SlideShare una empresa de Scribd logo
1 de 70
E-Commerce Integration and
   Implementation Issues
 Khairiyah Salleh
 Nur’Aina Daud
 Nurul Izzah Othman
 Noor Yahya Sulaiman

                       Date:   19 May 2012
Introduction


Malaysian government believes that ICT is a strategic driver to support and contribute
directly to the growth of Malaysian economy. For the purpose of deploy resources to
develop knowledge base economy and to enter the digital age with more strategic way,
Malaysian government announced the plan called 8th Malaysian plan.

During the Malaysian plan some of the initiatives were deployed to build vital ICT
infrastructure for public sector as well as private sector. This plan has been focused to
increase the usage of computerization and IT infrastructure in many governmental agencies.

Malaysia would like to promote and facilitate the wider adoption and usage of ICT in
everyday life, such as E-Commerce, industry, education and health. The motive of this plan is
to shift from a knowledge base economy to a competitive knowledge based economy.
Commercial activities on the internet are rapidly increasing all over the world. E-Commerce
becomes a strong and easy way of rapid business.
Opportunities in
      Implementation E-Commerce
Opportunities
  To gain competitive advantages over other organization.
  Open up new distribution channel and increase sales.
  Support buy and sell product on Internet from any place to anywhere all
  over the world without traditional intermediaries. Example Amazon, E
  Bay.
  Process and transaction can be done rapidly at reasonable cost.
  Cost saving for the organization and their customer.
  E-Commerce appears to be generating a significant amount of new
  economic activities.
  Customer are able to choose and discriminate among alternative
  product and services.
CISCO (CISCO CONNECTION ONLINE)

  Full implementation online (24 hours a day, 7 days a week)
    Increase efficiencies in order taking.
    Reduced customer service calls
    Lower distribution cost of software upgrades.
Issue and Challenges of Global Implementation
       E-Commerce (Economic Factors)

Cost Justification
  High cost of implementation.
  Mistake due to the lack of experience inflate the cost.
  Justification of cost not on tangibles factors.
  Justification of cost always based on intangibles factors such as improved the
  customer service, increase the value f advertisement and gain competitive
  advantages.


Number of sellers and buyers.
  Number of people connected to the Internet.
  E-Commerce project are viable to the developed country which majority of
  resident have high income or salary.
Issue and Challenges of Global Implementation
       E-Commerce (Economic Factors)

Issue on Internet and Telecommunication Infrastructure
  Digital divide between the developed world and most developing countries.
  Accessibility to the Internet is still expensive.
  Global infrastructure of the web is unevenly developed.


Skill Shortage and lack of trained personal.
  The dynamism of the technology and emerging skill such as XML, ASP and PHP
  programming.
  Need to hire the additional foreign workers form abroad.
Issue and Challenges of Global Implementation
        E-Commerce (Technical Factors)

Security Issues
  Consumers are distrustful about the safety of information.
  Incident on unsophisticated hackers can steal information easily.
  Many company are not pay enough intention on security.
  Reduce the consumer confidence.
Reliability Issues.
  Network Infrastructure and application systems must be continuously upgraded,
  fine tuned and maintained regularly.
  Vulnerable of sites to denial of services attack.
  Vulnerable to the virus spread.
  Reduce the consumer confidence .
Issue and Challenges of Global Implementation
         E-Commerce (Social Factors)

Privacy and Security Issues
  Customer are reluctant to buy online, reluctant to disclose the confidential data
  such as home address, identification number and credit card number.
  Companies did not give guarantees on security of information.
Cultural Diversity.
  Ability of customization the interface for individual and group needs.
  Customization process is expensive.
  Translation of language from English into local languages.
Issue and Challenges of Global Implementation
         E-Commerce (Social Factors)

Lack of Trust Issues
  Customer trust is important such as friends recommendation, previous
  experience, or through transparent legislative infrastructure.
  Company also need to well established the “brand identity” of company.
Absence of “Touch and Feel” functions.
  Most of business working around on this limitation.
  Customer only buy a reasonable price on E-Commerce website.
  Customer did not buy a high price product online. Therefore, web site still in used
  for customer for conduct research on product and making comparison on price
  offered.
Issue and Challenges of Global Implementation
         E-Commerce (Legal Factors)

Protection of Intellectual Property Right Issues
  Digital media are compact, easily stored, easily to being replication, transmission
  and alteration.
  Internet was designed to be open and transmit information freely around the
  world.
  Different country have different attitudes towards intellectual property rights.
  New laws should be design and inadequate action should be impose to protect
  the original copyrighted contribution.
Taxation Issues.
  Collecting the Internet sales taxes are rather complicated.
  Different country or nation have different tax structure.
Issue and Challenges of Global Implementation
         E-Commerce (Legal Factors)

Product Sale that are restricted or illegal by another country
  Companies should more careful and fully obey the rules and laws of other
  country.
  Example such as selling the wine, weapons, restricted chemical items or online
  gambling.


Legal Validity of the Electronic Transaction.
  Traditional business are based on face to face meeting, paper documentation
  and “wet signature” as verifier.
  Electronic documents must be customize and should have the same legal validity
  standard as written signature.
Critical Success Factors for
                E-Commerce Implementation

Success factors have been used to identify information needs, to list and describe
elements critical to program and system success, and to help define and focus
management’s responsibilities and efforts.

Griffin and Kenneth [8] write “Success factors are the limited number of areas in
which results, if they are satisfactory, will ensure successful competitive
performance for the organization. They are the few key areas where things must go
right for the business to flourish. If results in these areas are not adequate, the
organization’s efforts for the period will be less than desired.”

According to Rockart [16], “the success factors are areas of activity that should
receive constant and careful attention from management. The current status of
performance in each area should be continually measured, and that information
should be made available.”
Critical Success Factors for
        E-Commerce Implementation

Policy factors.
Organization factors.
Human resources management factors.
Business factors.
Customer relationship management factors.
Technology factors.
Security factors.
Environment factors.
Critical Success Factors for E-Commerce Implementation
            (Approach of Using an E-Business)


Phase 1: Identify the business opportunity.
  Identify the kinds of technology and business partners


Phase 2: Select the technology infrastructure.
  A tool that can enable web applications would require network
  bandwidth, computer security, and applications to make electronic business
  a reality.


Phase 3: Implement the electronic business solution.
  This phase involves complex technology and organization issues. It is important to
  make sure that a solution is tightly integrated with other systems and operations.
  The implementation also needs to have the partners, customers, suppliers, and
  employees built into it.
Critical Success Factors for E-Commerce Implementation
    (Three Area That Affect the Implementation of E-Business
                        by Newton S, 1999)

1. Business Trends
         • Enterprise Collaboration
         • Customer Relationship Management (CRM)
         • Identifying Return on Investment
2. Organization Trends
         • Specialization
         • Skill Management
         • Process Visibility
         • The Learning Organization
3. Technological Trends
         • Managing Security and Standards.
               Enterprise Integration
         • Technology Convergence
Critical Success Factors for E-Commerce Implementation
  (Three Area That Affect the Implementation of E-Business
                       by Carton S, 2000)

Carton [3] claims that to make business-to-consumer electronic commerce
  successful, special attention must be paid to privacy and loyalty of
  customer; the organization should ensure the following:

• Build Trust - to build customer loyalty, an organization must first build
  trust. The organization should be open, honest, clear, and concise in
  terms of letting the customer know what it will do or will not do.

• Provide Added Value - The organization should provide added value, which
  actually makes the customer’s life more interesting.

• Give Customers a Choice - The organizations should make sure that the
  customers are given enough choices and are allowed to make decisions
  themselves.
Critical Success Factors for E-Commerce Implementation
    (Three Area That Affect the Implementation of E-Business
                            by Newton)


 Transaction Software -The transaction and payment software must
  perform correct calculations, especially with respect to taxes and
  shipping costs.

 Site Maintenance - The organizations should have enough trained
  programmers to maintain the web site.

 Security - Details regarding personal information and data regarding
  electronic money transactions must be highly secure.
Critical Success Factors for E-Commerce Implementation
  (Three Area That Affect the Implementation of E-Business
                          by Newton)

Chan and Swatman [5] studied the key factors involved in
implementation of business-to-business electronic commerce in BHP
(Broken Hill Proprietary Company Limited) Steel and present several
factors influencing its implementation.
1. Internal Factors
      Commitment
      Trading Partner Participation
      Pro-active Approach
      Business Value
      Training and Educational Program
2. External Factors
      Rapid Changes in Technology.
      Complexity and Compatibility of Technology and Process
Food-Dominos
Dommal Food Services Sdn Bhd
Florist-Blooming Florist Sdn Bhd
Online Shopping-Aidijuma Scarf
Entertainment-TGV
Flight Booking-AirAsia
      AirAsia Bhd
Online Banking- Maybank Bhd
Key e-Commerce Players in Malaysia



 Blooming.com.my, a florist delivery service, has already been engaged in e-
 Commerce activities since they first reached Malaysian shores in the mid
 1990’s for example.

 MPH, a popular Malaysian bookstore, has also been doing great on the e-
 Commerce front since 2004.

 Lelong.com.my, a Malaysian homegrown e-Bay, was established in 1999
 and for the first five years did not charge any fees for its services, instead
 relying on its own investments and advertisement sales to stay afloat.

 AirAsia, one of the most successful Malaysian e-Commerce examples
Appendix


           Source from: Malaysia
           Department of
           Statistics
Source from:
International Data
Corporation (IDC)
Source from:
Malaysia
Department of
Statistics
Source from:
Malaysia
Department
of Statistics
Opportunities of E-Commerce in
            Malaysia

Opportunities
  Development of information and communication technologies
     New technologies are providing easy and fast online transactions which are
     enhancing consumers to go online and take the advantages of E-Commerce.

   Geographical position
     The business are no longer in local but also in global areas.

   Foreign investment
      It helps in promoting business and introduces new technologies which are effecting
      on the growth of E-Commerce. Malaysia is enjoying fruitful foreign investment in the
      region.
Opportunities of E-Commerce in
      Malaysia (cont…)

 Stability of policy and regulatory
    Government is willing to develop and introduce E-Commerce with new
    technologies. There is continuity in policies, strategies implementation
    and strategies formulation which are enhancing the effectiveness of
    online trading.

 Government created institutions that help industries and people to adopt E-
 Commerce
   These organizations have also announced some plan and strategies to
   improve E-Commerce in Malaysia. Government bodies have announced
   and built ministry of multimedia and communication for the improvement
   of information and communication technologies, information technology
   infrastructure to create knowledge based economy. Government has built
   an organization for small businesses which called Small and Medium
   Industries Development Corporation (SMIDEC).
E-Commerce Implementation Issues
          in Malaysia


  Challenges
  1.   E-readiness
  2.   Cyber Crime
  3.   Security
  4.   Privacy
  5.   Legal issues
E-readiness


A country’s e-readiness is essentially a measure of its e-business
environment,       a collection of factors that indicate how amenable
market is to           Internet-based opportunities.        E-readiness is not
simply a matter of the number of computer servers, websites and mobile
phones in the country, but also things such as its citizen’s ability to utilise
technology skilfully, the transparency of its business and legal systems, and the
extent to which governments encourage the use of digital technologies.

Malaysia ranked 34th among 70 countries (Economist Intelligence Unit).

The lacks of understanding about new technologies are affecting E-Commerce.
The awareness and knowledge about information and communication
technologies are still in the formative phases. Some new technologies are still
new for buyers. As a result buyers are still reluctant to implement these
technologies.
Cyber Crime


Cyber crimes emerge as a threat to E-Commerce in
current scenario. The advancement of technological
capabilities and its usage for crimes like hacking
information of credit cards and other important
information became a major threat for online
businesses. The hacker could hack the credit card
details and users hindered to give this kind of
information.
Articles on Cyber Crime in Malaysia
Articles on Cyber Crime in Malaysia
Security Issues


Security is one of the most addressed issues in implementing e-
commerce whether it is safe to conduct on-line transactions
As business move towards adapting on-line trading, issues of on-
line transaction security become more important.
The major threats to business are information losses, theft of
data, infection with a computer virus, and manipulation of their
internal systems or software applications.
Based on survey on Malaysian companies’ interest in e-business,
70 % believed that security was the most important barrier to
ecommerce development.
Types of Attack


Non Technical                    Technical
   Attack                         Attack

  Deception or persuasion to       An attack perpetrated
  trick people into revealing    using software and system
     sensitive information               knowledge




  Social engineering is a type
  of non technical attack that   Denial of service attack,
   uses some trick users into    Malicious Code: Viruses,
      revealing sensitive        Worms, and Trojan Horse
          information
Identity Theft


Identity theft is possible with the help of digital information
technologies (Caeton, 2007) and by the nature of modern payment
systems.
Identity theft involves acquiring enough data about another
individual to counterfeit this link, enabling the thief to acquire
goods while attributing the charge to another person’s account
(Anderson et al, 2008).
In addition, identity theft is the taking of a victim’s identity to obtain
credit or credit cards from banks and retailers, steal money from the
victim’s existing accounts, apply for loans, establish accounts with
utility companies, rent an apartment, file bankruptcy, or obtain a
job using the victim’s name (identity theft, 2010). In short, identity
theft occurs when someone appropriates your personal information
without your knowledge to establish a parallel identity.
Identity Theft in Malaysia
Virus, Worm, and Trojan Horse

Referred to as malware , it is classified by how it
propagates.
A virus is a piece of software code that inserts itself into a
host, including operating system. In order to propagate, its
requires its host program be run to activate it.
Worm is a software program that runs independently,
consuming resources of its host and able to propagate a
complete working version itself.
Trojan horse is a program that appears to have useful
function but it contains a hidden function that presents a
security risk.
Denial of Sevice


An attack on a website in which attacker uses
specialized software to send a flood of data packets
to target computer with the aim of overloading its
resources.
Security Attack in Malaysia
Privacy Issues


Privacy is the right to be left alone and the right to be
free of unreasonable personal intrusion.
There are a number of opportunities to collect
information about individuals
Ways of Gathering Information of An
            Individual

  Reading an individual’s blogs, or newsgroup postings.
  Looking up in an individual’s name and identity in internet.
  Reading an individual’s email, IM or text massages.
  Monitoring and conducting observation on employees.
  Wiretapping wire-line and wireless communication lines.
  Complete registration form online.
  Record individual’s action using cookies as they navigate
  the website.
  Using spy ware, keystroke loggers, and similar methods.
Website Registration


A study by TNS and TTRUSTe (2004) user doubt to give personal
information to online businesses.
Among the 1068 participants, 71% dislike registering at websites
they visit, 15 % refuse to register at all while 43% do not trust
companies not to share their personal information.
All B2C, marketing Websites and social network ask visitor to fill
up registration form (ex: win a prize or some of item exchange).
The site may use it to improve customer service or sometimes
they may sell the information to other company.
Cookies


Website gather information about an individual by using
cookies.
Cookies enable sites to keep track of users without having
constantly ask the user to identify themselves.
Originally, cookies were designed to help with personalization
and market research. However cookies can invade an individual’s
privacy.
Cookies enable user’s information such as preferences, interests
and surfing patterns to be collected.
User can disable the cookies, but the problem is that the user
will have to keep reentering information or may be blocked from
viewing certain pages.
Spyware


Spyware is defined as unwanted software programs designed to
steal information or confidential information.
Spyware may enter the user’s computer as a virus or a result of
the user’s clicking an option in deceptive pop up window.
Spyware tracks user’s web surfing habit and scan computer hard
drives for sensitive files and send the result to hackers and
spammers.
Therefore, spyware is a violation of computer’s user privacy.
For example: Keystroke Logger run in the background of the
user’s computer and record every keystroke that user makes.
Hacker can steal the user’s password, account number, etc
Privacy Protection


There are several laws and regulations that governed
e-commerce activities.
Some countries have enacted comprehensive laws on
e-commerce while some others are still in the process
of enacting laws.
Some e-commerce laws were developed and
reviewed in order to keep up with the changes in
technology.
Privacy Protection In Malaysia
In Malaysia, the right of privacy is not as a fundamental right under
the Federal Constitution.
However, with the development of e-commerce a new law was
passed in January 2010 which is known as a Personal Data
Protection Act 2010 (PDPA).
 This Act seeks to regulate the processing of personal data of
individuals who involved in commercial transactions by data users.
It also protect to the individual’s personal data and safeguarding
the interests of the individual.
This Act defines the meaning of ‘personal data’ and ‘sensitive
personal data’.
It also outlines the data protection principles and the exemptions,
right of data subject including right to access personal data, to
correct it, to prevent its processing for unlawful purposes and what
amount to criminal offences under the Act.
                                                      (Mohamed, 2011)
Legal Remedies for Invasion of
   Privacy in E-Commerce
In Malaysia, claim for remedies for cases of breach of online privacy are
forwarded to Financial Mediation Bureau (FMB) .
This FMB is an alternative to courts or arbitration which in charge of
settling disputes between individuals or corporations and the financial
services providers who are under the supervision of Bank Negara
Malaysia or ‘National bank’ and a member of the bureau.
It was reported that the FMB is handling 3000 cases in October 2011
since there are increasing numb
The protection on violation of personal privacy in Malaysia is limited to
informational privacy only.



                                                        (Mohamed, 2011)
Legal Issues

Domain Name
Jurisdiction
Advertisement
Electronic Payment
Domain Name

Domain Name
A company that commences e-commerce activities would at first
have to get its domain name registered. While registering domain
names, if the company chooses a domain name that is similar to
some domain name or some existing trademark of a third party, the
company could be held liable for cybersquatting.

Since registration of domain names is simple and inexpensive,
cybersquatters often register hundreds of such famous names as
their domain names such as www.sony.net andwww.petronas.net.

In Malaysia, cybersquatting issue is addressed by .my DOMAIN
REGISTRY’s Sensitive Name Dispute Resolution Policy (SNDRP) and
the complaints must be made according to the rule given by .my
Domain Registry.
Domain Name

The Complaint must:-

(i) provide the name, postal address, telephone and facsimile numbers and electronic-mail address of
    the Complainant and/or its authorised representative(s) in a separate document;

(ii) provide the name of the Registrant and any other relevant information (including the Registrant's
     postal address, telephone and facsimile numbers and electronic-mail address), which will be able to
     assist the Provider in sending the Complaint to the Registrant; and

(iii) specify the Domain Name which is complained of;

(iv) state the grounds on which it is made, specifically, as to why the Domain Name should be
     considered as being a Sensitive Name or otherwise falling within any one or more of the categories
     detailed in Paragraph 5 of the SNDRP;

(v) identify any legal proceedings which involve the Domain Name that may have been commenced or
    terminated by the Complainant; and

(vi) end the Complaint with the statement and the signature of the Complainant:-
Domain Name

    •In Sime Darby Berhad Malaysia v. Mr. Sim e-
     Darby (2002) over a domain name
     ‘simedarby.com’ by respondent in Canada,
     the matter went to WIPO Arbitration and
     Mediation Center, which heard in
     accordance with the Policy and Rules of the
     Uniform Domain Name Dispute Resolution
     Policy (UDRP).

    •The decision of Panel was to transfer the
     impugned domain name to the complainant,
     because, among other things, the domain
     name registered by the Respondent is
     identical or confusingly similar to the “Sime
     Darby” trade mark in which the Complainant
     has rights.
Domain Name

   •In a local case of Petroliam Nasional Bhd & Ors v Khoo Nee Kiong (2003)
    Malaysian court decided, among other things, that cyber squatting may be
    regarded as ‘passing off’. The first plaintiff in that case was a well-known
    national petroleum corporation. The second plaintiff was one of the
    marketing arms of the first plaintiff and the third plaintiff was in the business
    of processing and transmitting natural gas and it conducted its gas business
    under the trade name ‘Petronas Gas’. The defendant was an individual
    carrying out trading operations as a registered sole proprietor under the
    trade/business name ‘Araneum Consulting Services’ and was in no way
    associated with the plaintiffs.

    •It was held that by registering the said domain names which contained the
     word ‘Petronas’, there was a serious issue to be tried in that the defendant
     was making a false representation to persons who may have consulted the
     register that the registrant, ‘Araneum Consulting Services’ was connected or
     associated with the name registered and thus the owner of the goodwill in
     the name ‘Petronas’.

    •The court maintained that by registering the said domain names, the
     defendant had eroded the exclusive goodwill in the name ‘Petronas’ which
     had cause damage to the plaintiffs.
Jurisdiction


In addition to the nature of corporate structure, decisions will also have to be taken
with respect to the jurisdiction in which the corporate structure should be situated, as
it will determine the extent of any liability that may arise against the website.
According to the traditional rules of private international law, the jurisdiction of a
nation only extends to individuals who are within the country or to the transactions
and events that occur within the natural borders of the nation.

However, in e-commerce transactions, if a business derives customers from a
particular country as a result of their website, it may be required to defend any
litigation that may result in that country.

As a result, any content placed on a website should be reviewed for compliance with
the laws of any jurisdiction where an organisation wishes to market, promote or sell
its products or services as it may run the risk of being sued in any jurisdiction where
the goods are bought or where the services are availed of.
Jurisdiction



For example, XYZ, a company in London, having its server in USA, may sell
its products to customers in India or other countries. In such a situation, if
you receive defective goods or if you regret having made the purchase, the
question would arise as to which jurisdiction can you sue the company or
claim damages or withdrawal respectively. The company, on the other hand,
might find itself confronted with foreign laws, which he may not be aware
of.

For example, the US courts have in numerous cases have held a company in
X state
liable in Y state on the basis that the website could be accessed in Y state.
Jurisdiction
                Existing System                     New System

               Jurisdiction of dispute               Jurisdiction of dispute
                   Malaysian Court                    Local or foreign court?

                   Choice of law                         Choice of law
MALAYSIA            Malaysian Law                        foreign or local?
  LEGAL
 SYSTEM                                                     Evidence
                     Evidence Act
                                                      electronic document

                  REFJA (Reciprocal
                                                    REFJA is not enforceable in
               Enforcements of foreign
                                                   some major trading partners
                   Judgement Act)

           The nature of E-Commerce causes existing laws not able to cover the
                   resolution process especially in cross border issues
Advertisement


Advertisement
  Many websites advertise goods or services to customers. The traditional
  laws of advertising, which apply to ordinary sales, are enacted in the interest
  of all consumers to prevent deceptive and unfair acts or practices. These
  laws would also be applicable to advertising or marketing on the Internet.

   The websites may be subject to any liability that may arise due to false
   designations, origin, misleading description of fact that are likely to cause
   confusion or misrepresent the nature, characteristics, quality or geographic
   origin of the goods or services that are offered for sale in an
   advertisement. In addition to advertising laws, depending on the kind of
   business, the websites would also have to comply with the laws of
   applicable to such a business.
Advertisement


Advertisement
  An advertisement may be exposed to liability under the consumer
  protection laws since it may be subject to different interpretations by the
  consumer in different jurisdictions.

  Certain websites simply display advertisements or banners of other
  companies. In such a case, would the owner of the website be subject to
  liability for misleading or fraudulent advertisements that are displayed on its
  website?

  The website should contain appropriate disclaimers disclaiming any such
  liability. Most countries have stringent laws with respect to spamming.
  Website owners must ensure that they use legal methods of advertisements
  and that the method used does not amount to spamming.
Advertisement
Article on Advertisement Issues
Advertisement
Article on Advertisement Issues
Electronic Payment Issues


Electronic Payment
The instrumental growth in e-commerce activities has
necessitated the evolution of electronic payment mechanisms.
In addition to normal currencies, e-financial instruments / digital
currencies such as cyber cash and e-cash can be used for the
purchase of current as well as capital assets over the Internet
and for carrying on other commercial activities.

Before regulating the use of such financial instruments, it would
be essential to identify the issues that these instruments pose.
Electronic Payment


a. Secure Credit Card Transactions:
   An e-commerce website that accepts online credit card
   payments must ensure that it has adequate security measures to
   safeguard confidential customer data that is provided on the
   site. In the event that credit card numbers are leaked on the
   Internet, the website could be held liable for damages caused to
   the consumers.
Electronic Payment


b. Recognition of digital currencies:
   To be effective, existing laws would need to recognise the payment of
   digital currencies, as enforceable consideration against obligations
   undertaken by the other parties. Further, the extent to which these digital
   currencies are “valid tender” would also need to be examined.

c. Determining the relevant jurisdiction:
    This would mean determining the relevant law that parties will be governed
    by in respect of electronic transactions (whether by the contract, or in its
    absence, by general principles of law). This may create problems, especially
    when the laws in Country A, where the company is registered permit
    electronic payment contracts, whereas the laws in Country B, where the
    consumer is located, do not regulate electronic payment contracts.
Electronic Payment


d. Risk of Regulatory Change:
   The regulatory environment for electronic payment is likely
   to change with technological innovations in modes of
   payment. Therefore, any form of legislation made in this
   regard should be technologically neutral.

e. Transaction risks:
   These include the liability for security failures in the system
   of transaction and the relevant standard of care for system
   security.
Electronic Payment

f. Consumer-
   oriented risks:
   These include risks
   concerning
   privacy, consumer
   protection, money
   laundering, tax
   avoidance, online
   fraud and crime.
Thank You

Más contenido relacionado

La actualidad más candente (20)

Chapter 1 (e business)
Chapter 1 (e business)Chapter 1 (e business)
Chapter 1 (e business)
 
Electronic Payment Systems in E Commerce
Electronic Payment Systems in E CommerceElectronic Payment Systems in E Commerce
Electronic Payment Systems in E Commerce
 
e-commerce
e-commercee-commerce
e-commerce
 
E business
E businessE business
E business
 
Role of IT in Banking
Role of IT in BankingRole of IT in Banking
Role of IT in Banking
 
Computer applications in buiseness
Computer applications in buisenessComputer applications in buiseness
Computer applications in buiseness
 
Types of e commerce
Types of e commerceTypes of e commerce
Types of e commerce
 
E commerce in India literature review
E commerce in India literature reviewE commerce in India literature review
E commerce in India literature review
 
E-Commerce
E-CommerceE-Commerce
E-Commerce
 
E tailing
E tailingE tailing
E tailing
 
INTRODUCTION TO ECOMMERCE
INTRODUCTION TO ECOMMERCE   INTRODUCTION TO ECOMMERCE
INTRODUCTION TO ECOMMERCE
 
Information Technology In Business
Information Technology In BusinessInformation Technology In Business
Information Technology In Business
 
E -COMMERCE
E -COMMERCEE -COMMERCE
E -COMMERCE
 
E Payment Methods
E Payment MethodsE Payment Methods
E Payment Methods
 
E business- EDI
E business- EDIE business- EDI
E business- EDI
 
An introduction to E-Commerce
An introduction to E-CommerceAn introduction to E-Commerce
An introduction to E-Commerce
 
E-Commerce Security
E-Commerce SecurityE-Commerce Security
E-Commerce Security
 
Role of Information Technology in Business
Role of Information Technology in BusinessRole of Information Technology in Business
Role of Information Technology in Business
 
Transaction processing system
Transaction processing systemTransaction processing system
Transaction processing system
 
E commerce ppt
E commerce pptE commerce ppt
E commerce ppt
 

Similar a E-Commerce Integration and Implementation Issues

E-commerce for Small and Medium Enterprises (SMEs)
E-commerce for Small and Medium Enterprises (SMEs)E-commerce for Small and Medium Enterprises (SMEs)
E-commerce for Small and Medium Enterprises (SMEs)Unilog Corp
 
1. introduction e business management
1. introduction e business management1. introduction e business management
1. introduction e business managementJitendra Tomar
 
E-Commerce SME
E-Commerce SMEE-Commerce SME
E-Commerce SMEvEmployee
 
An analysis study on Impact of e-business on different industry sectors
An analysis study on Impact of e-business on different industry sectorsAn analysis study on Impact of e-business on different industry sectors
An analysis study on Impact of e-business on different industry sectorsRohit Bhabal
 
Sangeeta Singh BCA E-commerce Project
Sangeeta Singh BCA E-commerce ProjectSangeeta Singh BCA E-commerce Project
Sangeeta Singh BCA E-commerce Projectdezyneecole
 
E Business Introduction
E Business IntroductionE Business Introduction
E Business IntroductionMrirfan
 
Governance a central component of successful digital transformation - capg...
Governance    a central component of successful digital transformation - capg...Governance    a central component of successful digital transformation - capg...
Governance a central component of successful digital transformation - capg...Rick Bouter
 
Online Start up Seminar
Online Start up SeminarOnline Start up Seminar
Online Start up Seminarguestdd8496
 
Information System is a Competitive Weapon
Information System is a Competitive WeaponInformation System is a Competitive Weapon
Information System is a Competitive WeaponHumaidMustafaAlvi1
 
Divya E-commerce project
Divya E-commerce project Divya E-commerce project
Divya E-commerce project dezyneecole
 
Governance: a central component of successful digital transformation
Governance:  a central component of successful digital transformationGovernance:  a central component of successful digital transformation
Governance: a central component of successful digital transformationPaula Calvo Lopez
 
Using IT in as a Component of BUSINESS STRATEGY
Using IT in as a Component of  BUSINESS   STRATEGYUsing IT in as a Component of  BUSINESS   STRATEGY
Using IT in as a Component of BUSINESS STRATEGYKUNWAR THAKUR
 
Himanshu Sharma E-commerce project
Himanshu Sharma E-commerce projectHimanshu Sharma E-commerce project
Himanshu Sharma E-commerce projectdezyneecole
 
Dhannraj Nath E-commerce project
Dhannraj Nath E-commerce projectDhannraj Nath E-commerce project
Dhannraj Nath E-commerce projectdezyneecole
 
Digital Economy
Digital EconomyDigital Economy
Digital EconomyPIREH
 
Chirag Janani E-commerce Project
Chirag Janani E-commerce ProjectChirag Janani E-commerce Project
Chirag Janani E-commerce Projectdezyneecole
 

Similar a E-Commerce Integration and Implementation Issues (20)

E-commerce for Small and Medium Enterprises (SMEs)
E-commerce for Small and Medium Enterprises (SMEs)E-commerce for Small and Medium Enterprises (SMEs)
E-commerce for Small and Medium Enterprises (SMEs)
 
1. introduction e business management
1. introduction e business management1. introduction e business management
1. introduction e business management
 
E-Commerce SME
E-Commerce SMEE-Commerce SME
E-Commerce SME
 
An analysis study on Impact of e-business on different industry sectors
An analysis study on Impact of e-business on different industry sectorsAn analysis study on Impact of e-business on different industry sectors
An analysis study on Impact of e-business on different industry sectors
 
Sangeeta Singh BCA E-commerce Project
Sangeeta Singh BCA E-commerce ProjectSangeeta Singh BCA E-commerce Project
Sangeeta Singh BCA E-commerce Project
 
E Business Introduction
E Business IntroductionE Business Introduction
E Business Introduction
 
Governance a central component of successful digital transformation - capg...
Governance    a central component of successful digital transformation - capg...Governance    a central component of successful digital transformation - capg...
Governance a central component of successful digital transformation - capg...
 
Online Start up Seminar
Online Start up SeminarOnline Start up Seminar
Online Start up Seminar
 
Online Startup
Online StartupOnline Startup
Online Startup
 
Information System is a Competitive Weapon
Information System is a Competitive WeaponInformation System is a Competitive Weapon
Information System is a Competitive Weapon
 
Divya E-commerce project
Divya E-commerce project Divya E-commerce project
Divya E-commerce project
 
Essay It
Essay ItEssay It
Essay It
 
Governance: a central component of successful digital transformation
Governance:  a central component of successful digital transformationGovernance:  a central component of successful digital transformation
Governance: a central component of successful digital transformation
 
Using IT in as a Component of BUSINESS STRATEGY
Using IT in as a Component of  BUSINESS   STRATEGYUsing IT in as a Component of  BUSINESS   STRATEGY
Using IT in as a Component of BUSINESS STRATEGY
 
Himanshu Sharma E-commerce project
Himanshu Sharma E-commerce projectHimanshu Sharma E-commerce project
Himanshu Sharma E-commerce project
 
Dhannraj Nath E-commerce project
Dhannraj Nath E-commerce projectDhannraj Nath E-commerce project
Dhannraj Nath E-commerce project
 
Digital Economy
Digital EconomyDigital Economy
Digital Economy
 
Chirag Janani E-commerce Project
Chirag Janani E-commerce ProjectChirag Janani E-commerce Project
Chirag Janani E-commerce Project
 
Business values
Business valuesBusiness values
Business values
 
E commerce presentation
E commerce presentationE commerce presentation
E commerce presentation
 

Último

Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 

Último (20)

Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 

E-Commerce Integration and Implementation Issues

  • 1. E-Commerce Integration and Implementation Issues Khairiyah Salleh Nur’Aina Daud Nurul Izzah Othman Noor Yahya Sulaiman Date: 19 May 2012
  • 2. Introduction Malaysian government believes that ICT is a strategic driver to support and contribute directly to the growth of Malaysian economy. For the purpose of deploy resources to develop knowledge base economy and to enter the digital age with more strategic way, Malaysian government announced the plan called 8th Malaysian plan. During the Malaysian plan some of the initiatives were deployed to build vital ICT infrastructure for public sector as well as private sector. This plan has been focused to increase the usage of computerization and IT infrastructure in many governmental agencies. Malaysia would like to promote and facilitate the wider adoption and usage of ICT in everyday life, such as E-Commerce, industry, education and health. The motive of this plan is to shift from a knowledge base economy to a competitive knowledge based economy. Commercial activities on the internet are rapidly increasing all over the world. E-Commerce becomes a strong and easy way of rapid business.
  • 3. Opportunities in Implementation E-Commerce Opportunities To gain competitive advantages over other organization. Open up new distribution channel and increase sales. Support buy and sell product on Internet from any place to anywhere all over the world without traditional intermediaries. Example Amazon, E Bay. Process and transaction can be done rapidly at reasonable cost. Cost saving for the organization and their customer. E-Commerce appears to be generating a significant amount of new economic activities. Customer are able to choose and discriminate among alternative product and services.
  • 4. CISCO (CISCO CONNECTION ONLINE) Full implementation online (24 hours a day, 7 days a week) Increase efficiencies in order taking. Reduced customer service calls Lower distribution cost of software upgrades.
  • 5. Issue and Challenges of Global Implementation E-Commerce (Economic Factors) Cost Justification High cost of implementation. Mistake due to the lack of experience inflate the cost. Justification of cost not on tangibles factors. Justification of cost always based on intangibles factors such as improved the customer service, increase the value f advertisement and gain competitive advantages. Number of sellers and buyers. Number of people connected to the Internet. E-Commerce project are viable to the developed country which majority of resident have high income or salary.
  • 6. Issue and Challenges of Global Implementation E-Commerce (Economic Factors) Issue on Internet and Telecommunication Infrastructure Digital divide between the developed world and most developing countries. Accessibility to the Internet is still expensive. Global infrastructure of the web is unevenly developed. Skill Shortage and lack of trained personal. The dynamism of the technology and emerging skill such as XML, ASP and PHP programming. Need to hire the additional foreign workers form abroad.
  • 7. Issue and Challenges of Global Implementation E-Commerce (Technical Factors) Security Issues Consumers are distrustful about the safety of information. Incident on unsophisticated hackers can steal information easily. Many company are not pay enough intention on security. Reduce the consumer confidence. Reliability Issues. Network Infrastructure and application systems must be continuously upgraded, fine tuned and maintained regularly. Vulnerable of sites to denial of services attack. Vulnerable to the virus spread. Reduce the consumer confidence .
  • 8. Issue and Challenges of Global Implementation E-Commerce (Social Factors) Privacy and Security Issues Customer are reluctant to buy online, reluctant to disclose the confidential data such as home address, identification number and credit card number. Companies did not give guarantees on security of information. Cultural Diversity. Ability of customization the interface for individual and group needs. Customization process is expensive. Translation of language from English into local languages.
  • 9. Issue and Challenges of Global Implementation E-Commerce (Social Factors) Lack of Trust Issues Customer trust is important such as friends recommendation, previous experience, or through transparent legislative infrastructure. Company also need to well established the “brand identity” of company. Absence of “Touch and Feel” functions. Most of business working around on this limitation. Customer only buy a reasonable price on E-Commerce website. Customer did not buy a high price product online. Therefore, web site still in used for customer for conduct research on product and making comparison on price offered.
  • 10. Issue and Challenges of Global Implementation E-Commerce (Legal Factors) Protection of Intellectual Property Right Issues Digital media are compact, easily stored, easily to being replication, transmission and alteration. Internet was designed to be open and transmit information freely around the world. Different country have different attitudes towards intellectual property rights. New laws should be design and inadequate action should be impose to protect the original copyrighted contribution. Taxation Issues. Collecting the Internet sales taxes are rather complicated. Different country or nation have different tax structure.
  • 11. Issue and Challenges of Global Implementation E-Commerce (Legal Factors) Product Sale that are restricted or illegal by another country Companies should more careful and fully obey the rules and laws of other country. Example such as selling the wine, weapons, restricted chemical items or online gambling. Legal Validity of the Electronic Transaction. Traditional business are based on face to face meeting, paper documentation and “wet signature” as verifier. Electronic documents must be customize and should have the same legal validity standard as written signature.
  • 12. Critical Success Factors for E-Commerce Implementation Success factors have been used to identify information needs, to list and describe elements critical to program and system success, and to help define and focus management’s responsibilities and efforts. Griffin and Kenneth [8] write “Success factors are the limited number of areas in which results, if they are satisfactory, will ensure successful competitive performance for the organization. They are the few key areas where things must go right for the business to flourish. If results in these areas are not adequate, the organization’s efforts for the period will be less than desired.” According to Rockart [16], “the success factors are areas of activity that should receive constant and careful attention from management. The current status of performance in each area should be continually measured, and that information should be made available.”
  • 13. Critical Success Factors for E-Commerce Implementation Policy factors. Organization factors. Human resources management factors. Business factors. Customer relationship management factors. Technology factors. Security factors. Environment factors.
  • 14. Critical Success Factors for E-Commerce Implementation (Approach of Using an E-Business) Phase 1: Identify the business opportunity. Identify the kinds of technology and business partners Phase 2: Select the technology infrastructure. A tool that can enable web applications would require network bandwidth, computer security, and applications to make electronic business a reality. Phase 3: Implement the electronic business solution. This phase involves complex technology and organization issues. It is important to make sure that a solution is tightly integrated with other systems and operations. The implementation also needs to have the partners, customers, suppliers, and employees built into it.
  • 15. Critical Success Factors for E-Commerce Implementation (Three Area That Affect the Implementation of E-Business by Newton S, 1999) 1. Business Trends • Enterprise Collaboration • Customer Relationship Management (CRM) • Identifying Return on Investment 2. Organization Trends • Specialization • Skill Management • Process Visibility • The Learning Organization 3. Technological Trends • Managing Security and Standards. Enterprise Integration • Technology Convergence
  • 16. Critical Success Factors for E-Commerce Implementation (Three Area That Affect the Implementation of E-Business by Carton S, 2000) Carton [3] claims that to make business-to-consumer electronic commerce successful, special attention must be paid to privacy and loyalty of customer; the organization should ensure the following: • Build Trust - to build customer loyalty, an organization must first build trust. The organization should be open, honest, clear, and concise in terms of letting the customer know what it will do or will not do. • Provide Added Value - The organization should provide added value, which actually makes the customer’s life more interesting. • Give Customers a Choice - The organizations should make sure that the customers are given enough choices and are allowed to make decisions themselves.
  • 17. Critical Success Factors for E-Commerce Implementation (Three Area That Affect the Implementation of E-Business by Newton)  Transaction Software -The transaction and payment software must perform correct calculations, especially with respect to taxes and shipping costs.  Site Maintenance - The organizations should have enough trained programmers to maintain the web site.  Security - Details regarding personal information and data regarding electronic money transactions must be highly secure.
  • 18. Critical Success Factors for E-Commerce Implementation (Three Area That Affect the Implementation of E-Business by Newton) Chan and Swatman [5] studied the key factors involved in implementation of business-to-business electronic commerce in BHP (Broken Hill Proprietary Company Limited) Steel and present several factors influencing its implementation. 1. Internal Factors  Commitment  Trading Partner Participation  Pro-active Approach  Business Value  Training and Educational Program 2. External Factors  Rapid Changes in Technology.  Complexity and Compatibility of Technology and Process
  • 23. Flight Booking-AirAsia AirAsia Bhd
  • 25. Key e-Commerce Players in Malaysia Blooming.com.my, a florist delivery service, has already been engaged in e- Commerce activities since they first reached Malaysian shores in the mid 1990’s for example. MPH, a popular Malaysian bookstore, has also been doing great on the e- Commerce front since 2004. Lelong.com.my, a Malaysian homegrown e-Bay, was established in 1999 and for the first five years did not charge any fees for its services, instead relying on its own investments and advertisement sales to stay afloat. AirAsia, one of the most successful Malaysian e-Commerce examples
  • 26. Appendix Source from: Malaysia Department of Statistics
  • 30. Opportunities of E-Commerce in Malaysia Opportunities Development of information and communication technologies New technologies are providing easy and fast online transactions which are enhancing consumers to go online and take the advantages of E-Commerce. Geographical position The business are no longer in local but also in global areas. Foreign investment It helps in promoting business and introduces new technologies which are effecting on the growth of E-Commerce. Malaysia is enjoying fruitful foreign investment in the region.
  • 31. Opportunities of E-Commerce in Malaysia (cont…) Stability of policy and regulatory Government is willing to develop and introduce E-Commerce with new technologies. There is continuity in policies, strategies implementation and strategies formulation which are enhancing the effectiveness of online trading. Government created institutions that help industries and people to adopt E- Commerce These organizations have also announced some plan and strategies to improve E-Commerce in Malaysia. Government bodies have announced and built ministry of multimedia and communication for the improvement of information and communication technologies, information technology infrastructure to create knowledge based economy. Government has built an organization for small businesses which called Small and Medium Industries Development Corporation (SMIDEC).
  • 32. E-Commerce Implementation Issues in Malaysia Challenges 1. E-readiness 2. Cyber Crime 3. Security 4. Privacy 5. Legal issues
  • 33. E-readiness A country’s e-readiness is essentially a measure of its e-business environment, a collection of factors that indicate how amenable market is to Internet-based opportunities. E-readiness is not simply a matter of the number of computer servers, websites and mobile phones in the country, but also things such as its citizen’s ability to utilise technology skilfully, the transparency of its business and legal systems, and the extent to which governments encourage the use of digital technologies. Malaysia ranked 34th among 70 countries (Economist Intelligence Unit). The lacks of understanding about new technologies are affecting E-Commerce. The awareness and knowledge about information and communication technologies are still in the formative phases. Some new technologies are still new for buyers. As a result buyers are still reluctant to implement these technologies.
  • 34. Cyber Crime Cyber crimes emerge as a threat to E-Commerce in current scenario. The advancement of technological capabilities and its usage for crimes like hacking information of credit cards and other important information became a major threat for online businesses. The hacker could hack the credit card details and users hindered to give this kind of information.
  • 35. Articles on Cyber Crime in Malaysia
  • 36. Articles on Cyber Crime in Malaysia
  • 37. Security Issues Security is one of the most addressed issues in implementing e- commerce whether it is safe to conduct on-line transactions As business move towards adapting on-line trading, issues of on- line transaction security become more important. The major threats to business are information losses, theft of data, infection with a computer virus, and manipulation of their internal systems or software applications. Based on survey on Malaysian companies’ interest in e-business, 70 % believed that security was the most important barrier to ecommerce development.
  • 38. Types of Attack Non Technical Technical Attack Attack Deception or persuasion to An attack perpetrated trick people into revealing using software and system sensitive information knowledge Social engineering is a type of non technical attack that Denial of service attack, uses some trick users into Malicious Code: Viruses, revealing sensitive Worms, and Trojan Horse information
  • 39. Identity Theft Identity theft is possible with the help of digital information technologies (Caeton, 2007) and by the nature of modern payment systems. Identity theft involves acquiring enough data about another individual to counterfeit this link, enabling the thief to acquire goods while attributing the charge to another person’s account (Anderson et al, 2008). In addition, identity theft is the taking of a victim’s identity to obtain credit or credit cards from banks and retailers, steal money from the victim’s existing accounts, apply for loans, establish accounts with utility companies, rent an apartment, file bankruptcy, or obtain a job using the victim’s name (identity theft, 2010). In short, identity theft occurs when someone appropriates your personal information without your knowledge to establish a parallel identity.
  • 40. Identity Theft in Malaysia
  • 41. Virus, Worm, and Trojan Horse Referred to as malware , it is classified by how it propagates. A virus is a piece of software code that inserts itself into a host, including operating system. In order to propagate, its requires its host program be run to activate it. Worm is a software program that runs independently, consuming resources of its host and able to propagate a complete working version itself. Trojan horse is a program that appears to have useful function but it contains a hidden function that presents a security risk.
  • 42. Denial of Sevice An attack on a website in which attacker uses specialized software to send a flood of data packets to target computer with the aim of overloading its resources.
  • 43. Security Attack in Malaysia
  • 44. Privacy Issues Privacy is the right to be left alone and the right to be free of unreasonable personal intrusion. There are a number of opportunities to collect information about individuals
  • 45. Ways of Gathering Information of An Individual Reading an individual’s blogs, or newsgroup postings. Looking up in an individual’s name and identity in internet. Reading an individual’s email, IM or text massages. Monitoring and conducting observation on employees. Wiretapping wire-line and wireless communication lines. Complete registration form online. Record individual’s action using cookies as they navigate the website. Using spy ware, keystroke loggers, and similar methods.
  • 46. Website Registration A study by TNS and TTRUSTe (2004) user doubt to give personal information to online businesses. Among the 1068 participants, 71% dislike registering at websites they visit, 15 % refuse to register at all while 43% do not trust companies not to share their personal information. All B2C, marketing Websites and social network ask visitor to fill up registration form (ex: win a prize or some of item exchange). The site may use it to improve customer service or sometimes they may sell the information to other company.
  • 47. Cookies Website gather information about an individual by using cookies. Cookies enable sites to keep track of users without having constantly ask the user to identify themselves. Originally, cookies were designed to help with personalization and market research. However cookies can invade an individual’s privacy. Cookies enable user’s information such as preferences, interests and surfing patterns to be collected. User can disable the cookies, but the problem is that the user will have to keep reentering information or may be blocked from viewing certain pages.
  • 48. Spyware Spyware is defined as unwanted software programs designed to steal information or confidential information. Spyware may enter the user’s computer as a virus or a result of the user’s clicking an option in deceptive pop up window. Spyware tracks user’s web surfing habit and scan computer hard drives for sensitive files and send the result to hackers and spammers. Therefore, spyware is a violation of computer’s user privacy. For example: Keystroke Logger run in the background of the user’s computer and record every keystroke that user makes. Hacker can steal the user’s password, account number, etc
  • 49. Privacy Protection There are several laws and regulations that governed e-commerce activities. Some countries have enacted comprehensive laws on e-commerce while some others are still in the process of enacting laws. Some e-commerce laws were developed and reviewed in order to keep up with the changes in technology.
  • 50. Privacy Protection In Malaysia In Malaysia, the right of privacy is not as a fundamental right under the Federal Constitution. However, with the development of e-commerce a new law was passed in January 2010 which is known as a Personal Data Protection Act 2010 (PDPA). This Act seeks to regulate the processing of personal data of individuals who involved in commercial transactions by data users. It also protect to the individual’s personal data and safeguarding the interests of the individual. This Act defines the meaning of ‘personal data’ and ‘sensitive personal data’. It also outlines the data protection principles and the exemptions, right of data subject including right to access personal data, to correct it, to prevent its processing for unlawful purposes and what amount to criminal offences under the Act. (Mohamed, 2011)
  • 51. Legal Remedies for Invasion of Privacy in E-Commerce In Malaysia, claim for remedies for cases of breach of online privacy are forwarded to Financial Mediation Bureau (FMB) . This FMB is an alternative to courts or arbitration which in charge of settling disputes between individuals or corporations and the financial services providers who are under the supervision of Bank Negara Malaysia or ‘National bank’ and a member of the bureau. It was reported that the FMB is handling 3000 cases in October 2011 since there are increasing numb The protection on violation of personal privacy in Malaysia is limited to informational privacy only. (Mohamed, 2011)
  • 53. Domain Name Domain Name A company that commences e-commerce activities would at first have to get its domain name registered. While registering domain names, if the company chooses a domain name that is similar to some domain name or some existing trademark of a third party, the company could be held liable for cybersquatting. Since registration of domain names is simple and inexpensive, cybersquatters often register hundreds of such famous names as their domain names such as www.sony.net andwww.petronas.net. In Malaysia, cybersquatting issue is addressed by .my DOMAIN REGISTRY’s Sensitive Name Dispute Resolution Policy (SNDRP) and the complaints must be made according to the rule given by .my Domain Registry.
  • 54. Domain Name The Complaint must:- (i) provide the name, postal address, telephone and facsimile numbers and electronic-mail address of the Complainant and/or its authorised representative(s) in a separate document; (ii) provide the name of the Registrant and any other relevant information (including the Registrant's postal address, telephone and facsimile numbers and electronic-mail address), which will be able to assist the Provider in sending the Complaint to the Registrant; and (iii) specify the Domain Name which is complained of; (iv) state the grounds on which it is made, specifically, as to why the Domain Name should be considered as being a Sensitive Name or otherwise falling within any one or more of the categories detailed in Paragraph 5 of the SNDRP; (v) identify any legal proceedings which involve the Domain Name that may have been commenced or terminated by the Complainant; and (vi) end the Complaint with the statement and the signature of the Complainant:-
  • 55. Domain Name •In Sime Darby Berhad Malaysia v. Mr. Sim e- Darby (2002) over a domain name ‘simedarby.com’ by respondent in Canada, the matter went to WIPO Arbitration and Mediation Center, which heard in accordance with the Policy and Rules of the Uniform Domain Name Dispute Resolution Policy (UDRP). •The decision of Panel was to transfer the impugned domain name to the complainant, because, among other things, the domain name registered by the Respondent is identical or confusingly similar to the “Sime Darby” trade mark in which the Complainant has rights.
  • 56. Domain Name •In a local case of Petroliam Nasional Bhd & Ors v Khoo Nee Kiong (2003) Malaysian court decided, among other things, that cyber squatting may be regarded as ‘passing off’. The first plaintiff in that case was a well-known national petroleum corporation. The second plaintiff was one of the marketing arms of the first plaintiff and the third plaintiff was in the business of processing and transmitting natural gas and it conducted its gas business under the trade name ‘Petronas Gas’. The defendant was an individual carrying out trading operations as a registered sole proprietor under the trade/business name ‘Araneum Consulting Services’ and was in no way associated with the plaintiffs. •It was held that by registering the said domain names which contained the word ‘Petronas’, there was a serious issue to be tried in that the defendant was making a false representation to persons who may have consulted the register that the registrant, ‘Araneum Consulting Services’ was connected or associated with the name registered and thus the owner of the goodwill in the name ‘Petronas’. •The court maintained that by registering the said domain names, the defendant had eroded the exclusive goodwill in the name ‘Petronas’ which had cause damage to the plaintiffs.
  • 57. Jurisdiction In addition to the nature of corporate structure, decisions will also have to be taken with respect to the jurisdiction in which the corporate structure should be situated, as it will determine the extent of any liability that may arise against the website. According to the traditional rules of private international law, the jurisdiction of a nation only extends to individuals who are within the country or to the transactions and events that occur within the natural borders of the nation. However, in e-commerce transactions, if a business derives customers from a particular country as a result of their website, it may be required to defend any litigation that may result in that country. As a result, any content placed on a website should be reviewed for compliance with the laws of any jurisdiction where an organisation wishes to market, promote or sell its products or services as it may run the risk of being sued in any jurisdiction where the goods are bought or where the services are availed of.
  • 58. Jurisdiction For example, XYZ, a company in London, having its server in USA, may sell its products to customers in India or other countries. In such a situation, if you receive defective goods or if you regret having made the purchase, the question would arise as to which jurisdiction can you sue the company or claim damages or withdrawal respectively. The company, on the other hand, might find itself confronted with foreign laws, which he may not be aware of. For example, the US courts have in numerous cases have held a company in X state liable in Y state on the basis that the website could be accessed in Y state.
  • 59. Jurisdiction Existing System New System Jurisdiction of dispute Jurisdiction of dispute Malaysian Court Local or foreign court? Choice of law Choice of law MALAYSIA Malaysian Law foreign or local? LEGAL SYSTEM Evidence Evidence Act electronic document REFJA (Reciprocal REFJA is not enforceable in Enforcements of foreign some major trading partners Judgement Act) The nature of E-Commerce causes existing laws not able to cover the resolution process especially in cross border issues
  • 60. Advertisement Advertisement Many websites advertise goods or services to customers. The traditional laws of advertising, which apply to ordinary sales, are enacted in the interest of all consumers to prevent deceptive and unfair acts or practices. These laws would also be applicable to advertising or marketing on the Internet. The websites may be subject to any liability that may arise due to false designations, origin, misleading description of fact that are likely to cause confusion or misrepresent the nature, characteristics, quality or geographic origin of the goods or services that are offered for sale in an advertisement. In addition to advertising laws, depending on the kind of business, the websites would also have to comply with the laws of applicable to such a business.
  • 61. Advertisement Advertisement An advertisement may be exposed to liability under the consumer protection laws since it may be subject to different interpretations by the consumer in different jurisdictions. Certain websites simply display advertisements or banners of other companies. In such a case, would the owner of the website be subject to liability for misleading or fraudulent advertisements that are displayed on its website? The website should contain appropriate disclaimers disclaiming any such liability. Most countries have stringent laws with respect to spamming. Website owners must ensure that they use legal methods of advertisements and that the method used does not amount to spamming.
  • 64.
  • 65. Electronic Payment Issues Electronic Payment The instrumental growth in e-commerce activities has necessitated the evolution of electronic payment mechanisms. In addition to normal currencies, e-financial instruments / digital currencies such as cyber cash and e-cash can be used for the purchase of current as well as capital assets over the Internet and for carrying on other commercial activities. Before regulating the use of such financial instruments, it would be essential to identify the issues that these instruments pose.
  • 66. Electronic Payment a. Secure Credit Card Transactions: An e-commerce website that accepts online credit card payments must ensure that it has adequate security measures to safeguard confidential customer data that is provided on the site. In the event that credit card numbers are leaked on the Internet, the website could be held liable for damages caused to the consumers.
  • 67. Electronic Payment b. Recognition of digital currencies: To be effective, existing laws would need to recognise the payment of digital currencies, as enforceable consideration against obligations undertaken by the other parties. Further, the extent to which these digital currencies are “valid tender” would also need to be examined. c. Determining the relevant jurisdiction: This would mean determining the relevant law that parties will be governed by in respect of electronic transactions (whether by the contract, or in its absence, by general principles of law). This may create problems, especially when the laws in Country A, where the company is registered permit electronic payment contracts, whereas the laws in Country B, where the consumer is located, do not regulate electronic payment contracts.
  • 68. Electronic Payment d. Risk of Regulatory Change: The regulatory environment for electronic payment is likely to change with technological innovations in modes of payment. Therefore, any form of legislation made in this regard should be technologically neutral. e. Transaction risks: These include the liability for security failures in the system of transaction and the relevant standard of care for system security.
  • 69. Electronic Payment f. Consumer- oriented risks: These include risks concerning privacy, consumer protection, money laundering, tax avoidance, online fraud and crime.

Notas del editor

  1. There are many opportunities for E-Commerce to grow in Malaysia. The political willingness is boostingpolicies towards the selected goals. Development of information and communication technologies is alsopushing E-Commerce towards the attractive pace. New technologies are providing easy and fast onlinetransactions which are enhancing consumers to go online and take the advantages of E-Commerce. Geographicalposition also helps to promote businesses around the globe. It can boost E-Commerce in Malaysia. Foreigninvestment is the key opportunity for E-Commerce in Malaysia. It helps in promoting business and introducesnew technologies which are effecting on the growth of E-Commerce. Malaysia is enjoying fruitful foreigninvestment in the region. Stability of policies and regulatory reforms are also affecting on E-Commerce growth.Government is willing to develop and introduce E-Commerce with new technologies. This is the maindeterminants in the strength. Malaysia is enjoying political stability since independence. One party is still rulingover Malaysia from the independence. Due to one party government there is continuity in policies, strategiesimplementation and strategies formulation which are enhancing the effectiveness of online trading. Governmentstability and efforts are the key elements to create institutions. Malaysian government has created someinstitutions that help industries and people to adopt E-Commerce. These institutions have built up legalregulations, technological infrastructure and economic support to develop E-Commerce in the country. Theseorganizations have also announced some plan and strategies to improve E-Commerce in Malaysia. Governmentbodies have announced and built ministry of multimedia and communication for the improvement of informationand communication technologies, information technology infrastructure create knowledge based economy.Government has built an organization for small businesses which called Small and Medium IndustriesDevelopment Corporation (SMIDEC). SMIDEC is sole organization to enhance the capabilities of small andmedium enterprises (SME) and assist them to join the global competition in trading. Government announced 8thand 9thMalaysia plan to develop knowledge based economy. Government also announced multimedia supercorridor and some other schemes to develop businesses in Malaysia and get global attraction. Government isencouraging both public and private sector to contribute their efforts towards the growth of E-Commerce.Government also announced digital signature act to secure business transactions and create trust of consumers.
  2. Among Asian countries, Malaysia is behind Hong Kong (2nd in the World), Singapore (6th), South Korea (15th), Japan (18th) and Taiwan (19th) which are economically more superior than Malaysia. However, Malaysia is ahead of Thailand, India, Philippines, China, Sri Lanka, Pakistan, Vietnam and Indonesia. The digital divide between Malaysia and Singapore is too wide and there are still a lot of catchup to do.
  3. Cybersquatting is those practices including deliberate bad faith registration as domain name of well-known trademarks in the hope of being able to sell the domain to the owners of those marks (or rivals owners) or simply to take unfair advantage of the reputation attached to those names or marks. Thus it involves the use of domain name by a person with neither trademark registration nor any inherent rights to the name.Cybersquatters exploit the first-come, first-served nature of the domain name registration system to register names of trademarks, famous people, or businesses which they have no connection. Since registration of domain names is simple and inexpensive, cybersquatters often register hundreds of such famous names as their domain names such as www.sony.net andwww.petronas.net. Certainly, this kind of actions will incite those with legal rights on that names to bring a claim of trade mark infringement.Globally, this cybersquatting issue is addressed by an international arbitration processes administered by international agency such as ICANN and WIPO Arbitration and Mediation Center.But , in Malaysia, cybersquatting issue is addressed by .my DOMAIN REGISTRY’s Sensitive Name Dispute Resolution Policy (SNDRP) and the complaints must be made according to the rule given by .my Domain Registry.In Sime Darby Berhad Malaysia v. Mr. Sim e-Darby (2002) over a domain name ‘simedarby.com’ by respondent in Canada, the matter went to WIPO Arbitration and Mediation Center, which heard in accordance with the Policy and Rules ofthe Uniform Domain Name Dispute Resolution Policy (UDRP). The decision of Panel was to transfer the impugned domain name to the complainant, because, among other things, the domain name registered by the Respondent is identical or confusingly similar to the “Sime Darby” trade mark in which the Complainant has rights.This problem is equally supposed to have been settled in Malaysia. In a local case of Petroliam NasionalBhd & Ors v Khoo Nee Kiong (2003) Malaysian court decided, among other things, that cyber squatting may be regarded as ‘passing off’. The first plaintiff in that case was a well-known national petroleum corporation. The second plaintiff was one of the marketing arms of the first plaintiff and the third plaintiff was in the business of processing and transmitting natural gas and it conducted its gas business under the trade name ‘Petronas Gas’. The defendant was an individual carrying out trading operations as a registered sole proprietor under the trade/business name ‘Araneum Consulting Services’ and was in no way associated with the plaintiffs.It was held that by registering the said domain names which contained the word ‘Petronas’, there was a serious issue to be tried in that the defendant was making a false representation to persons who may have consulted the register that the registrant, ‘Araneum Consulting Services’ was connected or associated with the name registered and thus the owner of the goodwill in the name ‘Petronas’.The court maintained that by registering the said domain names, the defendant had eroded the exclusive goodwill in the name ‘Petronas’ which had cause damage to the plaintiffs. The said domain names were instruments of fraud and any realistic use of them as domain names would result in passing off. This would cause irreparable injury and damage to the plaintiffs and by virtue of this, the balance of convenience tilted in favour of the plaintiffs.In the circumstances, the plaintiffs had shown that there was a threat of passing off and trademark infringement on the defendant’s part which was likely to cause confusion in the minds of consumers of the plaintiffs’ products, thereby resulting in irreparable injury and damage to the plaintiffs’ trade, business and goodwill. Therefore, as the plaintiffs had provided an undertaking as to damages, the interim injunction sought for ought to be granted.
  4. Cybersquatting is those practices including deliberate bad faith registration as domain name of well-known trademarks in the hope of being able to sell the domain to the owners of those marks (or rivals owners) or simply to take unfair advantage of the reputation attached to those names or marks. Thus it involves the use of domain name by a person with neither trademark registration nor any inherent rights to the name.Cybersquatters exploit the first-come, first-served nature of the domain name registration system to register names of trademarks, famous people, or businesses which they have no connection. Since registration of domain names is simple and inexpensive, cybersquatters often register hundreds of such famous names as their domain names such as www.sony.net andwww.petronas.net. Certainly, this kind of actions will incite those with legal rights on that names to bring a claim of trade mark infringement.Globally, this cybersquatting issue is addressed by an international arbitration processes administered by international agency such as ICANN and WIPO Arbitration and Mediation Center.But , in Malaysia, cybersquatting issue is addressed by .my DOMAIN REGISTRY’s Sensitive Name Dispute Resolution Policy (SNDRP) and the complaints must be made according to the rule given by .my Domain Registry.In Sime Darby Berhad Malaysia v. Mr. Sim e-Darby (2002) over a domain name ‘simedarby.com’ by respondent in Canada, the matter went to WIPO Arbitration and Mediation Center, which heard in accordance with the Policy and Rules ofthe Uniform Domain Name Dispute Resolution Policy (UDRP). The decision of Panel was to transfer the impugned domain name to the complainant, because, among other things, the domain name registered by the Respondent is identical or confusingly similar to the “Sime Darby” trade mark in which the Complainant has rights.This problem is equally supposed to have been settled in Malaysia. In a local case of Petroliam NasionalBhd & Ors v Khoo Nee Kiong (2003) Malaysian court decided, among other things, that cyber squatting may be regarded as ‘passing off’. The first plaintiff in that case was a well-known national petroleum corporation. The second plaintiff was one of the marketing arms of the first plaintiff and the third plaintiff was in the business of processing and transmitting natural gas and it conducted its gas business under the trade name ‘Petronas Gas’. The defendant was an individual carrying out trading operations as a registered sole proprietor under the trade/business name ‘Araneum Consulting Services’ and was in no way associated with the plaintiffs.It was held that by registering the said domain names which contained the word ‘Petronas’, there was a serious issue to be tried in that the defendant was making a false representation to persons who may have consulted the register that the registrant, ‘Araneum Consulting Services’ was connected or associated with the name registered and thus the owner of the goodwill in the name ‘Petronas’.The court maintained that by registering the said domain names, the defendant had eroded the exclusive goodwill in the name ‘Petronas’ which had cause damage to the plaintiffs. The said domain names were instruments of fraud and any realistic use of them as domain names would result in passing off. This would cause irreparable injury and damage to the plaintiffs and by virtue of this, the balance of convenience tilted in favour of the plaintiffs.In the circumstances, the plaintiffs had shown that there was a threat of passing off and trademark infringement on the defendant’s part which was likely to cause confusion in the minds of consumers of the plaintiffs’ products, thereby resulting in irreparable injury and damage to the plaintiffs’ trade, business and goodwill. Therefore, as the plaintiffs had provided an undertaking as to damages, the interim injunction sought for ought to be granted.
  5. Cybersquatting is those practices including deliberate bad faith registration as domain name of well-known trademarks in the hope of being able to sell the domain to the owners of those marks (or rivals owners) or simply to take unfair advantage of the reputation attached to those names or marks. Thus it involves the use of domain name by a person with neither trademark registration nor any inherent rights to the name.Cybersquatters exploit the first-come, first-served nature of the domain name registration system to register names of trademarks, famous people, or businesses which they have no connection. Since registration of domain names is simple and inexpensive, cybersquatters often register hundreds of such famous names as their domain names such as www.sony.net andwww.petronas.net. Certainly, this kind of actions will incite those with legal rights on that names to bring a claim of trade mark infringement.Globally, this cybersquatting issue is addressed by an international arbitration processes administered by international agency such as ICANN and WIPO Arbitration and Mediation Center.But , in Malaysia, cybersquatting issue is addressed by .my DOMAIN REGISTRY’s Sensitive Name Dispute Resolution Policy (SNDRP) and the complaints must be made according to the rule given by .my Domain Registry.In Sime Darby Berhad Malaysia v. Mr. Sim e-Darby (2002) over a domain name ‘simedarby.com’ by respondent in Canada, the matter went to WIPO Arbitration and Mediation Center, which heard in accordance with the Policy and Rules ofthe Uniform Domain Name Dispute Resolution Policy (UDRP). The decision of Panel was to transfer the impugned domain name to the complainant, because, among other things, the domain name registered by the Respondent is identical or confusingly similar to the “Sime Darby” trade mark in which the Complainant has rights.This problem is equally supposed to have been settled in Malaysia. In a local case of Petroliam NasionalBhd & Ors v Khoo Nee Kiong (2003) Malaysian court decided, among other things, that cyber squatting may be regarded as ‘passing off’. The first plaintiff in that case was a well-known national petroleum corporation. The second plaintiff was one of the marketing arms of the first plaintiff and the third plaintiff was in the business of processing and transmitting natural gas and it conducted its gas business under the trade name ‘Petronas Gas’. The defendant was an individual carrying out trading operations as a registered sole proprietor under the trade/business name ‘Araneum Consulting Services’ and was in no way associated with the plaintiffs.It was held that by registering the said domain names which contained the word ‘Petronas’, there was a serious issue to be tried in that the defendant was making a false representation to persons who may have consulted the register that the registrant, ‘Araneum Consulting Services’ was connected or associated with the name registered and thus the owner of the goodwill in the name ‘Petronas’.The court maintained that by registering the said domain names, the defendant had eroded the exclusive goodwill in the name ‘Petronas’ which had cause damage to the plaintiffs. The said domain names were instruments of fraud and any realistic use of them as domain names would result in passing off. This would cause irreparable injury and damage to the plaintiffs and by virtue of this, the balance of convenience tilted in favour of the plaintiffs.In the circumstances, the plaintiffs had shown that there was a threat of passing off and trademark infringement on the defendant’s part which was likely to cause confusion in the minds of consumers of the plaintiffs’ products, thereby resulting in irreparable injury and damage to the plaintiffs’ trade, business and goodwill. Therefore, as the plaintiffs had provided an undertaking as to damages, the interim injunction sought for ought to be granted.
  6. Cybersquatting is those practices including deliberate bad faith registration as domain name of well-known trademarks in the hope of being able to sell the domain to the owners of those marks (or rivals owners) or simply to take unfair advantage of the reputation attached to those names or marks. Thus it involves the use of domain name by a person with neither trademark registration nor any inherent rights to the name.Cybersquatters exploit the first-come, first-served nature of the domain name registration system to register names of trademarks, famous people, or businesses which they have no connection. Since registration of domain names is simple and inexpensive, cybersquatters often register hundreds of such famous names as their domain names such as www.sony.net andwww.petronas.net. Certainly, this kind of actions will incite those with legal rights on that names to bring a claim of trade mark infringement.Globally, this cybersquatting issue is addressed by an international arbitration processes administered by international agency such as ICANN and WIPO Arbitration and Mediation Center.But , in Malaysia, cybersquatting issue is addressed by .my DOMAIN REGISTRY’s Sensitive Name Dispute Resolution Policy (SNDRP) and the complaints must be made according to the rule given by .my Domain Registry.In Sime Darby Berhad Malaysia v. Mr. Sim e-Darby (2002) over a domain name ‘simedarby.com’ by respondent in Canada, the matter went to WIPO Arbitration and Mediation Center, which heard in accordance with the Policy and Rules ofthe Uniform Domain Name Dispute Resolution Policy (UDRP). The decision of Panel was to transfer the impugned domain name to the complainant, because, among other things, the domain name registered by the Respondent is identical or confusingly similar to the “Sime Darby” trade mark in which the Complainant has rights.This problem is equally supposed to have been settled in Malaysia. In a local case of Petroliam NasionalBhd & Ors v Khoo Nee Kiong (2003) Malaysian court decided, among other things, that cyber squatting may be regarded as ‘passing off’. The first plaintiff in that case was a well-known national petroleum corporation. The second plaintiff was one of the marketing arms of the first plaintiff and the third plaintiff was in the business of processing and transmitting natural gas and it conducted its gas business under the trade name ‘Petronas Gas’. The defendant was an individual carrying out trading operations as a registered sole proprietor under the trade/business name ‘Araneum Consulting Services’ and was in no way associated with the plaintiffs.It was held that by registering the said domain names which contained the word ‘Petronas’, there was a serious issue to be tried in that the defendant was making a false representation to persons who may have consulted the register that the registrant, ‘Araneum Consulting Services’ was connected or associated with the name registered and thus the owner of the goodwill in the name ‘Petronas’.The court maintained that by registering the said domain names, the defendant had eroded the exclusive goodwill in the name ‘Petronas’ which had cause damage to the plaintiffs. The said domain names were instruments of fraud and any realistic use of them as domain names would result in passing off. This would cause irreparable injury and damage to the plaintiffs and by virtue of this, the balance of convenience tilted in favour of the plaintiffs.In the circumstances, the plaintiffs had shown that there was a threat of passing off and trademark infringement on the defendant’s part which was likely to cause confusion in the minds of consumers of the plaintiffs’ products, thereby resulting in irreparable injury and damage to the plaintiffs’ trade, business and goodwill. Therefore, as the plaintiffs had provided an undertaking as to damages, the interim injunction sought for ought to be granted.
  7. Against the host company, may be by way of a civil law suit, criminal prosecution or an action by regulators. The US courts have developed the “minimum contacts” theory whereby the courts may exercise personal jurisdiction over persons who have sufficient minimum contacts with the forum state.These "minimum contacts" may consist of physical presence, financial gain, stream of commerce, and election of the appropriate court via contract.Various courts have held that statements purposely directed at the forum may create sufficient contacts for jurisdiction.This would mean that even if you are not physically present in a nation, you can be sued in that foreign court as long as your website has minimum contacts with that nation. Therefore, a company should insert appropriate choice of law and choice of forum clauses in its online contract, which should specify the jurisdiction to which the parties to the contract would be subject to. Such clauses have been held by courts to be binding upon the parties
  8. As such, a single transaction may involve the laws of at least three jurisdictions:•the laws of the state/nation in which the user resides,•the laws of the state/nation that apply where the server hosting the transaction is located, and•the laws of the state/nation which apply to the person or business with whom the transaction takes place. So a user in one of the Malaysia conducting a transaction with another user in United States through a server in Canada could theoretically be subject to the laws of all three countries as they relate to the transaction at hand.
  9. Mudah.my:Term & Conditions of UseRESPONSIBILITIES OF THE USERThe User is personally responsible for his/her use of the Site and/or Services.The User uses the Site and/or the Services at his/her own risk.The User shall use the Services in accordance with any law at the time being in force in Malaysia.The User shall not list and/or advertise on the Site and/or advertise for sale on the Site any item which:-(a)infringes the intellectual property rights of any third party including copyright, patent, trade mark, trade name, designs, trade secret, confidential information, know-how, goodwill, rights of privacy or publicity or other proprietary rights or rights of publicity or privacy of any third party;(b)otherwise causes legally-recognized harm including but not limited to a product that contains a defamatory statement; or(c)violates, or is illegal under any applicable law, statute, ordinance or regulation.The User shall not provide and/or cause to be provided information which:-(a)is false, inaccurate or misleading;(b)involves the sale of counterfeit or stolen items, or any other fraudulent act;(c)infringes the intellectual property rights including copyright, patent, trade mark, trade name, designs, trade secret, confidential information, know-how, goodwill, rights of privacy or publicity of other any other third party;(d)violates or breaches any law;(e)is defamatory;(f)contains pornographic or obscene materials.(g)contains any computer viruses and/or other computer programming routines that may damage, detrimentally interfere with, surreptitiously intercept or expropriate any system, data or personal information;(h)creates liability for the Company or causes the Company to lose, in whole or in part, the services of its Internet Service Providers or other suppliers;(i)introduces, spreads or is intended to introduce and/or spread contents or propaganda of racist nature."Information" referred to hereinabove includes but is not limited to any information provided by the User to the Company or to other Users in any public message area (such as community forums, photo area and feedback area) or through email.The Company reserves the right to remove any items that it deems in violation of the above, at its sole discretion.The User shall comply with the Company's Advertising & Listing Rules and Procedures.The User is solely responsible for the accuracy of the said Information.
  10. JOHOR BAHRU: Seorangkakitanganswasta yang membelitigatelefonbimbitdenganharga RM3,250 secaradalamtalianterkejutapabilahanyamenerimalesungbatuberharga RM14.50, sehariselepasmelunaskanpembayaran.Lebihmenyakitkanhati, tulisan RM14.50 berkenaanmasihadapadalesungbatuberkenaandanmangsa, MohdHazirulHisham, 30, tergamamketikamenerimanya.“Sayamembuatpembelianituselepasmelayarisatulaman web dantertarikdengantawarantelefonbimbit Samsung Galaxy S bernilai RM1,100 seunitberbandinghargapasaransemasaiaitu RM1,900.“Sayamembelitigatelefonbimbitberkenaansecaratalianpada 6 Disemberlaludanmembuatbayarankeakaunseoranglelakibernama Lim Tham Kim,” katanya, semalam.MenurutHazirul, diakemudianmenerima SMS daripadakakitangansebuahsyarikatmenjualperalatankomunikasi yang menawarkanbaranganpercumaataudiskaun RM50.Hazirulmemilihtawarandiskaunberkenaandanseharikemudian, diamenerimabungkusanbarangandibeli.“Sayagembirakeranatelefonbimbitberkenaantibatepatpadamasanya, tetapiterkejutapabilamendapatikotakbungkusanberkenaancumamengandungilesungbatu.“Sayamenghubunginombortelefonterterasepertidalam SMS diterimaseharisebelumitu, tetapiindividuterbabitengganmenjawabpanggilansaya,” katanya.HazirulkemudianmelakukanpemeriksaandiSuruhanjaya Syarikat Malaysia (SSM) danmendapatisyarikatterbabittidakwujud.“Sayayakindenganpembelianmenerusidalamtaliankeranapernahmembeli beg tangandantidaktimbulmasalahsepertiini,” katanya yang membawaperkaraterbabitke Tribunal TuntutanPengguna Malaysia (TT PM).Sementaraitu, Presiden TTPM, Quaik Chong Yu menegaskanpenuntutperlumemfailkankeshanyaterhadapsatupihaksajakeranapastitimbulmasalahpadaperingkatpenguatkuasaanjikaperintahdikeluarkan.“Pihakpenuntutperlupilihsatupihakuntukfailkantuntutankeranainvoisdikeluarkansyarikatmanakalawangbayarandimasukkankeakaunperibadi Lim, merekaakansalingmenolak,” katanya.Hazirulbersetujumenggugurkantuntutankeatassyarikatberkenaandanmeneruskantuntutanterhadap Lim atasalasanlelakiitumenerimawangterbabit.Quaikmengarahkan Lim mengembalikan RM3,250 kepadaHaziruldalamtempoh 14 hariselepasperintahdikeluarkanmanakalatuntutanterhadapsyarikatdigugurkan.“Lesungtu pula bolehdisimpandirumah,” katanya.Wakilpihakpenentangiaitu Lim dansyarikatterbabittidakhadirpadaperbicaraan.
  11. JOHOR BAHRU: “Sayaterkejutselepasmembukakotakdikirimapabilamendapatiiahanyamengandungiberus cat terpakai, komikberbahasaCinasertatelefonmainandanbukannyaiPhone 4s yang menjadiidaman,” kataFaizalHussin, 41, dari Taman Impian Jaya disini, semalam.Faizal yang jugapengurussebuahsyarikatswastadisekitarbandarrayainiberkata, diakerugian RM1,750 selepasdiperdayasindiketpenjualantelefonbimbitterbabit yang beroperasimenerusilaman web.Mengimbaukejadian, Faizalberkata, ketikamelayari portal pengiklanansindiketterbabitpada 3 Januarilalu, diatertarikdenganiPhone 4s yang ditawarkanpadaharga RM1,750 seunitoleh Jay One Communication and Services memandangkanharganyalebihmurahberbandinghargapasaraniaitusekitar RM2,400. “Sayamenghubunginomborterterauntukmembuatpertanyaanberkaitantelefonbimbitberkenaansebelumdimintamemasukkanbayarankeakaun bank terteranama Yow Wei Xian.“Telefonbimbitberkenaan pula dijanjikandalamtempohduaharimenerusiPoslaju. Kirimanitutibaduaharikemudianiaitupada 5 Januarilalu, namunsayaterkejutmendapatiiahanyaberus cat terpakai, komiksertatelefonmainan,” katanya.Faizalmendedahkanperkaraitupadaprosiding Tribunal TuntutanPengguna Malaysia (TTPM), semalam.Menyambungketerangannya, Faizalberkata, diaberusahamengesanalamatsyarikatterbabitberdasarkannomborakaun bank penerimabayaranberkenaaniaitudi Muar.“Sayakepremisitudanmendapatiiarumah yang disewabeberapalelakiMelayu. “Pada 10 Januarilalu, sayaterkejutapabilamembacalaporanHarian Metro yang mendedahkanseorangbekaspegawai bank menerimalesungbatuselepasmembayar RM3,250 untukmembelitiga unit telefonpintardaripadasyarikatsama,” katanya.Faizalmemfailkantuntutanberkenaankepada TTPM denganharapanmendapatpembelaansewajarnyadanmenamakan Jay One Communication and Services danpenamaakaun, Yow dalamtuntutannyabagimendapatkangantirugiberikutanpenipuanitu.Presiden TTPM, MaznahHaronkemudianmemerintahkanpenentangkeduaiaitu Yow selakupemegangakaun yang menerimawangpembeliantelefonbimbitterbabitmengembalikan RM1,750 kepadamangsadalamtempoh 14 hari.Tuntutan yang difailkanterhadap Jay One Communication and Services pula dibatalkan. Ketikaprosiding, Jay One Communication and Services dan Yow tidakhadiruntukmengemukakanhujahbagimengetepikantuntutandifailkanterhadapmereka.MaznahturutmenasihatkanFaizalsupayamembuatlaporan polis berkaitankesituselainlebihpekadantidakmudahterpedayadenganbarangan yang ditawarkanpadahargamurahterutamaketikaberurusanmenerusi Internet.
  12. Some of these issues are: