Thanks to our teacher Mr. Bije for teaching us this subject MM-E5; I’ve learned many things about internet and online activities. I’m proud of you my teacher.
E-COMMERCE LAW AND SECURITY
Andreas Walther, Axel Ryding and Kasper Andersen lecturing on what is essential to known in relation to law and security when conducting e-commerce. The e-commerce law and security is discussing News, Trends, and Legal Issues Affecting Internet Businesses. They talk about encryption software. According to Wikipedia; Encryption software is software whose main task is encryption and decryption of data, usually in the form of files on (or sectors of) hard drives and removable media, email messages, or in the form of packets sent over computer networks. Encryption software executes an algorithm that is designed to encrypt computer data in such a way that it cannot be recovered without access to the key. Software encryption is a fundamental part of all aspects of modern computer communication and files protection and may include features like file shredding.
The purpose of encryption is to prevent third parties from recovering the original information. This is particularly important for sensitive data like credit card numbers.
According to Wikipedia, the free encyclopedia:
Electronic commerce, commonly known as e-commerce or e-comm, refers to the buying and selling of products or services over electronic systems such as the Internet and other computer networks. Electronic commerce draws on such technologies as electronic funds transfer, supply chain management, Internet marketing, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated data collection systems. Modern electronic commerce typically uses the World Wide Web at least at one point in the transaction’s life-cycle, although it may encompass a wider range of technologies such as e-mail, mobile devices and telephones as well.
- Electronic commerce is generally considered to be the sales aspect of e-business. It also consists of the exchange of data to facilitate the financing and payment aspects of business transactions.
E-commerce can be divided into:
- E-tailing or “virtual storefronts” on Web sites with online catalogs, sometimes gathered into a “virtual mall”
- The gathering and use of demographic data through Web contacts
- Electronic Data Interchange (EDI), the business-to-business exchange of data
- E-mail and fax and their use as media for reaching prospects and established customers (for example, with newsletters)
- Business-to-business buying and selling
- The security of business transactions
Originally, electronic commerce was identified as the facilitation of commercial transactions electronically, using technology such as Electronic Data Interchange (EDI) and Electronic Funds Transfer (EFT). These were both introduced in the late 1970s, allowing businesses to send commercial documents like purchase orders or invoices electronically. The growth and acceptance of credit cards, automated teller machines (ATM) and telephone banking in the 1980s were also forms of electronic commerce. Another form of e-commerce was the airline reservation system typified by Sabre in the USA and Travicom in the UK.
In 1990, Tim Berners-Lee invented the WorldWideWeb web browser and transformed an academic telecommunication network into a worldwide everyman everyday communication system called internet/www. Commercial enterprise on the Internet was strictly prohibited by NSF until 1995. Although the Internet became popular worldwide around 1994 with the adoption of Mosaic web browser, it took about five years to introduce security protocols (i.e. SSL encryption enabled on Netscape 1.0 Browser in late 1994) and DSL allowing continual connection to the Internet. By the end of 2000, many European and American business companies offered their services through the World Wide Web. Since then people began to associate a word “ecommerce” with the ability of purchasing various goods through the Internet using secure protocols and electronic payment services.
When you are not aware about these activities you will become a victim of cyber attack and can even damage you reputation as a man. Cyber attacks are deliberate attempts to alter, disrupt, or destroy computer systems or networks or the information’s or programs that they store or transmit. Criminal hackers have assembled vast armies of hijacked computers. Imagine a platoon of expert computer criminals using the internet to operate networks of hijacked computers. This army of computers, known as botnets (robot networks), unleashes a barrage of malicious computer codes targeting a specific nation. Within minutes, that nations military, financial, and commercial web sites crash. ATM’S and phone networks fail. Airplanes are grounded, and computer and safety systems at a nuclear power plant are disrupted. Why would anyone want to launch cyber attack? People launch cyber attacks for various reasons. Terrorists or governments, for instance, may try to infiltrate the computer networks of their enemies to steal secrets or to sabotage the equipment that those computer networks control. Computer criminals use similar methods to steal intellectual properties or financial information from corporate networks and personal computers. Criminals reportedly rake billions of dollars each year by means of fraudulent network transactions. Criminal hackers have assembled vast armies of hijacked computers to carry out their online attacks. In 2009, an internet security firm uncovered a criminal gang that remotely controlled a global network of nearly two million computers, many of them owned by private citizens. The Organization for Economic Cooperation and Development (OECD) recently estimated that 1 in 3 online computers are remotely controlled by an intruder. The hackers are sometimes called silent stalkers. A criminal transmits a malicious program over the internet. When the program finds your computer, it silently probes it online defenses. When it finds an unguarded door, it burrows deep into your computer and rummages around for useful information. The malicious program may then change or delete your computer files, e-mail itself to other computers, or send passwords, financial details, or other confidential information back to the intruder. Computer criminals can even trick you into infecting your computer yourself! How? You may infect your own computer by opening an innocent-looking e-mail attachment, clicking on a web page link, downloading and installing a free computer programs, plugging an infected memory device into your computer, or simply visiting a questionable web site. Each of these actions can install malicious software on your computer and bring it under the control of a remote intruder. How can you know if your computer has been infected? It can be very difficult to detect. Your computer or internet connection may seem very slow, your applications may not run, pop-up boxes may prompt you to install certain programs, or your computer may operate in an unusual way. If you note any of these symptoms, have a reputable technician to check your computer.
As nations and individuals become more reliant on computer technology, cyber attacks will likely become more common. Accordingly, many nations are scrambling to beef up their digital defenses, and some are conducting large scale exercises to test the resilience of their computer networks to attack. Given enough time, motivation and funding, a determined adversary will always – always be able to penetrate a targeted system. What is a computer worm? Computer worms are malicious programs that automatically copy themselves from computer to computer via the internet. Like other types of malicious software, computer worms are usually assigned individual names, such as Slammer. What can you do to protect yourself online? While complete online security may not be possible, you can take practical steps to make your computer more secure. Surely wise advice when you go online!
Hacking is an illegal activity and it is also a crime in the part of the one who does it. In the Philippines, nowadays, hacking is a very trending topic. This is because of the issues where Chinese as well as Filipino hackers attack each other’s websites especially those that are run and controlled by the government. As of the writing, there are websites that still are down due to these attacks. Even if this activity is illegal it is hard to determine who the hackers are.
One of the trending product nowadays is the program that is called the anti virus software. This is sellable product because almost all companies, government and any individual are using computers. All businesses and schools and even hospitals are using computers that are why the programmers generate great income by making programs that avoid your computers from the harmful viruses. At the same time also they are the one who makes the viruses. It’s just a matter of business only when there is an illness, there is cure. This business is good because it generates a good income but in the religious aspect this is not good.
Sad to say that some are making virus just to have money but, in the hard part of this is when it made only just for fun and experiment. I remember the late “I LOVE YOU VIRUS” that was just made for fun and experiment only and the maker is not selling any cure or remedy to stop the virus. As the technology became hi tech our problems are also arising, it is because of these incidents in the internet. Some people are victims of fraud and cyber bullying. The arising of these incidents is very alarming because it can damage the identity of anyone. The pornography also is one of the sources and sometimes cause of rape. That is why this criminal act must be stopped.
HOW TO PROTECT YOUR ONLINE SECURITY?
- Install antivirus, spyware-detection, and firewall software on your computer. Keep that software and your operating system updated with all security updates.
- Think before you click on links or open attachments in e-mails or instant messages – even from friends. Be especially cautious if the mail is unsolicited and asks for personal information or passwords.
- Never copy or run software from unknown sources.
- Use passwords that have at least eight characters and include numbers and symbols, and change them regularly. Use different passwords for different accounts.
- Do business online only with reputable companies that use secure connections.
- Do not give out confidential information about yourself or your accounts when using unsecured Wi-Fi connections, such as in public places.
- Switch your computer off when it is not in use.
- Regularly backup your files, and store copies securely.
BLUE OCEAN STRATEGY VS. 5 FORCES OF PORTERS
The blue ocean strategy is concentrating in the e-commerce area while in the porters 5 forces is in the real world. The blue ocean strategy makes its business commonly in service and we almost know that there are no physical products that we have hold. The 5 forces of porters gave us knowledge about the physical product that we want to avail. We have gathered together some relevant research findings on this popular debate in strategic management. Essentially both schools of thought feed off the same economic model. Their difference is what they think is happening out there in the real world. The proponents of competitive strategy, largely going back to Porter, take the view that competition is the main issue that senior business managers ought to be addressing. That is what they see as the main challenge facing organizations.
The proponents of the blue ocean strategy take the view that innovation should create new market space, tap into unsatisfied consumer demand, and find uncontested market space. In this way, competition can become quite irrelevant. Now blue ocean strategy has had a lot of enthusiasts and people like Starbucks and Dell have been cited as examples where you can get into territory that is uncontested and profitable.
So let me deal first of all with competitive strategy. If competitive strategy is right, then in the long term there should be a negative relationship between the number of firms in an industry and the profit levels; essentially that is the essence of the Five Forces. The more firms that you have in the competition, then the lower the profitability of the market. What we find is that in the long run is that profitability does indeed decline with competition, but it is actually quite a pedestrian force. Put differently it takes about fifteen years for an industry to push an innovation’s profits back down to a very basic level. What that means is that the profit gains from innovation, in an existing market, are quite a lot more than previously supposed. The implication of that is that companies should pay close attention to their existing markets when looking for opportunities for innovation. We found in relation to the retail sector that, as the number of firms has come into the market, the market has expanded. This tells you that these firms can’t just be fulfilling a competition role; they are fulfilling an entrepreneurial role in bringing innovation into the market, expanding the market in the process by drawing in more consumer expenditure. The results provide some partial support for blue ocean strategy, particularly in relation to the role of competition which we found not to be the strongest as previously imagined and of course the role of innovation. But right at the core of blue ocean strategy is the view that you should find new markets space and pioneer new markets. We have gathered together some relevant research findings on this popular debate in strategic management. Essentially both schools of thought feed off the same economic model. Their difference is what they think is happening out there in the real world. The proponents of competitive strategy, largely going back to Porter, take the view that competition is the main issue that senior business managers ought to be addressing. That is what they see as the main challenge facing organizations. A close look at this in practice provided some valuable results.
What I find is that in the long run is that profitability does indeed decline with competition, but it is actually quite a pedestrian force. Put differently it takes about fifteen years for an industry to push an innovation’s profits back down to a very basic level. What that means is that the profit gains from innovation, in an existing market, are quite a lot more than previously supposed. The implication of that is that companies should pay close attention to their existing markets when looking for opportunities for innovation. I found in relation to the retail sector that, as the number of firms has come into the market, the market has expanded. This tells you that these firms can’t just be fulfilling a competition role; they are fulfilling an entrepreneurial role in bringing innovation into the market, expanding the market in the process by drawing in more consumer expenditure. The results of the study about the blue ocean provide some partial support for blue ocean strategy, particularly in relation to the role of competition which we found not to be the strongest as previously imagined and of course the role of innovation. But right at the core of blue ocean strategy is the view that you should find new markets space and pioneer new markets.
In the world of business today we can say that blue ocean strategy and 5 forces of Porter is an effective tool for better business. If this strategies and analysis will be apply effective and efficient business will occur. In the part of the business that are engaging in the e-commerce and e-tailing it is better to apply the blue ocean strategy. But before you can apply the blue ocean strategy in your business I can say that 5 forces of Porter must apply first to know the effect of business in the outside world.
This illustration of FEC POS Manufacturing in their website www.fecpos.com this is the 5 competitive forces according to Porter.
Essay about the Facebook Era by Clara Shih:
The facebook era that was presented by Clara Shih shows that the innovation of technology is upgrading now days. The different websites such as facebook, twitter, multiply, and other social network shows the importance of communication in our family, friends, teachers, schoolmates, and other people. This is used also in many businesses and makes our job easier. In the facebook we can make friends to anyone as many as you can if you have an account. But before you make a facebook account, you need first to have a yahoo mail account. Then, you can now enjoy surfing the internet if you have these accounts. The facebook era gives the marketers opportunities to make the business easy and accessible in the market. By the use of facebook, electronic commerce, internet marketing, retail website, and other online businesses is formed. The electronic payments and transactions is also applied in many occasions especially when both of the respondents are far from each other. It is useful in many corporate meetings in large companies and has many branches in the market. All of the board members, agents, managers can attend the meeting only in the internet connection. Clara Shih explained in facebook era the use of technology and the effect of this technology to its user. Clara Shih is recognized author, blogger, and entrepreneur who pioneered the social business movement in 2007 when she first developed the first business application on facebook. Even though the internet is important nowadays there is also a negative effect of this. Some of the user in facebook will become a victim of cyber bullying and other bad images. The hackers of many account is also destroying the image of the owner of the account. Some big companies have a problem in the hackers because important information will be found out with the other people. The use of technology is important but we must limit ourselves in doing such things. We all know that this is useful and can generate income and profit. But, we must remember that overused of technology can give bad effect in our health. Not only in our health but also our image in the society and the effect of our values as human. The government must regulate all the user and owners of the website because some of them make an illegal business. The cyber sex which is prohibited because it makes the user act in pornography.
The innovation of the facebook and other social network is giving opportunities to all but also it gives threats to the company. Some problems were occur in making such account in the internet some criminals used the name of the other person to hide their identity. The making of facebook accounts is now becomes a business. Not only can the government make money out of tax that paid for them by the business owners the company gain also profits in their business. Many internet café and stores used the internet for the convenience of the service. The use of the internet make the service effective and efficient and mostly it gives less cost in the part of the service providers. Facebook is nothing more than a medium for communication, and yet, it is so much more than that. At a glance, a user can learn everything from what gender a facebook member is, to what religion they believe in, what school they attend, and their likes and dislikes, all with the click of a mouse. Facebook has become a phenomenon for the social networking set, and what makes that so amazing is that facebook did not even exist until 2004. Facebook have on today’s technologically advanced society. It allows people who probably never would have met each other in person to communicate, it creates new relationships and friendships, and it places distance between people who could communicate in person but instead choose to communicate online, instead. It is just another element of society that is interested in sharing the information with the intimacy of a close, personal relationship. Facebook on the surface is a socially acceptable networking site for college students and others to connect, share experiences, and meet old friends. It does say some disturbing things about how our society views privacy, personal information, and how our society is adjusting to the age of technology, and it brings into question what a generation of facebookers will deal with the challenges of the real world in person, like career, family, and success.
Facebook is kind of a fantasy land where people can make up anything they want to command attention, they can live an alternative life if they choose, and no one is the wiser. The fact that people accept these profiles at face value, and choose people as friends based on these profiles says a lot about our society. For all our worries about information and identity theft, people are still seemingly naive when it comes to sites like facebook, where they post intimate details with no thoughts to the consequences. As a facebook user you must be knowledgeable in what you have posted in your wall you must be responsible in all of your actions and activities in the internet. It’s true that facebook can bring people closer together. Perhaps by helping to reconnect people with close relatives who live across the country or even discovering old childhood friends. But it can also drag them further apart. Facebook gives people the chance to be mean without having to suffer the consequences. A possible scenario could be at school. Imagine you have an argument with your friend because you believe that she gossiped about you to other students. In the facebook you can make you r assignments, projects, and play all the games you like. The best in facebook is you can enjoy movies and games but most of all the information and the bonding to your friends and family. Facebook has no screening, someone can post something not of her belonging that is very private and have the whole world see it, or one may lash out at someone over a simple conversation and have it go downhill. But whether one is the bully or the victim, once it’s posted, it doesn’t go away. The overused of the internet can make problems especially in the young ones. Many students went to internet café for fun and not to study their lessons. It gives also negative images to the young ones who watched pornography and other bold films. The advantage for the young ones is the making of assignments, projects, ideas and information. For the music lovers they can watch live bands and guitar tabs and chords for the music. In the part of the farmers they can used also internet for the information needed for the plants and all agricultural products they needed. Information about pesticides and proper treatment if the problem occurs in the plants. For the teachers they can make lesson plans easier in the used of internet. Computations of grades can also be applied and they give their projects and assignments out of internet connections. The internet can give answers for almost all information that is needed by man. But the too much used of this technology it can give us problem also like the damage of our eyes and can cause also cancer for its radiation. The use of this technology is used all over the world and mostly 70% of the people are using this technology. Even in the church nowadays some priests are using this technology for celebrating a mass. The media also plays a big role in the internet; they can gain profits in the sense of information in advertising the products or services of one company. It is a good opportunity for the students especially in the enrollment and paying of tuition fees.
In the innovation of the technology many have benefited almost all people benefited from it. But the one who have benefited most are the marketers, it is because the income of the marketers nowadays is almost doubled since the internet invented. Their income was doubled simply because the customers can make an easy access to the service provider. The relationship of customers to its service providers is maintained by giving the exact information about the products. The customer and the service provider have win-win relationship to each other. The customers are sometimes demanding but the company can handle its demand by the use of the internet. Almost all people are using technology nowadays so it shows that the innovation of facebook and other social networks is very effective. Even in the cellular phone and small gadgets the internet is activated. You can use facebook even in the cellular phones. Even if there are no physical products they can show their products in video recordings and upload it to the internet. For the retail industry promotional products is highly used in the internet and also the proper positioning of the product to make it sellable to the market. For the business world electronic transactions is very important especially the use of electronic banking. For the hobbyist of any sports; outdoor and indoor sports they can get information easily on what sport they want to engage. Technology is useful thing but everything that is too much is not good to us even medicines do have right dosage to take it.