Corporate Blogging: A new marketing communication tool for companies.  

Posted by Steven

CORPORATE BLOGGING


A corporate weblog is published and used by an organization to reach its organizational goals. The advantage of blogs is that posts and comments are easy to reach and follow due to centralized hosting and generally structured conversation threads.Company blogs executed well build credibility and project a message of selfconfidence.Examples of reasons to start a corporate blog would include; Employment Branding, ProductLaunch, Public Relations, Marketing Campaigns, Consulting Services, Vendor Relations, Media Relations,and Innovative Ideas used to established Industry Expertise.

Blogging evangelists often speak of a conversation taking place in marketplaces.Participating in the blogging world gives companies a competitive edge in that conversation. Bloggers are early adopters, expert networkers, and skilled at gathering competitive intelligence. Companies who start a blog canbring those skills in house and learn the language and etiquette of blogging, learning to engage these individuals in achieving goals. Companies that fail to engage in this conversation now will find themselves playing catch-up for years to come.Corporate blogs primarily are used for national branding. They allow companies to present accurate information without the filter of the media or advertising.

Marketing blogs can be used to amplify marketing messages through traditional channels. The use of a blog allows a company to provide a destination of information for consumers, from commercials to promotional coupons, to directions on how to use products.Employment blogs allow a direct connection to online communities, increasing the number of qualifiedapplicants by identifying communities of interest and building a loyal talent pool. Public Relations blogs allow a corporation to put a human touch in place of the often used “corporate speak.”




From pictures of employees to CEO blogs, to instructions on how to interview, public relationsblogs remind readers that your company is staffed by real people.These are few examples of successful corporate blogs Microsoft, GM, T-Mobile, Emerson, IBM, Pfizer, Boeing, Google, Sun.

E-auction Fraud and Its Prevention  

Posted by JenNy


Electronic auctions (e-auctions), auctions conducted online, have been inexistence for several years on local area networks and werestarted on the Internet in 1995. Host sites on the Internet serve as brokers, offeringservices that enable sellers to post their goods for sale and allow buyers to bidon those items.Although the majority of consumer goods are not suitable for auctions and arebest sold through conventional sales techniques (i.e., posted-price retailing), the flexibility offered by online auction trading may offer innovative market processes.For example, instead of searching for products and vendors by visiting sellers’Websites, a buyer may solicit offers from all potential sellers. Such a buying mechanismis so innovative that it has the potential to be used for almost all types of consumer goods.


So, the things that consumer take note to prevent e-auction fraud would be as follow:

  • User identity verification. A voluntary program, encourages users to supply auction's compamy with information for online verification. By offering their Social Security number, driver’s license number, and date of birth, users canqualify for the highest level of verification.

  • Authentication service. Product authentication is a way of determining whether an item is genuine and described appropriately.Authentication is verydifficult to perform because it relies on the expertise of the authenticators.Because of their training and experience, experts can (for a fee) often detect counterfeits based on subtle details. However, two expert authenticators may have different opinions about the authenticity of the same item.

  • Grading services. Grading is a way of determining the physical condition ofan item, such as “poor quality” or “mint condition.” The actual grading system depends on the type of item being graded. Different items have different gradingsystems—for example, trading cards are graded from A1 to F1, whereas coins are graded from poor to perfect uncirculated.

  • Feedback Forum. The auction's company Feedback Forum allows registered buyers and sellers to build up their online trading reputations. It provides users with the ability to comment on their experiences with other individuals.

  • Insurance policy. Auction's compamy offers insurance underwritten by Lloyd’s of London.Users are covered up to $200, with a $25 deductible. The program is provided at no cost to users.

  • Escrow services. For items valued at more than $200 or when either a buyer or seller feels the need for additional security, auction's company recommends escrow services(for a fee). With an easy-to-access link to a third-party escrow service, bothpartners in a deal are protected. The buyer mails the payment to the escrow service,which verifies the payment and alerts the seller when everything checksout. At that point, the seller ships the goods to the buyer. After an agreed-uponinspection period, the buyer notifies the service, which then sends a check to theseller. (An example of a provider of online escrow services is tradenable.com.)

  • Nonpayment punishment. Auction's company implemented a policy against those who do not honor their winning bids.To help protect sellers, a first-time nonpayment results in a friendly warning.A sterner warning is issued for a second-time offense, a 30-day suspension for a third offense, and indefinite suspension for a fourth offense.

  • Appraisal services. Appraisers use a variety of methods to appraise items,including expert assessment of authenticity and condition and reviewing what comparable items have sold for in the marketplace in recent months. Anappraised value is usually accurate at the time of appraisal but may change overtime as an item becomes more or less popular in the marketplace.

  • Verification. One way of confirming the identity and evaluating the conditionof an item is through verification.With verification, neutral third parties will evaluate and identify an item through a variety of means. For example, some collectors have their item “DNA tagged” for identification purposes. This provides a way of tracking an item if it changes ownership in the future.

E-Goverment in Malaysia  

Posted by ric86




IMPLEMENTATION OF E-GOVERNMENT PROJECTS IN
MALAYSIA
and citizen's adoption strategies

Most of the e-Government project implementations are currently in progress. The detailed objectives and status of each of the e-government implementation as at May 2007 is as follows:

1.Electronic Procurement (eP) Project
The electronic procurement system, better known as ePerolehan, streamlines government procurement activities and improves the quality of service it provides. E-Perolehan converts traditional procurement processes in the Government machinery to electronic procurement on the Internet and can be accessed at www.eperolehan.com.my. With ePerolehan, all suppliers can obtain tender documents and submit bids through the Internet. The suppliers are equipped with smartcards that enable them to transact with the ePerolehan system.

2.Project Monitoring System (PMS II)
Project Monitoring System (PMS) is led by the Implementation and Co-ordination Unit (ICU) as one of the e-government projects that create a mechanism to monitor project implementation throughout various government agencies and statutory bodies. For example, project application to approval to implementation, mid-term review and completion. PMS would also provide a platform for exchanging ideas and demonstrating best practices in project implementation. The PMS is designed to provide a mechanism for monitoring the implementation of government projects.

3.Electronic Services Directory (eServices)
The next e-government project is Electronic Services Delivery (eServices). This project is a pilot project that allows citizens of Malaysia to engage in transactions with government and utilities payments such as telephone and electricity bill, police summons, Road and Transport Department (RTD) services, etc. The eServices is accessed via multi channel service delivery such as the internet, interactive voice response (IVR) and 66 kiosk machines.

4.Human Resource Management Information System (HRMIS)
The introduction of Human Resource Management Information System (HRMIS) as an e-government project will provide a single interface for government employees to perform human resource functions effectively and efficiently. The objective of HRMIS is not just for record keeping but also to provide transactional functions such as leave applications, loan processing, competency management, recruitment, and selection of employees. The HRMIS project will provide a single interface for government employees to perform human resource management functions effectively and efficiently in an integrated environment.

5.Generic Office Environment (GOE)
The aim of Generic Office Environment (GOE) is to introduce a fully Integrated, distributed and scalable office environment that leverages use of multimedia information technology. This will enable efficient communication, allowing collaboration across all workers, and ensuring right information reaching the right people in a timely manner The GOE project consists of modules namely Enterprise-wide Information Management System (EIMS), Enterprise-wide Communication Management System and Enterprise-Wide Collaboration Management System. The EIMS provides a universal interface for users to manage, retrieve and compose the information that they need in their day-to-day operations Via the Communication and Collaboration Management Systems. Users can also communicate and collaborate in a group to perform work functions.

6.Electronic Labour Exchange (ELX)
The main objective of Electronic Labour Exchange (ELX) is to improve the mobilization of human resources and optimise work force utilisation through systematic matching of job seekers to job vacancies (Yusoff. 2002). As such, this would enable the Ministry of Human Resources (MOHR) to be a one-stop centre for labour market information that will be accessible to the public.

7.E-Syariah
The main objective of implementing E-Syariah is to improve the quality of service in Syariah courts. This will eventually enhance the Islamic Affairs Department's effectiveness through better monitoring and co-ordination of its agencies and thus improve the management of its 102 Syariah courts. The E-Syariah application consists of Syariah Court Case Management System, Office Automation System, ESyariah Portal, Syaree Lawyers Registration System and Library Management System (eSyariah). The E-Syariah project was launched in April 2002 and is expected to be fully operational in 2005. Via the system, the Syariah judges are able to have access to past cases and all the relevant information needed for a particular case quicker than before. As of April 2007, the e-Syariah has been implemented at all 110 Syariah Courts in Malaysia.
8.Other Applications
Besides the seven flagship applications, several government agencies introduced online services for the public project aims to increase the ease and efficiency of public service to the people. Among the most notable accomplishments of the government was the launch of the latest iteration of the Public Service Portal, in February 2005, with all core portal modules completed and “live” in May 2005. MyGovernment is the single gateway to information and services provided by Malaysian Government agencies on the Internet. To date, myGovernment links 900 websites across federal, state and local authorities and the Malaysian Civil Service Link. The portal will continue to grow in scope and reach as departments and agencies continue to make more services online. Other important planned enhancements include an online payment gateway, ubiquitous access through various mobile channels and single sign-on capability. Another e-government application launched by the Internal Revenue Department (IRD) is companie’s online tax. Since 2005, individuals were able to file their taxes online to IRD using MyKey. MyKey is a digital signature embedded into an individual's MyKad. It identifies and authenticates MyKad holders over the Internet, providing the capability to sign digitally a document or transaction. The Malaysia Digital Signature Act 1997 governs the MyKey.

Potentials and consumers' adoption strategies for mobile payment system in malaysia  

Posted by ric86



Mobile payments are defined as the use of a mobile device to conduct a payment transaction in which money or funds are transferred from a payer to a receiver via an intermediary, or directly without an intermediary. While this definition includes mobile payment transactions conducted via mobile banking systems, a distinction between mobile payments and mobile banking services should be noted. Mobile banking services are based on banks’ own legacy systems and offered for the banks’ own customers.

A mobile payment as any other payment is carried out by using a specific payment instrument such as cash, credit card, or mobile phone wallet. In addition to pure mobile payment instruments, most electronic and many physical payment instruments have been "mobilized". Payments fall broadly into two categories; payments for purchases and payments of bills/invoices. In payments for purchases mobile payments compete with or complement cash, checks, credit cards, and debit cards. In payments of bills/invoices mobile payments typically provide access to account based payments such as money transfers, Internet banking payments, or direct debit assignments.

Potential of mobile phones to make the transformation
Bank Negara Malaysia sees tremendous promise in mobile telecommunication networks as an electronic payment channel since mobile phones are already in the hands of most Malaysians, with 88% of the Malaysian population subscribing to mobile phone services.

The high penetration rate affirms mobile phone networks as an increasingly popular channel for Malaysians to perform a plethora of activities beyond voice communication, encompassing all forms of digital communication, commerce, banking and payments. Indeed, payments via text messaging has the potential to grow in importance.

With 25 million mobile phone subscribers in Malaysia, there are immense opportunities to leverage on mobile phones to accelerate the migration to electronic payments, to widen the reach and appeal of electronic payment services, to deliver innovative mobile payment products that offer speed, simplicity and convenience at minimal cost for the public, as well as to provide an efficient and cost-effective method of delivering financial services even in the remote areas. The high percentage of mobile phone subscriber and the high rate of participation of the population in the banking system are important pre-conditions for the significant use of the mobile phone as an ideal platform for personal payments. Indeed, the large mobile subscriber base and the positive transformational effects of mobile banking and payments offer a unique opportunity to open up the financial system to more customers and communities, in order to achieve financial inclusion for all segments of our society.

With the favourable market conditions, various mobile banking and payment initiatives have been launched in recent years. This however, has yet to achieve widespread acceptance. To date, there are only 460,000 subscribers for mobile banking and payment services. This represents only 1.8% of the 25 million mobile phone subscribers in the country. There is, therefore, a significant untapped, and potentially lucrative market for mobile payment and banking services.


Adoption of mobile and electronic payment systems

1.Relative advantages of mobile payment systems:
Mobile payments provide consumers with ubiquitous purchase possibilities, timely access to financial assets and an alternative to cash payments. The users can, for example, pay for transportation tickets or car parking remotely without the need to visit an ATM, a ticketing machine or a parking meter . Advantages of mobile payments compared with traditional payment instruments are thus likely to pertain to time and location independent purchase possibilities.

2.Compatibility:
Compatibility captures the consistency between an innovation and the values, experiences, and needs of potential adopters. For payment systems, consumer ability to integrate them into their daily life is an important aspect of compatibility. The compatibility of mobile payments with consumers’ purchase transactions, habits, and preferences correspondingly influences the diffusion progress.

3.Complexity:
Complexity and problems with usability have contributed to the low adoption of a variety of payment systems, including smart cards and mobile banking. Similarly, ease of use and convenience have been found to affect consumer adoption of Internet payments and WAP financial services. Mobile payments are commonly expected to increase consumer convenience by reducing the need for coins and cash in small transactions and increasing the availability of purchase possibilities. Limitations in mobile device features, however, diminish the usability and user-friendliness of mobile technologies. Typical limitations include small displays and keypads, limited transmission speed and memory, and short battery life.

4.Network externalities and creation of critical mass:
Payment systems exhibit network externalities as the value of a payment system to a single user increases when more users begin to use it. Consumer decision to adopt a payment system is therefore significantly affected by the amount of other consumers and merchants using it. Failure in creating critical mass has contributed to discontinuance of several previous payment systems, including several smart card systems. As mobile payments represent a new system introduced to the market, reaching a wide enough initial adopter base of consumers and merchants is a critical success factor for m-payments as well.

5.Costs:
The cost of a payment transaction has a direct effect on consumer adoption if the cost is passed on to customers. As shoppers in electronic channels are attentive to price the transaction costs of mobile payments should be low enough to make the total cost of the purchase competitive with physical world prices.

6.Payment system security and trust in payment systems providers:
In a mobile environment, lack of consumer perceived security and trust in vendors and payment systems is one of the main barriers to electronic and mobile commerce transactions. The key requirements for secure financial transactions in electronic environment include confidentiality, data integrity, authentication, and non-repudiation. Other security factors important for consumer adoption are anonymity and privacy, which relate to use policies of customers’ personal information and purchase records.

The application of pre-paid cash card for consumers  

Posted by Steven

Pre-paid cash card

The prepaid card is far from a new idea. The concept is basically the same as a prepaid gift card or a mobile phone SIM card. A prepaid cash card looks like a credit or debit card, and gives users the ability to purchase products and services with a card but with a crucial difference which means a person can only spend the balance that has been preloaded onto the card. This means there is no risk of running into debt as it has no credit or overdraft facility.

One can simply start using prepaid cash card when money has been loaded on to a prepaid card by cash at a bank, Post Office, at Payzone or PayPoint terminals, bank transfer, through your employer or even by credit card.

When using for purchasing at a high street store, they work in exactly the same way as a credit or debit card. When purchasing just simply hand over the card and then you will be asked to enter your PIN number (supplied with the card) on an electronic keypad or to sign a payment slip so your signature can be matched with that on the back of the card (if there is no Chip on the card). The total amount will be taken from your card immediately and the transaction is complete.

To shop online, you'll find the item you want to buy and click on to the website's "checkout" page before filling in your details and those of your prepaid card. As long as you have enough cash loaded on your card, the purchase is completed and your item will be shipped to you.



Application of pre-paid cash card for consumers



  • Buying groceries and petrol


  • As a replacement for travellers cheques or travel cash for a low cost alternative to paying for goods and services abroad


  • Topping up your mobile phone


  • Internet shopping including eBay


  • Paying bills


  • Transferring money to friends and family either in the UK or overseas (known as remittance)


  • Withdrawing cash from an ATM


  • People who wish to use foreign currency on a holiday


  • Newly arrived immigrant, who although earning, cannot yet obtain credit due to having no credit footprint in the UK


  • A person who has a poor credit rating or a history of bad debt who cannot get a credit card


  • Parent of a young person travelling abroad.

Electronic Currency (E-Money)  

Posted by Bob

Electronic Currency
also known as e-money, electronic cash, electronic money, digital money, digital cash or digital currency) refers to money or scrip which is exchanged only electronically. Typically, this involves use of computer networks, the internet and digital stored value systems. Electronic Funds Transfer (EFT) and direct deposit are examples of electronic money. Also, it is a collective term for financial cryptography and technologies enabling it.

While electronic money has been an interesting problem for cryptography, to date, use of digital cash has been relatively low-scale. One rare success has been Hong Kong's Octopus card system, which started as a transit payment system and has grown into a widely used electronic cash system. Singapore also has an electronic money implementation for its public transportation system (commuter trains, bus, etc), which is very similar to Hong Kong's Octopus card and based on the same type of card (FeliCa). A very successful implementation is in the Netherlands, known as Chipknip.

Characteristics of E-Currency
All types of money which people deal with it electronically, far from traditional ways of payment like banks, cheques, paper money and coins, e-currency allow users through internet or wireless devices to pay the charges of their purchases directly from their bank accounts by electronical ways such as Smart cards, Digital wallets and micropayments.


Despite the somewhat confusing diversity of proposals that seem to offer quite different solutions, all electronic money schemes share a common basis of issues that they somehow have to address. Based on Lynch; Lundquist (1996), Matonis (1995) and Okamoto; Ohta (1991) six problem areas can be defined that have to be addressed by any system:

Independence:
Is the electronic money independent of any physical condition? It has to be transferable though open networks and storable on different devices and in different locations inside and outside these networks. Cash, evidently, is dependent on its physical condition in so far as it equates the unit-value of money with the storage medium (paper, coins) in which it resides. It can not be transferred onto any other medium without ceasing to be cash. On the other hand, the cash economy is a truly open network which all forms of physical money can enter and exit quite freely. Even though the limits of the acceptance of specific cash clearly define different segments within the network , e.g. CDN$ are accepted inside Canada only, changing from one segment into the other is not only unproblematic but an essential, institutionalized feature of the network itself (currency exchange
Can it be copied (reused) and forged? This, obviously, must be prevented. Not only must the elnge).

Security:
ectronic money software be secure but also all the communication between the partners of a transaction must not be interceptible. Cash solves this problem based on its physical properties. A bill can be in only one place at any given time, therefore the question whether is has been duplicated can be decided locally, based on the thing. The transfer of cash is done normally in the presence of both parties and therefore unproblematic.

Privacy:
What kinds of transactional information are generated and who has access to them? All levels of privacy are technically possible. Privacy is related to the encryption technology used in the security features of the system, however, there is no correlation between the two

Transferability:
Who can pay and who can receive money? The cash must be transferable between users in all forms of "peer-to-peer payment". With cash this is no problem while with traditional credit cards this is impossible unless the payee has the privileged merchant status that is not intended to be available for everyone.
Divisibility:
What are the payment units? The size of the units and the number of different units has to be defined. In contrast to cash, where the physical properties limit not only the size but also the number of units due to reasons of practicality, these constraints do not apply to electronic money. All sizes of units are, technically speaking, equal. The limits arise due to specific design properties.

Ease of use:
What hardware, software and expertise is required? Electronic money has to be easy to use since the systems aim, at least theoretically, at the totality of the population addressing all kinds of individual expertise.

There are two different types of approaches to electronic money: on-line and off-line electronic money.

On-Line

On-line means there is a need to interact with a bank or another "trusted third party" (via modem or network) to conduct a transaction. On-line systems prevent fraud by requiring merchants to contact the bank's computer with every sale. The bank's computer maintains a database that can indicate to the merchant if a given piece of electronic money is still valid. This is similar to the way merchants currently verify credit cards at the point of sale.

Off-line
Off-line means that a transaction can be conducted without having to involve a bank directly. Off-line electronic money systems prevent fraud in basically two different ways. There is a hardware and a software approach. The hardware approach relies on some kind of a tamper-proof chip in a smart card that keeps a mini database. The software approach is to structure the electronic money and cryptographic protocols to reveal the identity of the double spender by the time the piece of e-money makes it back to the bank. If users of the off-line electronic money know they will get caught, the incidence of double spending will be minimized, at least in the theory.

On-line or off-line, those six characteristics( independence, security, privacy, transferability, divisibility, and ease of use) define the problem space that each electronic money system promoter attempts to solve for one goal: public acceptance wide enough to make the system profitable for those who run it.

Alternative systems
Technically electronic or digital money is a representation, or a system of debits and credits, used (but not limited to this) to exchange value, within another system, or itself as a stand alone system, online or offline. Also sometimes the term electronic money is used to refer to the provider itself. A private currency may use gold to provide extra security, such as digital gold currency. An e-currency system may be fully backed by gold (like e-gold and c-gold), non-gold backed, or both gold and non-gold backed (like e-Bullion and Liberty Reserve). Also, some private organizations, such as the US military use private currencies such as Eagle Cash.

Many systems will sell their electronic currency directly to the end user, such as Paypal and WebMoney, but other systems, such as e-gold, sell only through third party digital currency exchangers.

In the case of Octopus Card in Hong Kong, deposits work similarly to banks'. After Octopus Card Limited receives money for deposit from users, the money is deposited into banks, which is similar to debit-card-issuing banks redepositing money at central banks.

Some community currencies, like some LETS systems, work with electronic transactions. Cyclos Software allows creation of electronic community currencies.

Ripple monetary system is a project to develop a distributed system of electronic money independent of local currency.

Example Of E-Currency : PayPal

PayPal is an e-commerce business allowing payments and money transfers to be made through the Internet. It is also a European bank based in Luxembourg. It serves as an electronic alternative to traditional paper methods such as cheques and money orders. PayPal performs payment processing for online vendors, auction sites, and other corporate users, for which it charges a fee. It sometimes also charges a transaction fee for receiving money (a percentage of the amount sent plus an additional fixed amount). The fees charged depend on the currency used, the payment option used, the country of the sender, the country of the recipient, the amount sent and the recipient's account type[citation needed].


On October 3, 2002, PayPal became a wholly owned subsidiary of eBay.Its corporate headquarters are in San Jose, California, United States at eBay's North First Street satellite office campus. The company also has significant operations in Omaha, Nebraska, Scottsdale, Arizona and Austin, Texas in the U.S.; India, Dublin, Ireland; and Berlin, Germany.


Issue: What is the double-spending problem?

Since e-money is just a bunch of bits, a piece of e-money is very easy to duplicate. Since the copy is indistinguishable from the original you might think that counterfeiting would be impossible to detect. A trivial e-money system would allow to copy of a piece of e-money and spend both copies. It is possible to become the millionaire in a matter of a few minutes. Obviously, real e-money systems must be able to prevent or detect double spending. Online e-money systems prevent double spending by requiring merchants to contact the bank's computer with every sale. The bank computer maintains a database of all the spent pieces of e-money and can easily indicate to the merchant if a given piece of e-money is still spendable. If the bank computer says the e-money has already been spent, the merchant refuses the sale. This is very similar to the way merchants currently verify credit cards at the point of sale.


Links of e-Currency


Paypal


G-cash (phillipine's Mobile Cash Solution)

Credit Card Debts: Causes and Prevention  

Posted by JenNy

Credit card debt is an example of unsecured consumer debt, accessed through ISO 7810 plastic credit cards. Debt results when a client of a credit card company purchases an item or service through the card system. Debt accumulates and increases via interest and penalties when the consumer does not pay the company for the money he or she has spent. The results of not paying this debt on time are that the company will charge a late payment penalty (generally in the US from $10 to $40) and report the late payment to credit rating agencies. Being late on a payment is sometimes referred to as being in "default". The late payment penalty itself increases the amount of debt the consumer has. When a consumer has been late on a payment, it is possible that other creditors, even creditors the consumer was not late in paying, may increase the interest rates the consumer is paying. This practice is called universal default. Nowadays, credit card debt is a burgeoning problem on campuses. Although most students handle credit well, a significant minority get into debt.


Causes
One of the following causes of credit card debt might mirror our financial situation:


  • Excessive medical expenses: If one of our family members suffers serious illness and our health insurance cannot cover the medical bills then our credit cards are probably the only source of funds to pay off the difference.

  • Gambling: Gambling is fun and entertaining but if it becomes addictive it'll be hard to stop. This won't become a problem if we spend our spare money for gambling. But borrowing money through our credit cards for gambling will surely lead us to a financial disaster.

  • Reduced or lost of income: A divorce, death of spouse or unemployment may cause a serious debts. If there is a huge gap between income and expenses, the easiest way to fill in the gap is with credit card debt.

  • Poor money management: Do we really know where our money is going? What percentage of our income have we saved each and every month? If we don't have an income and spending budget chances are, we cannot set aside some money for saving and emergency needs.

      Photobucket

Prevention
It's not that hard to get a credit card, but we want to make sure that we are at a decent annual percentage rate, that won't bankrupt us when we see the first payment being due.


  • Only sign up for companies that are willing to offer us a low percentage rate.

  • Avoiding the expensive purchases and not buying things that you don't really need on credit is an important step to getting on the right track.

  • We should pay off whatever we can as soon as you can do it, so our balance not grow exponentially as time passes.

  • We have to make sure you are also reading all of that fine-print that comes along with the agreement, because there could be hidden fees that we want to know about ahead of time.

  • Being aware, and being conscientious about our payment schedule are just a few little things that could keep us from adding to a debt we may have already created.

  • Don't ever use credit cards to reward ourself for a good day, or to fulfill a bad day by trying to cheer ourself up with a purchase.

  • Keep our credit card spending to amounts that we know we can pay off, don't go over-board with unnecessary purchases, and budget how we plan on paying back our charges.

How to safeguard our personal and financial data  

Posted by ric86




Nowadays, personal information and financial data are is very important in our life, especially when we are surfing the internet. Protecting yourself from predators and theft on the Internet is very important to prevent our privacy information from exposure. Theft tries to hack to our computer or website we visited and getting information about us. They can easily access our financial accounts, our credit records, and other privacy information. We need to be on guard and protect our personal and financial data from these thieves.The manner of protection often depends on what kind of data you are safeguarding, how important or sensitive it is to you, to your organization or your customers.More recently, criminals use email to link consumers to phony Web sites that ask users to "confirm" their account information by entering it into an official-looking online form. The following tips will help you become aware of how to protect data both at work and at home.


8 ways to stop secure your personal and financial data


There’s no ironclad protection that guarantees that you’ll never fall victim to some form of identity theft. But there are 8 steps you can take to protect yourself, many of which are rather simple:

1. Destroy private records and statements.

Tear up -- or, if you prefer, shred -- credit card statements, solicitations and other documents that contain private financial information. It included the user name and the password you are used, should deleted immediately.

2. Secure your mail.

Empty your mailbox quickly, lock it or get a P.O. box so criminal’s don’t have a chance to snatch credit card pitches. Never mail outgoing bill payments and checks from home. They can be stolen from your mailbox and the payee's name erased with solvents. Mail them from the post office or another secure location.

3. Safeguard your Social Security number.

Never carry your card with you, or any other card that may have your number, like a health insurance card. And don’t put your number on your checks. It's the primary target for identity thieves because it gives them access to your credit report and bank accounts.

4. Know who you're dealing with.

Whenever anyone contacts you asking for private identity or financial information, make no response other than to find out who they are, what company they represent and the reason for the call. If you think the request is legitimate, contact the company yourself and confirm what you were told before revealing any of your personal data.

5. Make purchases on trusted sides.

Always beware of website visited. The best way to make sure that your information doesn't get intercepted is by simply sticking with trusted, well-known online retailers, or smaller sites that use reputable payment processors like PayPal or Google Checkout. Regardless of which site you use, you should always make sure to look for the padlock icon on the bottom of your browser to verify that the page is safe.

6. Be more defensive with personal information.

Define the company privacy policy is and whether you can arrange for the organization not to share your information with anyone else. Pay attention on the terms and condition had mention.

7. Secure Your Network.

If you have a wireless network at home or work, make sure that you secure it. Hacker can gain access to anything you do over an unsecured network in a matter of seconds. If you look at the documentation for your wireless router, you'll be able to find out how to lock your router and encrypt your information. It won't affect the way you use your wireless network, but it will keep intruders from getting a hold of your info. Using the antivirus software may help you to prevent from hacker.

8. Review your payment statements carefully.

Make sure you recognize the website and check the purchases listed before paying the bill. If you don't need or use department-store or bank-issued credit cards, consider closing the accounts. Always check the statement carefully before you leave the website.

The Treat of Internet Security: How Safe is our data?  

Posted by Bob

The Internet is a worldwide, publicly accessible series of interconnected computer networks that transmit data by packet switching using the standard Internet Protocol (IP). It is a "network of networks" that consists of millions of smaller domestic, academic, business, and government networks, which together carry various information and services, such as electronic mail, online chat, file transfer, and the interlinked web pages and other resources of the World Wide Web(WWW).


Internet Security is something that has grown to be a main concern among society. Companies have come out with Identity Theft prevention services, but often, by the time you get those, it is already too late or doesn’t help.

Many of you probably hear on the news, every so often, “A popular website has been compromised and many people have had their personal data stolen!” When a website is compromised, it puts thousands at risk for one of many possible types of identity theft. It is rare that a site is hacked to this extent: usually, the data is collected through look alike sites, through spyware, or through other means of collection; most of which happen on a single-user basis. It makes many people nervous when giving out personal information to anyone online because they are not sure what can really happen, and they do not have all the facts.

Internet Threats
There are few type of internet threat that appear in the internet, let us go through three of the most popular threat:

(i)Virus
Virus is a Malicious software that attaches itself to other software. For example, a patched software application in which the patch's algorithm is designed to implement the same patch on other applications, thereby replicating. It replicates within computer system, potentially attaching itself to every software application.
Below is the behaviour that virus has:
Behavior categories:
-Innocuous
-Humorous
-Data altering
-Catastrophir







(ii)Worm
It's a malicious software which is a stand alone application. It's often designed to propagate through a network, rather than just a single computer. When your computer is infect of worm, computer will slow starting or slow running. It'll also face unexpected or frequent system failures.









(iii)Trojan Horse

It is a Worm which pretends to be a useful program or a Virus which is purposely attached to a useful program prior to distribution. It's same as Virus or Worm, but also sometimes used to send information back to or make information available to perpetrator. Trojan unlike Worms, which self propagate, it's require user cooperation.



Those internet security threat will try to steal your information from your computer through the internet. It's very danger if our computer online without any internet security system such as anti-virus. For example, Trojans will track into your computer and steal your personel information such as password of your e-banking account, email account and etc. For business companies, it's really a treat to them because they save their business infromation in the computer such as daily profits, project or new planning for their business venture. But there are still some prevention that we can do to prevent internet threat.





Below are the ways to prevent internet threat:


  1. Limit connectivity. Limit downloads

  2. Use only authorized media for loading data and software

  3. Enforce mandatory access controls.

  4. Viruses generally cannot run unless host application is running

  5. Always remember to scan your computor with Anti-virus
  6. Delete all the cookies in the computor to prevent track on the history/password.

  7. On your firewall to prevent hackers.

As conclusion, internet has the advantages and disvantages. If we prepare well before we online, surely we'll be secure and safe from internet threat.


Youtube Video Clip
IBM TV Focus: Online Security Threats

Review post: Internet Security  

Posted by JenNy

Nowadays, it can be said there are more and more threats over the Internet. Malware is a general name for all programs that are harmful; viruses, trojan, worms and all other similar programs.

A computer virus is a program, a block of executable code, which attach itself to, overwrite or otherwise replace another program in order to reproduce itself without a knowledge of a PC user. There are a couple of different types of computer viruses for example boot sector viruses, parasitic viruses, multi-partite viruses, companion viruses, link viruses and macro viruses. These classifications take into account the different ways in which the virus can infect different parts of a system. The manner in which each of these types operates has one thing in common: any virus has to be executed in order to operate. Most viruses are pretty harmless. The user might not even notice the virus for years. Sometimes viruses might cause random damage to data files and over a long period they might destroy files and disks. Even benign viruses cause damage by occupying disk space and main memory, by using up CPU processing time. There is also the time and expense wasted in detecting and removing viruses.

Viruses don not just appear, there is always somebody that has made it and they have own reason to so. Viruses are written everywhere in the world. Now when the information flow in the net and Internet grows, it does not matter where the virus is made. Most of the writers are young men. There are also few university students, professors, computer store managers, writers and even a doctor has written a virus. One thing is common to these writers, all of them are men, women do not waste their time writing viruses. Women are either smarter or they are just so good that never get caught.



Why do people write and spread viruses?

It is difficult to know why people write them. Everyone has their own reasons. Some general reasons are to experiment how to write viruses or to test their programming talent. Some people just like to see how the virus spreads and gets famous around the World. The following is a list from news group postings alt.comp.virus and tries to explain why people write and spread viruses...



  • they don't understand or prefer not to think about the consequences for other people

  • they simply don't care

  • they don't consider it to be their problem if someone else is inconvenienced

  • they draw a false distinction between creating/publishing viruses and distributing them

  • they consider it to be the responsibility of someone else to protect systems from their creations

  • they get a buzz, acknowledged or otherwise, from vandalism

  • they consider they're fighting authority

  • they like 'matching wits' with anti virus vendors


How viruses spread out

Viruses mission is to hop from program to other and this should happen as quickly as possible. Usually viruses join to the host program in some way. They even write over part of the host program. A computer is infected with a boot sector virus if it is booted from an infected floppy disk. Boot sector infections cannot normally spread across a network. These viruses spread normally via floppy disks which may come from virtually any source:




  • unsolicited demonstration disks

  • brand-new software

  • disks used on your PC by salesmen or engineers

  • repaired hardware


A file virus infects other files, when the program to which it is attached is run, and so a file virus can spread across a network and often very quickly. They may be spread from the same sources as boot sector viruses, but also from sources such as Internet FTP sites and newsgroups. Trojan horses spread just like file viruses. A multipartite virus infects boot sectors and files. Often, an infected file is used to infect the boot sector: thus, this is one case where a boot sector infection could spread across a network.



What to do when you find viruses

First thing what you should do when you find virus is count to ten and stay cool. You should keep notes on what you do and write down what your virus programs and you computer tells you. If you are not sure what to do, you should call the administrator for future action. In some cases it is not good to start you computer from hard disk, because the virus may active and then do some harm.
Second,make sure that you should get sure that it is virus and what virus it is. It is important to know what kind of virus we are dealing with. Companies that make anti-virus programs knows what different viruses does and you can ether call them and ask about that viruses or you can go to their web pages and read about the virus you have.
When you start you computer you should do it from a clean (non-infected) floppy diskette and after that run the virus program. The boot diskette should be write protected so that virus can not infect the boot diskette too. It is good to take a backup of the file that was infected. Virus program could do some damage to the file and that is why it is good to have a backup. It is good to let you administrator to know about the virus, so viruses would not spread around so much. In TKK PC classes are protected by anti-virus program and that virus program reports to a person, responsible for virus protection.

There are three different kind of anti-viral packages: activity monitors, authentication or change-detection software, and scanners. Each type has its own strengths and weaknesses. Commercial anti-viral programs have a combination of the above mentioned functions. There are over ten good anti-viral programs. Most knows programs are Data Fellows F-Prot, EliaShim ViruSafe, ESaSS ThunderBYTE, IBM AntiVirus, McAfee Scan, Microsoft Anti-Virus, Symantec Norton AntiVirus and S&S Dr Solomon's AVTK.

In conclusion, There are lots of viruses in the world and new viruses are coming up every day. There are new anti-virus programs and techniques developed too. It is good to be aware of viruses and other malware and it is cheaper to protect you environment from them rather then being sorry.There might be a virus in your computer if it starts acting differently. There is no reason to panic if the computer virus is found.It is good to be a little suspicious of malware when you surf in the Internet and download files. Some files that look interesting might hide a malware. A computer virus is a program that reproduces itself and its mission is to spread out. Most viruses are harmless and some viruses might cause random damage to data files.

Phishing: Examples and its prevention methods.  

Posted by Steven

Phishing
In computing , phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication. Phishing is a scam in which the attacker sends an email purporting to be from a valid financial or eCommerce provider.
The email often uses fear tactics in an effort to entice the intended victim into visiting a fraudulent website. Once on the website, which generally looks and feels much like the valid eCommerce/banking site, the victim is instructed to login to their account and enter sensitive financial information such as their bank PIN number, their Social Security number, mother's maiden name, etc. This information is then surreptitiously sent to the attacker who then uses it to engage in credit card and bank fraud - or outright identity theft. Many of these phishing email appear to be quite legitimate.

Examples

Washington Mutual Bank phishing email

This is an example of a phishing scam targeting Washington Mutual Bank customers. This phish claims that Washington Mutual Bank is adopting new security measures which require confirming ATM card details. As with other phishing scams, the victim is directed to visit a fraudulent site and any information entered on that site is sent to the attacker.


eBay phishing scam

This eBay phishing email includes the eBay logo in an attempt to gain credibility. The email warns that a billing error may have been made on the account and urges the eBay member to login and verify the charges.

Prevention methods

Do not respond to any emails that request personal or financial information, especially ones that use pressure tactics or prey on fear. If you have reason to believe that a financial institution actually does need personal information from you, pick up the phone and call the company yourself by using the number in your rolodex, not the one the email provides.

Install up-to-date antivirus and antispyware software. Some phishing e-mail contains malicious or unwanted software that can track your activities or simply slow your computer. Try new antivirus and comprehensive computer health services like Windows Live One Care To help prevent spyware or other unwanted software, use Windows Defender. Windows Defender comes with Windows Vista and is available at no charge for Windows XP SP2

Rather than merely clicking on the link provided in the email, type the URL into your web browser yourself (or use a bookmark you previously created). Even though a URL in an email may look like the real deal, fraudsters can mask the true destination.

Don't enter sensitive or financial information into pop-up windows - A common phishing technique is to launch a bogus pop-up window when someone clicks on a link in a phishing e-mail message. This window may even be positioned directly over a window you trust. Even if the pop-up window looks official or claims to be secure, you should avoid entering sensitive information because there is no way to check the security certificate. Close pop-up windows by clicking on the X in the top-right corner. Clicking cancel may send you to another link or download malicious code.

Secure the hosts file – A hacker can compromise the hosts file on desktop system and send a user to a fraudulent site. Configuring the host file to read-only may alleviate the problem, but complete protection will depend on having a good desktop firewall such as Zone Alarm that protect against tampering by outside attackers and keep browsing safe.

History and Evolution of E-commerce  

Posted by JenNy

HiStOry...
Ecommerce is any business related transactions partially or totally carried out by electronic medium especially on internet using Open networks or Closed network.The most important feature accountable for the success of internet is electronic commerce that allows people to buy or sell anything they want at anytime of the day or night.The process of advancement in Information Technology to evolve into a business transaction is the ecommerce history.

During prehistoric period before invention of electricity, transactions of all the business were done face to face or via letters. Later on this was substituted by telegraph, telephones and in mid 1980’s by fax machines. As large companies invested vastly in researching in order to develop more reliable electronic means of transaction, old technology was replaced by new technologies that were more consistent and spread much faster than the previous technology.

To interchange data and to carry out business deals electronically in 1960’s Electronic Data Interchange (EDI) was formulated. Initially ecommerce was facilitating business transactions electronically mostly using technology such as EDI (electronic data interchange) and EFT (electronic funds transfer) to send business documents such as purchase orders or invoices. Previously in 1970’s and 1980’s it also involved data analysis.

Lets have a look into how gradual technical development attributed to the growth of ecommerce:

  • In general the first business deal carried out on telephone or via a fax is mainly considered as first ecommerce transaction.
  • In 1960’s Electronic Data Interchange (EDI) was formulated. This is a set of standard
    instructions to interchange data and to carry out business deals electronically.
  • In 1969 ARPANET, was developed by Americas department of defence for researching new reliable networks and later this enhanced into Internet that was purely used as a research tool for nearly 20yrs.
  • In 1991, Tim Berners-Lee developed World Wide Web at CERN that started the first Internet transaction. These technology supported exchange of data that was in text format only.
  • Later in 1993, Mosiac was developed by Marc Andreessen, this is the first graphic web browser launched to interchange text and graphics and loads of people started downloading it.Netscape the most successful graphic browser was later developed by Marc Andreessen. On the other hand, Microsoft came up with Microsoft Internet Explorer.The first business deal took place in 1994 and since then there have been billions of dealings.
  • Later in 1998 DSL was launched into the market that provided much faster access and
    persistent connection to the internet.* In 1998, AOL swamped the market and had about 1.2 billion sales over a period of 10 weeks from online sales.* Ecommerce spread to a significant group globally within a span of 4 years from 1996 to 2000.
  • Another major improvement in ecommerce came with the development of Linux a platform more reliable and open source that allowed itself to be customized by its users and put a tough competition to Microsoft that compelled it develop much better versions of networking.
  • Amazon and eBay were the first International companies that implemented electronic
    transactions. Initial public offerings by Netscape, Amazon, and EBay had tremendous success and almost every one started implementing business on internet.



  • amazonnetscape logo

EvOluTion...

The evolution and acceptance of Credit cards, Automated Teller Machines (ATM) and Telephone banking and later in 1990’s ERP (enterprise resource planning), data mining and warehousing are different types of e-commerce. Activities such as purchasing products over the world wide web which had secured links(HTTP) with e-shopping, carts, electronic payments such as Credit Cards authorization. Today it includes of a very extensive range of activities and methods, from e-banking to Offshore manufacturing to e-logistics. The increasing dependency of ecommerce gave momentum to the advancement and growth of supporting systems, backend systems, applications and middleware. Few examples are Broad-band, Fibre –optic networks, supply-chain management, client management software, client relationship management software and inventory control systems.

The swift growth of ecommerce is due to business ventures implementing the effective policies of ecommerce that embraces the following four crucial principles:

  • Security of logical assets - Tough copyright, exclusive rights and other forms of logical asset security are important solutions to reviving the information economy.
  • Online reliability, Safety and confidentiality - Advancement in ecommerce is basically due to Customers certainty in the protection, safety measures and confidentiality of information. Safeguarding data and links on the Internet is very important for the steady success of Internet and economy of information. Bias dealings and closed market slow downs the growth of e-business. The laws of information must reflect internet as a global medium. Internets potential will be recognised only in free, open markets.
  • Investing in an e-commerce technology infrastructure- Maintenance of the essential physical communications to deliver digital matter (primarily through telecommunications deregulation and government efforts to reduce the digital divide) is very important to encourage technological growth.

As a conlusion,the first business deal carried out on telephone or via a fax is mainly considered as first ecommerce transaction.Ecommerce spread to a significant group globally within a span of 4 years from 1996 to 2000. E-commerce technology continues to progress to change personal communication and global trading at an astonishing speed. This not only assures to bring a significant section of global population online but this also brings about major challenges to policymaker and business alike. By 2009 it is estimated that some 47 percent of Business to Business (B2B) commerce will be carried out online.

DISCUSS HOW E-COMMERCE CAN REDUCE CYCLE TIME , IMPROVE EMPLOYEES' EMPOWERMENT AND FACILITATE CUSTOMERS SUPPORT?  

Posted by Steven

REDUCING CYCLE TIME


An important aspect of business efficiency is the cycle time, defined as the total time that it takes to complete a recurring task—usually one essential to the business's output. An example in e-commerce field would be the time total spent by receiving an order from customer preparing invoices or receipts , preparing product (mostly in digital form) , delivering process and transaction. Task that may be repeated thousands or millions of times.


E-commerce allows people to carry out businesses without the barriers of time or distance for example Dell and FED-EX. It might be day or night , 24-hours a day , purchase or sell anything one desires at a single click of the mouse. e-commerce benefits consumers by providing them convenience, high speed , low cost, desired customization, personalization and communities. This would certainly reduce the time cycle process within .

E-commerce brings organization and customers closer . It benefits organizations by expanding the marketplace, creating a cost savings, improving business process and promoting interactivity. It also benefits society by improving the standard of living and delivery of public services.


IMPROVES EMPLOYEES' EMPOWERMENT



Empowerment is the process of enabling or authorizing an individual to think, behave, take action, and control work and decision making in autonomous ways. It is the state of feeling self-empowered to take control of one's own destiny.

The most important perspective employees’ empowerment in e-commerce is the ability to make decision for customers. By giving more flexibility to access information for example internet , intranet , EDI and other access to global regulations and latest informations employees are able to improve employees’ empowerment. The employees will have sufficient alertness of the complaints and are able to handle the complaints instantaneously and efficiently. Since then , employees will have no problem convincing customers to stay with the services provided.


FACILITATES CUSTOMERS SUPPORT

E-commerce also can facilitate customer support because it can provide unlimited shopping hours for customers to place their order as it is run on a 24 hours basis.E-commerce facilitates customer support by providing a wide range of technological solutions and communication opportunities . Retaining customers by satisfying their needs is the core of customer service. By enabling customers to find detailed information online, customer service can be greatly improved.

Apart from that , retaining customers by satisfying their needs is the objective in customer service for example managing customers feedback , complaints , recommendation is essential in enhancing customers support.

An example of an E-Commerce success and its causes  

Posted by ric86


Potential causes for DotCom failures
Many newly formed DotCom companies around the world failed as the online bubble began to burst in mid-2000. It was predicted that a high percentage of e-commerce start-ups or newly formed pure DotCom companies would fail.
The causes of failure can be separated to two main categories – controllable and uncontrollable causes – as shown in chart. Controllable causes can be further divided into strategic, operational and technical causes, while uncontrollable can be divided into technical and behavioral causes.


Controllable causes

The analyses involve managerial decisions regarding strategic, operational and technical issues, which were under direct control of decision makers.


Strategic causes
Strategic causes evolved from decision making that determined the objectives, resources, and policies of the organization:
1.Lack of business experience. Most wrong decisions were made because DotCom entrepreneurs lacked a clear understanding of business fundamentals in the areas of finance, marketing, distribution and inventory.
2.Poor business model. The absence of sound business strategies can lead to poor business models and the absence of declared business benefits. Many DotCom firms were offering free services, totally depending on advertisement revenue.
3.Free-spending pattern. One of the reasons behind the failure of many DotComs was a wrongly focused free-spending pattern to support or to initiate high growth. The companies tended to overspend on marketing and IT infrastructure in an attempt to grow quickly.
4.Coders as planners. During the DotCom boom, many business ideas came from coders (programmers) who were inexperienced in devising sound business plans, proper utilization of funds, business strategies and decisions.


Operational causes
1.Vulnerable financial structure (back-up funds). Although most DotCom start-ups raised funds through venture capital for initial operations, they struggled to bring additional capital from an increasing number of reluctant investors.
2.Managerial incompetence and misuse of funds. Many spent money on fancy offices, expensive travel, free food, wrong projects and even hired unqualified staff.
3.Poor customer support. Most DotComs, however, was mainly interested in getting customer orders, but overlooked the importance of after-sales interaction with the customers.
4.Inefficient promotion. Most online companies invested massively on promotion without the backing of sound market research and, thus, failed to use the most effective media to penetrate the target market for the company's products or services.
5.Slow delivery. Resulting dynamic changes posed by e-commerce, many DotCom companies were caught off guard and were too slow to respond to the changes.


Technical causes
1.Web design: slow loading. Having a Web page with JavaScripts, Flash or frames, pop-up advertisements and lots of graphics does not guarantee success. On the other hand, too many graphics and other bells and whistles may slow down the loading time of the page on a user's computer, and the user may become too impatient to stay with the Web site.
2.Down server. Web servers need to be up and running with minimal interruption. Long server down time is also responsible for many DotComs' failures because customers quickly lose their interest if the site is down quite frequently due to repair or improvement, and may not want to visit the site again.


Uncontrollable causes


Like conventional businesses, companies offering products on the Internet are also negatively affected by factors that are uncontrollable. Uncontrollable causes can be classified into two categories: behavioral and technical.

Behavioral causes
1.Over-expectation. Over-expectation is seen as one of the many factors behind many failed DotComs. Many firms did not have adequate planning when they entered into the market with a dream that the products they were offering were good enough to attract consumers. They expected too much too soon.
2.Weak reliability. Reliability and trust in commercial transactions on the Internet are required for the involved parties so much, which may make or break an e-commerce project. Customers need guarantees that the product quality, delivery time, and customer service will be reasonable, and the confidential information will not be misused.
3.Weak customer loyalty. A common belief associated with e-commerce is that a weak customer loyalty to brand names or particular sites will lead to few loyal customers. Online brands that have a very short history fell into the trap of improper advertisement and low quality. It takes some time to build customer loyalty, but very little to destroy it.
4.Mushroom growth. Many DotComs flooded the market with similar products or services and created intense competition among them. Since the online industry was in its infancy, the acute competition seriously reduced the survival chances for some companies.


Technical causes
Some technical issues, categorized as uncontrollable, negatively affected Internet start-ups. In the technical issues are including Internet security and lost transactions are discussed:

1.Internet security problems. “Most of us who have purchased items via the Internet have felt reluctant about the transaction at some point – usually when entering our credit card number”. Hackers are unauthorized people who access in any firm's database as valid users and perform actions intentionally to adversely affect the company's business.
2.Missed transactions. Another hurdle that DotComs faced was missed transactions, where customers created purchase orders. For example, due to problems such as connection drops, busy signals and other technical glitches, the transactions were not processed.


Conclusion
failure of DotComs may not be attributed to a single factor, but to a combination of factors. The findings demonstrate that lack of basic business knowledge, poor or non-existent business plans, ineffective promotion, inadequate back-end logistical support, failure to meet customer expectations, poor customer support, and dwindling investor faith in e-commerce are some of the critical reasons for DotCom failures. In some cases, investors were simply not comfortable in their continued support of DotComs when DotComs were not perceived as viable business opportunities.