




The World OF IT Depends on ECOMMERCE
E-government (also known as electronic government) is a diffused neologism used to refer to the use of information and communication technology to provide and improve government services, transactions and interactions with citizens, businesses, and other arms of government.
“Roadmap for a tech enabled government” is one of the visions of Malaysia Vision 2020. The vision focuses on effectively and efficiently delivering services from the government to the people of Malaysia, enabling the government to become more responsive to the needs of its citizens.
There are 7 pilot projects of the Electronic Government Flagship Application:
Government-to-Citizens
The Government-to-Citizen (G2C) relationship refers to services provides to fulfill citizens’ needs. Citizens seek more reliable and accessible services from the public sector. This implies that citizens should be able to carry out variety of tasks that involves multiple agencies, from a single access point. Increased interactions between government and citizens encourage citizens to become more participative thus allowing the government to respond to their needs more effectively. This category of relationship desires electronic services and infrastructure.
The myGovernment portal (http://www.malaysia.gov.my) acts as one-stop source of Malaysian government information and services for the citizens. Below are some online access services provided by government to citizens:
There are some recent surveys about e-government adoption in Malaysia, stated that the usage of e-government service is growing but at a small pace. In 2003, only 15% of Malaysian has used the Internet to access online government services compared to 12% in year 2002. In addition, there are some challenges faced by government in adoption of e-government services. The main challenge in e-government in Malaysia is the technological change, which includes issues such as standards, data integration, legacy maintenance and privacy and security. The key priority is to improve the core government applications and integrating more services across agencies. Simultaneously, market the e-government services to the public and businesses.
Related Links:
e-government
e-government in Malaysia
electronic Government in Malaysia
Implementation of electronic government in Malaysia: the status and potential for better services to the publicMalaysian
product of blooming.com.my
Worldwide delivery, satisfaction guaranteed. The delivery of product will be on time and satisfied the customers. The procedures are been stated in the web pages. In addition, this websites provided many sample of the flowers and baskets, customers can choose from the picture show in the websites. Besides that, the price was stated below of each sample, this convenient the customer to make comparison the price of the product. Although, the site design of this website is simple and dullness as it does not emphasizes on the layout and does not draw the attention of the customers but it is having the colorful and unique designs of their products which are quite attractive. Due to the website having a lot of pictures of the products, the download speed is quite slow. This website also provided the floral arrangement tips, floral care, and popular card message and so on to the customers. Moreover, this website is user friendly as it has FAQ (frequently asked questions) section that answers the consumers about the problems relating to placing an order and delivery guidelines. There is no doubt that blooming.com.my was websites that provided the Quality product and Quality services.
www.blooming.com.my
It also provides the search engine to help the users easily find what they are interesting in. Consumers can also choose to shop either by products or by occasions as they have arranged it in their home webpage. There also have the some special promotion for the flowers are stated in the home webpage where this is one of the strategic to attach more customer. Moreover, also provides customer with a secure shopping carts so that customer can shop safely. Customer can verify the product through the VeriSign Secure Site. Consumers can make the payment for the purchases in various ways such as through online credit card, online banking, mobile payment, pay using Kawanku ATM, open bill payment and also cash payment in their retail outlets.
Introduction
Electronic currency, or e-currency, is an approach of trading currencies electronically through brokerage account. E-money, electronic cash, electronic money, digital money or digital currency are some of the terms of e-currency. Examples of e-currency are Electronic Fund Transfer and direct deposit. Electronic Fund Transfer is type of computer-based system to conduct financial transaction through online. Direct deposit is an electronic transfer of a payment directly from the account of the payer to the payee. E-currency was officially accepted in 1999 by the countries of the European Union to simplify business by eliminating the exchange rates.
Advantage
E-currency allows people to make money on the Internet using their personal computer. E-currency allows people to start business or trading electronically with low cost. It only needs as low as few dollars to start e-currency trading or do business. It is suggested to the beginners that they should start with few dollars investment so that they can learn how the e-currency works. It depends to you whether you want to increase the investment. You will not spending too much on investment as the e-currency gave many chances to earn money.
Besides, banks offering many services whereby a customer can transfer funds, purchase stocks, contribute to their retirement plans and offer a variety of other services without having to handle physical cash or cheques. Customers do not have to wait in lines and this provides a lower-hassle environment. In addition, debit card and online bill payments allows immediate funds transfer of funds from an individual’s personal account to a business account without any actual paper transfer of money.
Disadvantage
Although there are some benefits of e-currency, there are also many significant disadvantages. These include fraud, failure of technology, possible tracking of individuals and loss of human interaction.
Fraud over digital cash has been a pressing issue in recent years. Hacking into bank accounts and illegal retrieval of banking records has led to a widespread invasion of privacy and has promoted identity theft.
There is also a pressing issue regarding the technology involved in digital cash. Power failures, loss of records and undependable software often cause a major setback in promoting the technology.
Privacy questions have also been raised; there is a fear that the use of debit cards and the like will lead to the creation of a global tracking system by the banking industry. Some people are working on anonymous e-cash to try to address this issue. The issue of providing anonymity to users itself introduces more problems, however; there is the distinct possibility that a fully anonymous digital cash system could permit the "perfect crime" - i.e., where a criminal uses someone else's electronic cash to make a payment, but cannot be traced - to occur. For this reason, 'revocable anonymity' is a suggested solution: a user is fully anonymous until they commit some crime, at which point authorization is given for their identity to be revealed. However, critics of this policy point out that the anonymous users will never be caught and held trial (thus their identity will never be revealed) without tracing.
Future evolution
The main focuses of digital cash development are 1) being able to use it through a wider range of hardware such as secured credit cards; and 2) linked bank accounts that would generally be used over an internet means, for exchange with a secure micropayment system such as in large corporations (PayPal).
Furthering network evolution in terms of the use of digital cash, a company named DigiCash is at the focus of creating an e-cash system that would allow issuers to sell electronic coins at some value. When they are purchased they come under someone’s own name and are stored on his computer or under his online identity. At all times, the e-cash is linked to the e-cash company and all transactions go through it, so the e-cash company secures anything that is purchased. Only the company knows your information and will properly direct purchases to your location.
Theoretical developments in the area of decentralized money are underway that may rival traditional, centralized money. Systems of accounting such as Altruistic Economics are emerging that are entirely electronic, and can be more efficient and more realistic because they do not assume a zero-sum transaction model.
Below are selected e-currency companies:
Users are advised not to check their financial data in public such as coffee shop that offers free wireless access. These systems are trustable, yet it still unknown whether our data can be accessed by others who sharing the same wireless connections. Hence, users are recommended to check their Internet settings that can give them a highest security protection.
2. Use separate user account
If you are sharing computer with few people, you may be worry that your data will be accidentally access, modify, delete or misuse by others. Therefore, create separate users account is a most effective way to solve their problems. By using separate user account, each of the users will be assigned specific access right and privileges by administrator. This approach limits the risk of private and confidential date been accessible and modifiable by other unwanted users. However, it will not give a full protection by using separate user account against vulnerabilities that may give an attacker administrator privileges.
3. Use and maintain antivirus software and firewall
Antivirus software can helps you to detect and eliminate viruses and Trojan horses than can modify and access to your personal data stored in personal computer. You need to update your antivirus database regularly to avoid your computer being infected by newest viruses. Furthermore, firewall helps to provide protection in favor of users by safeguarding network from malicious or unnecessary Internet traffic. Most of the computer comes with the firewall that integrated with their operating system. Nevertheless, if you using old computer, you are advised to buy firewall and install by yourself.
4. Use password to encrypt sensitive/confidential data
Passwords and other security features add layers of protection if people know how to use it appropriately. By encrypting files, you can ensure that your data not being accessed by unauthorized person. Even if they can physically access to the data, yet the file is not readable or viewable by unauthorized person. Whether the data stored is permanently or temporarily, the data still need to be encrypted. Once you use encryption for your data, it is important that you need to remember the password or passphrases, if not, you lost access to your data and data lose as well.
5. Do not open unknown attachments/links
Never open any unknown files or links that send by an unknown party. Most probably those attachment contains viruses can lead to damages to your data. Besides, it could be one of a way that an unknown party steals your data by sending those attachments or links. Moreover, if you click on the links, most probably it will guide you to a website where they ask you to enter or fill in any personal or financial data.
Related Links:
Safeguarding Your Data
Six Ways to Safeguard Your Online Assets
Understanding Firewalls