take note to prevent e-auction fraud when a consumer participating in an e-auction

Feedback Forum is a place where you can express your opinions by leaving Feedback on your transactions. Besides that, you can learn about your trading partners, view their reputations. These member-to-member ratings and comments help the millions of buyers and sellers in the Community build trust.

A very good example was in Ebay’s feedback forum,

For each transaction, buyers and sellers can rate each other by leaving Feedback. Each Feedback consists of a positive, negative, or neutral rating, and a short comment.

A buyer can also rate the seller on additional criteria — accuracy of
item description, communication, shipping time, and shipping and handling charges. These detailed seller ratings (DSRs) do not count toward the Feedback Score and are anonymous. This means that sellers can't tell which buyer left which detailed rating, so buyers can feel free to leave ratings that honestly tell the story about their experience.





Escrow.com reduces the potential risk of fraud by acting as a trusted third party that collects, holds and disburses funds according to Buyer and Seller instructions. It is use for items purchased on auction sites, automobiles, motorcycles, domain names, jewelry, specialized computer equipment, and other high-ticket items. It helps to protect both buyer and seller by ensure that Buyers receive and inspect the merchandise before the Seller is paid. Sellers receive their money if the Buyer accepts the merchandise.

Friday, July 4, 2008

Corporate Blogging:A new Marketing communication tool for companies


Corporate Blogging is published and used by an organization to reach its organizational goals. Posts and comments are easy to reach and follow due to centralized hosting and generally structured conversation threads. Corporate blog includes internal blogs, external blogs and CEO blogs.http://en.wikipedia.org/wiki/Corporate_blog


Example of corporate blog is http://direct2dell.com/one2one/default.aspx. It is a blog about Dell products, services and customers. It is useful in terms of providing information to customers or online users about their latest news. For example, recently Dell has created its new home page by redesigning it. It is focusing on function and beauty of the home page. The other issue is about Dell’s producer is going to recycle and reuse those electronic equipment. Implementation of such corporate blog may make the customers more familiar with the company’s products and services. In addition, the strategy plan can also be known by public. It may boost up the reputation of the company.


There are several advantages of corporate blogging. It may provide space where interpretations and different points of view come up so that the any member of the organization can discuss and debate them. It provides a useful communication tools for member of organization to voice out their comment and helps increase member commitment. Besides, it helps in improving participation spirit, collaboration, and the capabilities of team learning. It is also useful to promote dialogue and find lateral ideas outside the team.


On the other hand, it leads to the sharing of information, which could be harmful for employees or the company. There are cases where a company has been held responsible for comments made by some employees that adversely affected the others. Moreover, some employees may use the blog to write negatively about the company, leading to bad publicity.

Monday, June 30, 2008

The application of pre-paid cash card for consumers



Touch ‘n Go card is an electronic purse that can be used at all highways in Malaysia, major public transports, selected parking sites and theme park.

Touch ‘n Go uses conta
ctless smartcard technology. The card looks similar to a credit card. Customer needs to fill in an application form at Touch ‘n Go Sales counter. The card costs RM10 each and comes with a one-year warranty period. However, If the card is faulty during this period, customer will get a card replacement free-of-charge. User can continue using the card as long as it is pre-loaded with electronic cash. User can reload the card at toll plazas, train stations, Automated Teller Machines, Cash Deposit Machines, Petrol kiosks and at authorised third party outlets. Reload denomination is ranging from RM20 to RM500.

Touch ‘n Go enhances the speed of paying for low value but high frequency transactions. Apart from the speed, it is also very convenient because user no longer need to prepare for small change or wait in queue at the cash lane to complete the transaction. For more information regards the Touch 'n Go Sdn Bhd, click here

http://www.touchngo.com.my/AboutUs_CompBG.html


Nowadays, the consumers can make purchases by using Touch n' Go card to make the payment.They are such as: Burger King, Dunkin' Dunuts, A & W,7 Eleven and so on.This is very convenient for cunsumers but however, that is only available for Klang Valley...


Mobie Payment system in Malaysia


Mobile Money is a PIN-based Mobile Payment Solution designed by Mobile Money International Sdn Bhd in Malaysia to address the limitations and bottlenecks created by cash, cheques and credit cards. It unlocks the power of the mobile phone to make payments, allowing registered users to pay for goods and services at anytime, anywhere using only a mobile phone coupled with a 6-digit security PIN (Personal Identification Number) via SMS (Short Messaging Service). This strategy is gives the freedom to shoppers to buy products online and pay the merchant using his/her mobile phone without being physically present at the store and it allows merchants to take online order without the need for online shopper to disclose their credit card information.

Mobile Money will encourage more consumers to shop online. This will definitely be a great boon to the e-commerce industry in Malaysia. It will surely encourage more merchants to adopt online selling as an extra sales channel which complement perfectly with their offline sales channel to help them sell more of their goods and services

The benefits of Mobile Money to merchants are it can sell to anyone, anywhere at anytime, no minimum monthly transaction, no rental fee, no merchant account required, super low transaction tee at 1.5%, safe and secure, low signup fees, get paid super fast, multi methods to request for payment, and refund and reversal features.

In order to pay using Mobile Money, a shopper must have a savings, current or credit card account with Hong Leong Bank or CIMB bank. It functions like a Credit Card if a shopper applies for a "Pay by Mobile Phone" credit card account (E.g. CIMB Mobile Credit Card). The shopper will be billed by the bank accordingly by month's end. In addition, it functions as a Debit Card if it is tied to shopper's savings or current account. The amount will be deducted instantly from the account upon successful transaction.

Moreover, Mobile Payment also introducing Mobile Money 0% Interest Easy Payment Plan (EPP) to customers with lowers merchant interest rate that allowed customers opt for greater value products / services & pay by installment.

In Conclusion, Mobile Payment system is a system that will enhance the business transaction process with using minimum resources and convenience ways for potential customer to get their thing easily.

Saturday, June 28, 2008

Electronic Currency

Electronic money (also known as e-money, electronic cash, electronic currency, digital money, digital cash or digital currency) refers to money or scrip which is exchanged only electronically. Typically, this involves use of computer networks, the internet and digital stored value systems

Peppercoin is acryptographic system for processing micropayments. Peppercoin Inc. was a company that offers services based on the peppercoin method. Peppercoin is a small payments technology company transforming routine card transactions into new revenue opportunities.

Peppercoin's platform accelerates the cash to card transition, getting customers to come back more often and spend more using the cards in their wallets - all while costing merchants less. Only Peppercoin provides a loyalty-ready PCI-compliant small payments suite for all payment models, including pre-paid, subscription, and pay-as-you-go with Intelligent Aggregation.

The peppercoin system was developed by Silvio Micali and Ron Rivest and first presented at the RSA Conference in 2002The core idea is to bill one randomly selected transaction a lump sum of money rather than bill each transaction a small amount. It uses "universal aggregation", which means that it aggregates transactions over users, merchants as well as payment service providers. The random selection is cryptographically secure -- it cannot be influenced by any of the parties. It is claimed to reduce the transaction cost per dollar from 27 cents to "well below 10 cents."


Peppercoin, Inc. was a privately held company founded in late 2001 by Micali and Rivest based in Waltham, MA. It has secured about $15M in venture capital in two rounds of funding. Its services have seen modest adoption. Peppercoin collects 5-9% of transaction cost from the merchant. Peppercoin, Inc. was bought out in 2007 by Chockstone for an undisclosed amount.

Waltham-based Peppercoin has landed a deal to provide Wurld Media with its Peppercoin Small Transaction Suite payments software to allow Wurld Media to sell legal digital content through Peer Impact, its peer-to-peer (P2P) network.


Using Peppercoin's software will allow Wurld Media to accept credit and debit cards for small payments, such as individual media downloads. No financial details of the deal were disclosed.
According to New York-based Wurld Media, its Peer Impact is the first P2P network in the world to sign agreements with the four major record labels. Peer Impact's business model is different from other paid music P2P services in that it allows consumers to earn money back by legally sharing their authorized music content with others.


Peppercoin enables profitable new business models for low-priced digital content and physical goods. Peppercoin's small-payment products help merchants, banks and other payments companies build market adoption quickly through a flexible, consumer-friendly approach.

Tuesday, June 24, 2008

Credit card debts:Causes and Prevention



Credit card debt is an example of unsecured consumer debt. Debt results when a client of a credit card company purchases an item or service through the card system. Debt accumulates and increases via interest and penalties when the consumer does not pay the company for the money he or she spent. It can prove a temptation too far, and soon they find themselves in debt. In fact, spending on a credit card is borrowing money. It is a debt and must be repaid at some point. The results of not paying this debt on time are that the company will charge a late payment penalty and report the late payment to credit rating agencies. The late payment penalty itself increases the amount of debt the consumer has.

There are several causes of credit card debts. Firstly, while the convenience and free credit feature of credit cards ,make them potentially useful to everyone, many consumers run up large unpaid balances on their card accounts and continually make sizable interest payments. The card issuers make this easy by asking that the cardholders make only a minimum monthly payment, which is usually far less than the unpaid balance.

Secondly, credit card interest rates are high so the profits can be high. Banks and other credit card issuers are after their slice of that big money, including from you. They can justify big marketing budgets to get your money. I deliberately do not say "get your business". You will resist better if you think "they are after my money."

Thirdly, it is very easy to get credit cards, multiple credit cards in fact. Issuers of credit cards make it easy for you, if you have had no debt problems in the past. If they seem to take it lightly, it is understandable that their customers do too. But remember, they take the risk factors into account when setting interest rates. That's why they are so high.

Fourth, your friends, neighbors and work colleagues will probably all have multiple credit cards, talk about them and flash them around from time to time. That can all influence your own attitude to credit card debt.

Fifth, depending on what country you are in, yours may be a " have now, pay later" society. Immediate gratification can take precedence over common sense. If everyone else is doing it, it surely must be right? It is wrong especially if the interest rates are too high.

If you have credit cards, but have not yet let your spending get out of hand then now is the time to take stock of you position and make some decisions about your financial future. Ask yourself what do you want those credit cards for? Do you just want them so that you have a source of payment in emergencies, to shop occasionally online, or when you travel abroad? Or do you plan on going on a shopping spree and spending the rest of the year struggling to clear the balance? Most people do not intend to ever use up their credit limits and max out their credit cards, but it is surprisingly easy to do and can be very difficult to undo. So, we will discuss several preventions that the credit card holders may take into account.

Firstly, most people know that credit card companies have given them far more than they reasonably can afford to pay back. So, it takes self control and discipline to keep these cards in your wallet and not over spend on them.

Secondly, you may plan all your borrowing. Sit down and write down what you absolutely must buy over the next year and add what you would like to buy. Total the cost and write down each month budget. Make sure you will not over budget.

Thirdly, you may pay off smaller balances first. It is common for a person to try to focus on their cards with larger balances first. Pay off the smaller ones. It will take less time and you will feel a sense of satisfaction when you have actually completed your goal. This will boost your confidence and make ir easier to tackle the higher balances.

Fourth, if you can afford it, pay doubles the minimum payment. The minimum payment usually pays just enough to cover the interest and a little more that pays downs the balance. Paying extra will pay your balance more quickly.

Fifth, credit card holders should avoid carrying a balance on credit cards, but if you do end up carrying a balance, make it a priority to pay it down. If you have more than one credit card carrying a balance, pay the minimum on the cards with the lowest APR and concentrate on eliminating each credit card, one at a time, starting with the card with highest APR.

In conclusion, we should always plan before spending especially in the case that the interest of the credit card is high sometime. Finally, we will manage to get rid of credit card debts.

p:)

Monday, June 23, 2008

The threat of online security :how safe is our data?

The threat online security always occurs when someone poses as a legitimate company to obtain sensitive personal data and fraudulently conducts transactions on your existing accounts. The current methods of online fraud are fraudulent emails, websites, and pop-up windows, or any combination of these.

Fraudulent emails will often ask for personal information and contain an overly generic greeting and may claim that your information has been compromised, that your account has been frozen, or ask you to confirm the authenticity of your transactions. Usually appear to come from a legitimate source. While some emails are easily identified as fraudulent, others may appear to come from a legitimate address and trusted online source. Do not rely on the name or address in the "From" field, as this is easily altered. Sample of a FAKE email being circulated:

From: Maybank Bhd
To:
user@website.com.my
Sent: Tuesday, June 10, 2008 10:58 AM
Subject: Alert Security Warning

Dear Maybank Berhad Customer,

At Maybank, we are dedicated to protect record and online information of our customer using any necessary security measure. We are introducing the New June 2008 Security Process which will protect all customers from the new and latest Spam Attacks.

We have upgraded our GGT-I Server to protect all customers using the new Maybank 56 HT Protection Due to this recent upgrade. All Maybank customers are required to update their information by following the below reference.

For additional security, after completing the first process a TAC code will be sent to your mobile phone. You are then required to fill that code on page two

www.maybank2u.com.my/security/56HT-protectionhtml

Please note that failure to update within this new security will result in account suspension and Maybank will not be held responsible for any loss.


Security Maintenance,

Maybank Bhd.

Beside that, fraudulent emails might be sending containing prizes or gift certificate offers that promise a prize or gift certificate in exchange for completing a survey or answering questions. They may direct you to provide your personal information to collect the alleged prize or certificate. Always confirm that the prize or gift certificate is being issued from a known and trusted company.

Followed by link to fraudulent websites which may direct you to counterfeit websites carefully designed to look legitimate, but which actually collect personal information for fraudulent used like below links that direct you to counterfeit maybank online banking website.

http://www.newsolutions-june2008.com/Maybank2u-Online.htm
http://www.new-malayan-gateway.com/Maybank2u-Online.htm
http://www.new-setupbrands.com/Maybank2u-Online.htm
http://www.may2u-june2007secured.com/Maybank2u-Online.htm -->
http://trackmapper.free.fr/images/_notes/maybank2u.com.my/signon.htm
http://sebastianschaper.net/aegabi06/cache/May2u-Service/Maybank2u_com.html
http://www.may-malayansolutions.com/Maybank2u-Security.htm
http://lordsofexodar.free.fr//images/mbb_login.htm
http://chrysantheme.guilde.free.fr/phpraider//authentication/smf/mbb_login.htm
http://210.217.236.12/wmaster/pop/mayredi.html


Moreover, it also may contain Trojan horses and other computer viruses. Fraudulent emails may include attachments that contain computer viruses, which you can access a virus via a link in an email. (A "Trojan horse" is a particularly harmful virus that can record your keystrokes or relay other information to an unauthorized source.)
Next method of online threat is fraudulent websites attempt to direct you to fraudulent websites via email and pop-up windows and try to collect your personal data. In many cases there is no easy way to determine if you are on a fraudulent website because the URL will contain the name of the institution it is spoofing.

Lastly, current method is pop-up windows, the small windows or ads that appear suddenly over or under the window you are currently viewing, to obtain personal information. These windows may be generated by Adware or spyware a programs possibly hidden in free downloads such as screen savers or music-sharing software and installed on your computer. While many of these programs enable harmless advertisements, some contain potentially harmful Trojan horse programs or may monitor your web viewing activity.

In conclusion to safe our data and information are use a current web browser, install a personal firewall, keep your computer operating system up to date, install, run, and keep anti-virus software updated and avoid downloading programs from unknown sources to prevent our data and information being misuse.

Thursday, June 19, 2008

The application of 3rd party certification programme in Malaysia

Do you ever trust about online transactions?

3rd party certification shows that your web site can be trusted. They give Web site visitors an easy and reliable way to establish trust online.

they are such as:



They both provide security solutions and trusted services to help companies build a secure network and application infrastructure for their electronic transactions and communications over the network. Security plays an important role for distributed, heterogeneous and mission critical applications. Valuable business resources that are accessible over the network need to be protected against misuse to ensure the business runs smoothly.

Both VeriSign and Trustgate give trust to the shoppers about the validity of a web site. Once the site was protect with Secure Site Pro with EV SSL Certificates and display the VeriSign Secured Seal, or

WebTrust the customers know that their transactions are secure and site can be trusted.




Data Confidentiality and Data Integrity

To ensure data confidentiality and integrity, all information transmitted over the Internet is encrypted using the 128-bit Secure Sockets Layer (SSL) protocol from Verisign Certificate Authority. SSL is a secure way of transferring information between two computers on the Internet using encryption. Strong end to end encryption is also adopted within the bank's computer networks and resources.


To show that a particular web site is a WebTrust certified. This certifies the web site compliance with leading international security standards and Best Practices, as well as their commitment to maintaining a secure environment. WebTrust is an independent corporation that monitors and tests the particular web site facilities to assure that they maintain the highest and most current standards in Internet information security and exchange.


Can its implementation helps to improve customers trust?

Recently, Security concerns are causing shoppers to limit spending online. Based on the VeriSign research, Fully one-half of Internet users today avoid buying online because they are afraid their financial information might be stolen, and 49 percent of those who express concern about their information security do not make online purchases at all. Moreover, Shoppers not only recognize and value third-party trust marks, but the presence of a trust mark can persuade them to complete the purchase. This is because the 3rd party trust marks had give them confident about their transactions are secure and that particular website can be trusted.

According to a recent eMarketer report, 29 percent of consumers surveyed have reduced the number of
items they bought online in the past year because of concerns about the privacy and security of their
personal information.

• 65 percent of online shoppers have abandoned a shopping cart/basket or failed to complete an
online purchase because they didn't get a sense of security and trust when it came time to provide
payment information.
• Half of all online consumers believe that the Web site they are purchasing from bears the
responsibility for protecting their personal information.

Therefore, Consumers need constant assurances that their online transactions are protected.




Monday, June 16, 2008

How to safeguard our personal and financial data?



Personal data is about living people and could be their name, address, medical details or banking details. How do we safeguard our personal and financial data? The manner of protection often depends on what kind of data you are safeguarding and how important or sensitivity it is to us. The following tips will help us to safeguard our personal and financial data.

Firstly, we may use and maintain anti-virus software, a firewall, and anti-spy ware software to protect ourselves against viruses and Trojan horses. They may steal or modify the data on your own computer and leave our vulnerable by using anti-virus software and a firewall. We should make sure our virus definitions up to date. Spy ware or ad ware hidden in software programs may also give attackers access to your data, so use a legitimate anti-spy ware program to scan your computer and remove any of these files.

Secondly, we should always create password in order to protect our access. By using a strong password or pass-phrase, it helps to protect access to our personal and financial data. For example, we need to choose PIN wisely. While we want to choose something you'll remember, you don't want it to be something that a clever thief could figure out just by learning your birth date or your child's name. A combination of uppercase and lowercase letters, numbers, and symbols will offer you more security. The stronger the password you create, the lower the risk of password being known.

Thirdly, we should encrypt stored personal and financial data whenever possible. This can help prevent unintended disclosure even if our system has been compromised. Data can be protected by encrypting the entire storage drive (whole disk encryption) or as selectively as you need, such as by folder or even individual files. If the encryption key or password is lost, access to the data may be lost as well. There are many products or options available, so be sure to carefully select one that is right for our personal requirement.

Fourth, we need to identify where the data is stored from time to time. We must have specific places within our network or computer where we store personal and financial data. Those network shares, hard drives, servers, or system folders can then have specific protection methods used to keep them more secure. If we need to store personal and financial data temporarily on a memory stick, laptop, or other device, remove that data from the device when we have finished. We should ensure that data has been completely erased and not just deleted.

Fifth, we should always limit transportation and transmission of data if you do not need to do so. For example, do not allow our personal and financial data to be sent via email or removed on a USB stick unless there is a clear need. When we do transport or transmit it, ensure that it has an appropriate level of security.

Sixth, it is a need to check privacy policies before providing personal or financial information. We need to check the web site's privacy policy and make sure we understand how our information will be stored and used. For example, attackers may attempt to gather information by sending emails requesting that you confirm purchase or account information. In this case, we should always alert the security of our personal and financial data.

Seventh, there is a need to limit physical access. Whenever possible, we store personal or financial data on devices that are physically secured. Allowing only authorized individual accesses to those devices, and monitor access to those devices whenever possible.

Sunday, June 15, 2008

Identify & compare revenue model for Google, Amazon.com &Ebay

Revenue = $ 16,593,986


Amazon.com Inc. Revenue =$ 14,835,000


eBay Inc. Revenue = $7,672,329



Google
is a global technology leader focused on improving the ways people connect with information.Google generate revenue primarily by delivering relevant, cost-effective online advertising. Advertising revenues made up 99% of revenues in 2005, 2006 and 2007.

The following present Google revenue models:

Year ended 31 December 2007

Advertising Revenues (in thousands)

Google website $ 10624705

Google network web sites $5,787,938

Total advertising revenues $16,412,643

Licensing & other revenues $16,593,986


Amazon.com

provide the widest possible selection for customers worldwide, while continuing to focus on in-stock inventory availability. Amazon.com have designed their websites to enable millions of unique products to be sold. Those product categories, such as:

        • Books
        • Tools, Auto & Industrial
        • Digital Downloads
        • Home & Garden
        • Apparel, Shoes & Jewelry
        • Grocery
        • Health & Beauty
        • Movies, Music & Games
        • Electronics & Computers
        • Sports & Outdoors
        • Toys, Kids & Baby
Net sales information is as follows: Year Ended 31 December 2007

(in millions)

Net sales:

North America………………………………………………...$ 8,095

International…………………………………………………...$ 6,740

Consolidated……………………………………………...$14,835

Year-over-year percentage growth:

North America………………………………………………...38%

International…………………………………………………...39

Consolidated……………………………………………...39

Year-over-year %Growth, excluding effect of exchange rates:

North America………………………………………………...38%

International…………………………………………………...31

Consolidated……………………………………………...35
Net sales mix:

North America…………………………………………………55%

International…………………………………………………...45

Consolidated……………………………………………...100%

ebaY provide online marketplaces for the sale of goods and services as well as other online
commerce, or ecommerce, platforms, online payments services and online communications offerings to a diverse
community of individuals and businesses.

Net Revenues by Type:
Year Ended December 31, 2007

Net transaction revenues

Marketplaces $5,135,363

Payments 1,838,539

Communications 376,715

Total net transaction revenues 7,350,617

Advertising and other net revenues 321,712

Total net revenues $7,672,329

Net Revenues by Segment:

Marketplaces $5,363,891

Payments 1,926,616

Communications 381,822

Total net revenues $7,672,32

Summary

Google are mainly operating as delivering relevant, cost-effective online advertising. While for Amazon.com designed their websites to enable millions of unique products to be sold by themselves and by third parties. Whereas ebaY, generate revenue mainly through transaction fees.They are from different type of business, still, very successful and common in our life.

Phishing: Examples and its prevention methods

Introduction

Phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication. Phishing is typically carried out by e-mail or instant messaging and often directs users to enter details at a website, although phone contact has also been used. Phishing scams are just another attempt to get valuable information. Scammers send a mass email to every address they can find. Typically the message will appear to come from a bank or financial institution. The email states that you should update your information for one reason or another, and they usually provide a link that you can click to do so. This all sounds reasonable and it may look legitimate, but phishing scams are anything but legitimate. The link provided does not take you to the financial institution’s website. Instead, you will be submitting your information to a website run by the scammers.

“Phishing” Examples

Fake Paypal messages are a favorite phishing method. Here are 2 Paypal phish. The first claims that the account will be suspended if your account information isn't updated. In the second, the scam claims your account information needs to be updated because they found incompatible information during a billing information check. Both have nothing to do with PayPal though they are designed to look “official.” Both use scare tactics to try to get you to act without thinking. The real PayPal never sends such emails.

























Phone Phishing

Not all phishing attacks require a fake website. Messages that claimed to be from a bank told users to dial a phone number regarding problems with their bank accounts.Once the phone number (owned by the phisher, and provided by a Voice over IP service) was dialed, prompts told users to enter their account numbers and PIN. Vishing (voice phishing) sometimes uses fake caller-ID data to give the appearance that calls come from a trusted organization.




Online Banking Phishing


Here is an example of an online banking phish that uses a security feature many banks and credit unions have in place—if an online banking user attempts to log onto online banking and fails a third time, the user is then locked out. They want you to panic, thinking someone is attacking your account and respond without stopping to think and check it out. Never respond to emails such as this. Your financial institution NEVER asks you to respond through an email link as this phish requests. If you were really locked out, you would have to initiate contact with the institution to get it unlocked.








How to prevent phishing



It is easy to uncover a crude phishing scam. For example, if you get an email from a bank you’ve never opened an account at, then don’t follow the link and enter your personal information.
You need to look at the message carefully to see if it is a phishing scam. Are words misspelled? Sometimes scammers operate in a second language and they give themselves away by using poor grammar.


You should also examine the link provided. Does it really go where it appears to go? For example, I could tell you that I’m giving you access to the government’s Top Secret Database at https://www.TopSecretDatabase.gov but if you click the link you’ll find that you’ve been directed to a different site. The best way to prevent this is to copy and paste the link (don’t click it) to your address bar. However, you can still get tricked by URL’s that look legitimate but have one or two letters switched.


If you have been snagged by phishing scams in the past, you need to be vigilant. First, let your financial institution know what happened. They will likely want to pursue the scammer, and they will monitor your account more closely. Next, It is always suggest that victims of phishing scams put a fraud alert on their credit report by contacting one of the major credit agencies. Finally, you’ll need to keep a close eye on your mail and your accounts. If statements stop showing up or if you see unusual activity, call your bank immediately.