Corporate blogging provides many advantages to the company such as it allows the company or the employees to directly communicate with others both within the company (among the employees in disseminate and explain strategy) and outside the company (sending necessary information to the customers, shareholders, creditors etc); low cost; giving opportunity for others answer in written form as well as publish pictures and most importantly, it is beneficial to the company if the corporate blogging system has a positive effect on the company’s reputation. However, everything has pros and cons. While company is using the corporate blogging, it causes some problems to the company. For instance, many corporate blogs do not look like corporate blog as the employees are not professional enough to use formal communication language in corporate blogging system as they include many of their unprofessional tones; time consuming, many of the employees still prefer to meet the customers directly as they have most to say to the customers but do not have time to type it out. Besides this, corporate blogging system is always a system that easy to start and hard to maintain as it need the company to update the blog from time to time. If company does not update it frequently, it will damages company reputation instead of enhancing its reputation.
Sunday, July 6, 2008
Corporate Blogging: A new marketing communication tool for companies.
Corporate blogging provides many advantages to the company such as it allows the company or the employees to directly communicate with others both within the company (among the employees in disseminate and explain strategy) and outside the company (sending necessary information to the customers, shareholders, creditors etc); low cost; giving opportunity for others answer in written form as well as publish pictures and most importantly, it is beneficial to the company if the corporate blogging system has a positive effect on the company’s reputation. However, everything has pros and cons. While company is using the corporate blogging, it causes some problems to the company. For instance, many corporate blogs do not look like corporate blog as the employees are not professional enough to use formal communication language in corporate blogging system as they include many of their unprofessional tones; time consuming, many of the employees still prefer to meet the customers directly as they have most to say to the customers but do not have time to type it out. Besides this, corporate blogging system is always a system that easy to start and hard to maintain as it need the company to update the blog from time to time. If company does not update it frequently, it will damages company reputation instead of enhancing its reputation.
Things to take note to prevent e-auction fraud when a consumer participating in an e-auction
User Identify verification- eBay uses the services of Equifax to verify user identities for a $ 5 fee. Verified eBay User, a voluntary program, encourage users to supply eBay with information for online verification. By offering their Social Security number, driver‘s license number, and date of birth, user can qualify for the highest level of verification on eBay.
Authentication Service- Product authentication is a way of determining whether an item is genuine and described appropriately. Authentication is a very difficult to perform because it relies on the expertise of the authentication. Because of their training and experience, expert can often detect counterfeits based on subtle details. However, two expert authentications may have different opinion about the authenticity of the same item eBay has links to companies that provide this specialized service.
Feedback Forum-The eBay allows registered buyers and sellers to build up their online trading reputation. It provides users with the ability to comment on their experience with other individuals.
Physical Inspection-Providing for a physical inspection can eliminate many problems. This is especially true collector’s item. When the seller and buyer are in the same vicinity, it is easy to arrange for such inspection. EBay offers inspection services on a regional basis, so buyer can arrange for nearby inspection.
Escrow Service-For item valued at more than $200 or when either the buyer or seller feels the need for additional security. eBay recommend escrow service. With an easy –to-access link to third party escrow service, both partners in a deal are protected. The buyers mail the payment to the escrow service, which verifies the payment and alerts the seller when everything checks out. At the point, the seller ships the goods to the buyer. After an agreed-upon inspection period, the buyer notifies the service, which then sends a check to the seller, eBay , Yahoo! , and other large online auction sites provide their own escrow services. For the detail on how service work for auction, see aunction.yahoo.com and ftc.gov
Saturday, July 5, 2008
E-Government in Malaysia: Its implementation so far and citizen’s adoption strategies.
Current applications of e-Government in Malaysia
The examples of applications of E-Government in Malaysia are e-Filling, Renewing Road Tax and Driving License online, KWSP’s i-Akaun, E-Perolehan, e-Tanah, e-Consent, e-Local Government (e-PBT), e-Kehakiman and etc.
Common problems encountered by consumers
Security and privacy – consumer maybe worry about their private personal data and the tax return can see by others.
Language barrier - most of the government websites are using Bahasa Malaysia. So, this may be created problem since some users are more comfortable in using other language like English and Chinese.
Credibility – how accuracy of the e filing system? How to ensure that the system will not make the mistake?
Technological knowledge – some of the people may be do not have the technological knowledge. Thus, they do not know how to use the E Government application through internet.
Suggest ways to encourage more citizens to use the e-government applications
Government can organize some activities to introduce the e government application and teach the citizen how to use the E-Government application.
Eg: increase awareness through TV and radio advertisements, and organizing workshops at shopping malls.
Government should provide websites with multiple language versions.
Government should improve the security and privacy application of E-Government to make sure the data will not hack by the hacker.
Review a local e-commerce site
Blooming florist is one of the local company in Malaysia. Blooming florist has establish e-commerce site to do business transaction through internet. There are different types of product can be found in this website,(http://www.blooming.com.my/) such as flowers, basket arrangement, cookies, gifts, and etc.
The product search engine is available to enable user to search for the product they intended to find. Example, if the consumer want to buy Rose but don't know what type of Rose is nicer, he or she can use the search engine and just type Rose. Then several type of product with rose will appear.
Sunday, June 29, 2008
A review on a post on Legal from My E-Commerce blog
Nowadays, internet is the necessary facility for the develop country. Many services are actually providing by internet facility, one of the main services is entertainment. Therefore, providing entertainment such as online game and online movie or series on the internet facility is not an action against the law. However, if this facility encroaches others people right, it can become a critical matter. In this case, when these certain websites provide the facility of series sharing, it’s actually encroaching on the TVB copyright. People no longer buy series from TVB but just watch the series from the website. When such matter happened, the party sufferer has the right to take legal action towards the aggrieved party. Whether what type of penalty will be taken against the aggrieved party will be decided by the court.
Once the court or authority body take disciplinary action against the offender, it not only teaches the offender a lesson but also warn them not to repeat what they had done earlier. On the other hand, it also gives warning to others people who plan to do the same things in an indirect way. With this, public will more concern about others legal right.
Electronic currency
The example of the electronic currency company is PayLoadz, PayLoadz.com system is one of the e-micropayment products. PayLoadz, Inc. is located in the heart of New York City's Grammercy District at 23rd and Park Avenue. This close proximity to the legendary Silicon Alley gives us access to an impressive pool of talent, resources, and also reminds us of the lessons learned during the dot-com fallout. We are a new media development firm specializing in providing solutions for merchants and the community of developers. Founded in 1996 as a web development company Superfreaker Studios has grown to become one of the forefront developers utilizing Macromedia development products.It is service that sell software, eBooks, music, movies, digital art, manuals, articles, certificates, forms, files, and anything else that can be downloaded. Their automated service delivers your products to your customers instantly after payment. Our system operates using PayPal's online payment system and Google Checkout. Our sellers see an average 1,000% increase in sales using our service.
The application of pre-paid cash card for consumers
Mobile payment system in Malaysia: Its potential and consumers' adooption strategies
The mobile payment can be used to purchase any number of digital goods and physical goods. For example digital goods are ring tones, games, wallpaper for mobile phone and the booking cinema ticket and air ticket. Usually purchase digital good are through by SMS based transaction payments or mobile web payment (WAP).
In Malaysia, mobile payment is recently services developing fast. This service is effective providing customers with admission or money off vouchers which can be unique coded or designed to allow viral spread. The mobile channel can be effectively used as a self-funding and revenue generating medium. This service covers all mobile operators on Malaysia; it’s for prepaid and postpaid service billings.
For its potential, the customers no need to carry money or credit card to make transaction; it is by using their mobile phone to purchase the digital goods and booking cinema ticket and some. Such mobile service works on any mobile and it eliminates the hassle to queue up just to pay your electric bills. The mobile payment providers have a large market share to be grab on. This mobile payment system is still new and developing in Malaysia. It will continue to grow as consumer’s confidence on mobile payment increased.
For consumers’ adoption strategies, in Malaysia, most of the company will reward the consumer by giving gift at certain level of purchasing or giving redemption of reward. Beside that, some of the company will give extra credit to customers which are Hotlink user. With certain call and receive will accumulated the points to redeem air time or sms.
Saturday, June 28, 2008
Selling fish online in Malaysia
In Tanjung Dawai (Kedah state) have about 3,000 residents who are mostly involved in fishing or producing fish-based and seafood products. But the fishermen in Tanjung Dawai have some difference activities other then halieutics everyday. They are auctioning their catches through e-mail.
These pictures are showing what residences of Tanjung Dawai do and sell to survive thier lives.
Welcome all bidders from all over the world to place bids from 3pm to 7pm (Malaysia time). So far only attracted wholesalers from Penang and Kedah this is because of the system is still new.
Bidders who wish to own the fish he or she can states the price by e-mailing to this e-mail address pnktdawai@yahoo.com. After the bidder stated his or her price, the price will be flashed on the television sets for fishermen gathered at the auction hall. If there is a deal, then the bidders will be emailed. The bidders must register their name with the association (by calling 04-4572106) and a code number will be provided to participate in the bidding. In this case, the bidders must bear the transportation costs and the association would impose a 5% surcharge on the buyers.
The fishermen have to spend 3 days and nights at sea to maintain the volume. This is because of the 50% drop in catches causes by the tsunami in year 2004. Because of poor catches and high demand, the price of fish has gone up by between 20% and 25%.
Even the price of fish has increase but there is no effect to the association. The association had 1,204 members by today. They hope to create their own website one day. Kuala Kedah Fishermen’s Association Board of Directors chairman Abdul Hamid Bahari said the fishermen in Kuala Kedah would also go high-tech next year, after the association’s new complex in Keloncor was completed.
The system benefited the fishermen as they could get the best deal with their bidders!
Friday, June 27, 2008
Credit Card debts: Causes and Prevention
Debt results when a client of a credit card company purchases an item or service through the card system. Debt accumulates and increases through interest and penalties when the consumer does not pay the company for the money he or she has spent.
The results of not paying this debt on time are that the company will charge a late payment penalty (generally in the US from $10 to $40) and report the late payment to credit rating agencies.
The late payment penalty itself increases the amount of debt the consumer has.
When a consumer has been late on a payment, it is possible that other creditors, even creditors the consumer was not late in paying, may increase the interest rates the consumer is paying.
Causes of credit card debt
Reduced income/same expenses
Always delay bringing expenses in line with a reduction in income as good reasons and let debt fill the gap.
Poor money management
A monthly spending plan is essential. Without one you have no idea where your money is going. You may be spending hundreds of dollars unnecessarily each month and end up having to charge purchases on which you should have spent that money.
Gambling
It is hard to stop gambling but loans are freely available. When a people start to gambling, the gamblers will not stop to gambling until need to create the credit card debt or make loan from the bank.
Medical expenses
The medical industry wants to get paid at the time service is rendered. They know that if they don’t, the chances of their getting paid drops. This is because more debt for you, less for them.
Saving too little
People always spend too much (unnecessary expenditures) instead of saving because they do not have any financial planning at all.
Financial illiteracy
Many people don't understand how money works and grows, how to save and invest for a necessary, or even why they should balance their checkbook. The schools don't teach it, your parents may not have explained on it.
Prevention of credit card debt
CREATE A CLEAR BUDGET
People have to create clear budget and stick on it that includes monthly bills, food, clothes, entertainment and miscellaneous expenses will prevent from overspending and fall under deeper debt load.
DEAL WITH CREDITORS
Address the problem to creditors to investigate whether they could give revised payment arrangement when having trouble to pay off debts because running away is not a good solution. If not, may refer to Fair Debt Collection Practices Act if the collection of money from creditors is not fair enough. Creditors may approve proposal and accept modified payment plan when hiring a good credit card debt consolidation companies.
SELF CONTROL AND DISCIPLINE
One of the best practices is to have a direct set up so that able to pay back the full amount each month and use in emergencies. Thus, self control and discipline to keep these cards in wallet and would not overspend.
If you think you have bad in self control you can tear up credit card applications when the credit card company sends you those application forms.
Starts to spend less from today and stay with well financial situation.
Sunday, June 22, 2008
The application of 3rd party certification programme in Malaysia
Trustgate, is a licensed Certification Authority in Malaysia since the year of 1999 to meet the growing need for secure open network communications. Trustgate provides both security solutions and leading trust services for different level of community. These include individuals, organisations, government and e-commerce service providers using digital certificates, digital signatures, encryption and decryption. With the vision of “To enable organizations to conduct their business securely over the internet, as much as what they have been enjoying in the physical world”, Trustgate work towards its vision and successfully become the leading service provider of internet utility company and be a world-class e-environment.
A review on a post on internet security
How to safeguard our personal and financial data?
The following are some suggestion to safeguard our personal and financial data:
1. Do not give and fill any personal or financial data through online
It is important not to do so because some website might be not a "true" website. It's happen especially intended "person" intend to steal your information such as phising which is common example that makes user get into trap. Phishing is the criminally fraudelent process of attempting to acquire sensitive information such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication. So, the users are advised not to give any information especially personal and financial. Example, any request by the online bank on the detail through internet, the users are recommended to get confirmation by the Bank and is more proper go to the Bank to fill up the detail.
2. Only Make Purchases On Trusted Sites
When deals seem too good to be true, they just may be - you might be paying as a victim of identity theft when you make purchases on websites that aren't secure. There are lots of small online retailers that don't have adequately secure payment systems. The best way to make sure that your information doesn't get intercepted is by simply sticking with trusted, well-known online retailers, or smaller sites that use reputable payment processors like PayPal or Google Checkout. Regardless of which site you use, you should always make sure to look for the padlock icon on the bottom of your browser to verify that the page is safe.
3. Having a proper antivirus and anti spyware and keep on updating
Antivirus and anti spyware shows a very important characteristic to protect your information and computer. It is used to prevent virus to attack the computer and anti spyware takes a preventative approach to spyware, focused on spyware’s main entry point, Web browser. So, the cracker cannot easily break into the system to access personal and financial information of the user. The antivirus and anti spyware's software needed to keep on updating to have more strong prevention on the latest trap on the time basis. Example of these software include AVG Antivirus and Antispyware, Ad-Aware Professional SE, SpywareBlaster,SpyBot - Search & Destroy, Norton AntiVirus, McAfee Anti-Spyware, and etc.
4. Choosing Passwords to Protect Personal and Financial Data
Users and recommeded to choose passwords that would be difficult for someone who knows you to guess. So, if a friend or coworker can not figure out your passwords, someone who does not know you probably will not be able to do so. It is important that never use personal information numbers for passwords. For example, telephone number, birth dates, identity card number, and etc. Beside that, passwords is advised to change occasionally. Athought this is time-consuming, but not as time consuming as recovering from identify theft. At the same time, do not repeat password. It is obvious that the same password should not be used for every file, website, server and system that you log im to, but many people still fall into this practice. If you use the same pasword for many financial and personal records, magine the damage you will incure if someone finds your password for one set of records. Use a different password for each account, website and so on.
The above might be some way to safeguard our personal and financial data. Thanks.
Friday, June 20, 2008
The Threat of Online Security: How safe is Your Data?
Innovative software, Web sites, and devices attract attention because they make communicating easier, accomplishing tasks faster, or being online more entertaining. But hackers generally follow to exploit the latest mass market. That’s why computer security researchers say some of our newest technical fascinations—iPhones, social networks, and Internet phone services, to name a few—could present tempting targets in 2008. Sellers of security technology have a financial stake in fanning computer users' fears, but it's useful to know where the bad guys might strike.
Wayward Web Sites
The new generation of sites generally referred to as Web 2.0 act more like traditional PC software: The sites are fast, responsive, and speed up page loading. That means browsers are working harder than ever to pull the data that keeps sites current. Couple that with market imperatives to keep pushing out new features to users, and the emerging Web could present a dangerous brew of software flaws that’s ripe for hackers to exploit.
Not So Social Networks
Social networks like MySpace (NWS) and Facebook have attracted tens of millions of members, and they store on their servers a trove of information about each one. The sheer size of those targets could make them tough for hackers to ignore. In October, 2005, a self-spreading worm took a day to infect 1 million MySpace users, defacing their profile pages. So far, problems on Facebook have mostly been the impaired of unsolicited biddings to join users’ networks. But more serious threats could be on the horizon, security researchers say.
A Target in Your Pocket
Sophisticated cell phones that boast lots of storage, Wi-Fi networking, and souped-up computing capacity offer lots of people the chance to use them as ersatz PCs. But all that data zapping forth from smart phones means cyber criminals are sniffing around for ways to crack into them. Phones with software from Symbian and Microsoft (MSFT) have already been attacked, and security researchers have demonstrated ways to hack into Apple’s (AAPL) iPhone. Google’s newly announced Android mobile-phone software could be next.
Bigger, Badder Botnets
One of the more insidious types of computer virus commandeers a user’s PC, gang pressing it into a network of “bots” that can spew spam, record users’ keystrokes to steal bank account numbers and passwords, or launch attacks against Web sites. Such botnets are getting bigger in size and harder to take down. Case in point: the “Storm Worm” virus that has infected tens of millions of machines this year.
Cybersquatters on the Campaign Trail
One of cyber crooks’ favorite ways to snare unsuspecting victims is to set up a phony Web site where users end up when they mistype a popular address. Remember Whitehouse.com? (The President's site is Whitehouse.gov.) As the Presidential election cycle heats up, so-called cybersquatters are ready to pounce. One has already posted ads to a fake site that’s one letter off from the address of Barack Obama’s official campaign site. In 2008, researchers say hackers could post malicious code or set up phony solicitations for campaign donations.
Virtual Worlds, Real Danger
Internet users are spending actual cash to outfit avatars, stockpile weapons, and decorate abodes in online virtual worlds such as Linden Labs’ Second Life and Blizzard Entertainment’s popular World of Warcraft game. So far, Second Life meddlers—so-called griefers—have only resorted to virtual vandalism. But they'd cause serious trouble if they find a way to pluck real cash from users’ accounts.
Your "Bank" is on Line
VoIP phones offer low-price long-distance calling and the ability to place calls from a PC address book in a snap. But the communications protocol used by many VoIP providers is vulnerable to attacks, and leaves holes that the bad guys can use to cloak their identities, security experts say. Worse, many Internet phone carriers haven’t turned on technology that can encrypt conversations over their systems. Most people don’t respond to those phony e-mails asking them to verify their bank account number. But what about a phone call that sounds like it’s coming from the fraud-prevention department? That kind of ruse could be harder to resist.
Hackers Go Pro
In the past few years, hackers have banded together and worked with organized crime to harvest the most valuable data exposed on the Internet. Next year could witness an even more complete merger between the computer and criminal undergrounds. Developers for hire and professional hacking kits are available through online markets. And criminals are on the lookout for intellectual property that resides on companies’ servers. In 2005 and 2006, hackers stole as many as 94 million credit- and debit-card numbers from the computers of retailer TJ Maxx (TJX). More efficient groups could make break-ins like that even more prevalent.
Security Tips (make your data secure)
Given the assortment of nasty behavior befouling the Internet, what's a PC user to do? BusinessWeek.com consulted the experts, who offered the following advice:
Don't give away any valuable or sensitive personal information on your MySpace or Facebook profile or within messages to other members of the network. And don't click on any links in social network messages from people you don't know.
No reputable company will ask for your password, account number, or other log-in information via e-mail or instant message.
Use one of the many antivirus, antispyware, and firewall programs on the market. Often, vendors offer all three functions in a single package. And many Internet service providers offer them free with your monthly subscription.
Upgrade your browser to the most current version. From Microsoft, that's Internet Explorer 7. Mozilla's Firefox is on version 2, as is Apple's Safari browser.
Pay attention to the messages from Windows that pop up on your screen, especially in the new Vista operating system. They often contain helpful security information that many users overlook.
Turn on Windows' automatic-update function to get Microsoft's regular security patches.
Thursday, June 19, 2008
An example of phishing case and its prevention
It uses a new twist on the traditional 'phishing' technique of spamming thousands of users with a scam email that links people to a fake banking website to steal their personal and financial details. Instead, it says the person has received a payment of $217 via Citibank's online wire service, citi.com. One giveaway that all might not be as it seems, however, is the appalling spelling and grammar.In the email, it state that "Your email is not registred with us, you need to setup account with us and verify your identity. Please fill this form to be enrolled to citi.com service. Once you register, the money will appear in your citi's account balance in your overview page. You can withraw the outstanding balance to your credit or debt card's bank account."
For the prevention, we have to verifying the authenticity and security of wed site, not shooping online while using an unencrypted or open wireless network, reviewing credit card and financial statement for unauthorised charges, securing computers before shopping online by keeping antivirus, antispam and firewall software up-to-date, never replying to-email or pop-up meassage from companies that ask for personal, financial or passward information.Last but not least,never follow ing direction asking you to reveal information or delete a fole that is received in e-mail or pop-up meassage from seeming trusted companies.
Sunday, June 15, 2008
Identify and compare the revenue model for Google, amazon.com and eBay.
From what I had noticed from Google, Amazon and eBay’s website, I found that each of this website has its own way to generate income. Google, a search web with its search engine attracted many loyal web searchers by providing simple and easy usability web search services for its web searchers. The number of internet users is growing since the day Google had officially launched. Whenever the web searcher click on the result from the Google’s search results or Google content network, Google automatically earned affiliate fees either through a cost-per-click scheme or a cost-per-view scheme.
Besides, Google also earned other source of revenue such as the revenue from the web-based e-mail service which known as Gmail or Google Mail. It helps Google generate revenue by displaying links and advertisement that are tailored to the content of the e-mail messages displayed on screen.
Amazon earn its revenue in sales, once Amazon sells its goods and products, it earned revenue from what it had sold. Follow by the transaction fees, Amazon earned income on the variable basis, depending how many goods or products it had sold. The more the goods and products are being sold, the more income the Amazon earned. Besides these two ways, Amazon does advertise some of the companies’ advertisement. By dong so, Amazon manage to earned the advertising fees.
In short, Google, eBay and Amazon has their own ways in generating their revenue. The major different between Google, eBay and Amazon is on the services provided by each of the website. Google is a website that is totally different from eBay and Amazon because Google provide service for its users for searching the information which is globally available whereas eBay and Amazon only provide services for its users for searching items that are available in its database. Another major different between Google and others is Google do not provide places for business dealing such as making the sellers and buyers to meet up whereas eBay and Amazon major function is the selling and buying process.
By making comparison between eBay and Amazon, although both of these two websites providing a quite similar services but they are different. For eBay, it is a auction based where else for Amazon, it is a deal transaction based. Meaning to say, for eBay, the selling and buying process is between individual and individual. Individual posted items they wish to sell off and another individual buy for that particular item. For Amazon, the selling and buying process is between business/firm and individual. Firm sells the goods and products for a fixed price and whether or not to purchase the item is all depends on the consumers themselves.
As a conclusion, Google, eBay and Amazon run their business on different ways and having the different business line but the way they generate revenue more or less are the same, which fall back to the five common techniques, sales, transaction fees, subscription fees, advertising fees and affiliate fees.
Saturday, June 14, 2008
E-commerce can Reduce Cycle Time, Improve Employees’ Empowerment and Facilitate Customer Support
Cycle time is the sum of time between a customer making an order and obtaining the goods or the time business take to complete transactions from beginning to the end.E-commerce can reduce cycle time because it processes all documents electronically and error-free, minimizing processing time and the number of staff required. With E-commerce, customers are able to place order and receive goods in a rapid time by eliminating the business process and intermediaries. For example. we can book ticket through sms for TGV cinema.It reduce the time which we need to queqe up. And it also can book for a amount we wanted, because some of the reason we have to watch a movie with a group of friends. Beside this, E-commerce also reduces labour time in document and mail preparation, telephone calling, data entry, overtime and supervision. It also provides managers more accurate data and improves the analysis of pricing change in order to maximize product availability by recognition of demand trends well. The uses of extranet greatly reduce cycle time .
Improve employee empowerment
With E-commerce, it can improve employee empowerment. Because by using the e-commerce, the employees can use the custemer complaint through the company wedsite. to increase the cuztomer sactisfaction and it can lead to maintain the company impression and gain profit from that.By the way,it is sucessful to unlocking the potential of employee and enable them to make decision by their own.The employee can fell more freedom and flixible to their own jods.Furthermore, they can take as a reponsibility to their own field and it can motivated the employee to perform well. Some of the company communicate their employee through intranet.Because of it, The manager of each deparment can place order easily and give some authority to their employees.
Customer support
With e-commerce, they also can provide some customer services like Frequently Ask Question(FAQ) to support the customers' understanding.This can lead to improve their quality of service by analysis the customer comments, suggentions and complaints.The company can improve their servive instantaneously and effectively.Not only for this, with E-commerce, the customer can shopping through the company wedsite.it can let the customer place a order or can search the detail of the product.By the way, customer also can customize their own product. For example nike and jaguar, it can lead to increase of customer sactisfaction and customer need's orientated.
The example of an E-commerce failure and its causes
The company began as a service that delivered videos by bicycle messenger to Manhattan customers who ordered them online. The company boasted “from the Internet to your door in under an hour” and its attractive rates helped rapidly draw thousands of customers .The company is often referred to as an example of the dot-com excess.The documentary film e-Dreams (2001) portray the fate of the company.
Kozmo.com's aura helped it raise more than $250 million, but the company was unable to generate enough revenue to cover costs. In 1999, it had $3.5 million in revenue, compared to $26.4 million in net losses. Basic problems with its business model included offering a costly home-delivery service for free, even on very small orders on which it was impossible to turn a profit. Last-ditch efforts to boost orders and stop the delivery losses by charging $1.99 for orders under $30 helped, but couldn't deliver the company.
An example of E-commerce success and its causes
- Selling products and services online
- Generating targeted leads
- Testing marketing messages
- Increasing online registrations
- Driving downloads
- Distributing publications
- Promoting special events
- Educating buyers
- Gathering market data
- Building an email database
Friday, June 13, 2008
The History of E-commerce
When the Internet was opened to commercial use, E-commerce became possible in 1991.
In the late 1970s the ability to use these technologies appeared and allowed business companies and organizations to send commercial documentation electronically.
It took about four years to develop the security protocols and DSL which allowed rapid access and a persistent connection to the Internet although the Internet began to advance in popularity among the general public in 1994.
In 2000 a great number of business companies in the United States and Western Europe represented their services in the World Wide Web.
The “brick and mortar” retailers recognized the advantages of electronic commerce and began to add such capabilities to their web sites since the dot-com collapse in 2000 led to unfortunate results and many of E-commerce companies disappeared.
The end of 2001, the largest form of E-commerce, had around $700 billion Business-to-Business (B2B) model in transactions.
End of 2007, E-commerce sales continued to grow and E-commerce sales accounted for 3.4 percent of total sales.
Sunday, June 8, 2008
About myself
For the http://www.xunlei.com/ I can download the latest movie, drama and some other show that I can not miss. And I can download which bring some memorable time to me .in this website, i can look for the funny show which can cheer up my life when i was down.
For me, I’m the person who like car very much. So I’ll go to http://www.topgear.com/ to search the latest information for car which will expand my knowledge to cars, for example the new technology for the car engine which are invented to save the fuel and efficiency and to keep our environment clean.
With the http://www.baidu.com/ this website can let me download the latest music or which I have been miss. Because listening to the music can let me to relax and refresh my mind. And I can download my favorite artists songs.
the hotmail mail box can allow me to check my mail which my friend to me, and keep contact with my friends with around the world.
For the youtube, I can watch some show or video clips which are funny and fantasticality. so for the last. i would like to say. internet make us life become easy.
self-introduction
Follow by the UTAR website and the wble. Sometimes i will visit to wble to see whether any anoucement has been posted. Beside that, i will visit UTAR website especially when before and after the exam to check the exam timetable and the result after the examination.