Electronic Commerce Systems

Slides:



Advertisements
Similar presentations
Security Controls and Systems in E-Commerce
Advertisements

Lesson 1. Course Outline E-Commerce and its types, Internet and WWW Basics, Internet standards and protocols, IP addressing, Data communication on internet,
Hall, Accounting Information Systems, 7e ©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly.
E-Business Risks Chapter Seven. E-Business Models EDI Web pages The online environment Distributed e-business and intranets Supply chain linkage Collaborative.
Principles of Information Systems, Sixth Edition Electronic Commerce Chapter 8.
Chapter 12 Electronic Commerce Systems
2 An Overview of Telecommunications and Networks Telecommunications: the _________ transmission of signals for communications (home net) (home net)
Security+ Guide to Network Security Fundamentals
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Principles of Information Systems, Sixth Edition 1 Electronic Commerce Chapter 8.
Telecommunication and Networks
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
1 EDI: Electronic Data Interchange What is EDI? –Exchange of electronic data between companies using precisely defined transactions –Set of hardware, software,
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
What is Commerce? “Seller” “Buyer” Transaction Basic Computer Concepts
Managing Information And Technology. Chapter Objectives 1.Distinguish between data and information and identify tasks of IS manager 2.Explain how IS managers.
Electronic Data Interchange Computer readable forms for business documents such as invoices, purchase orders, delivery notes needed in B2B e- commerce.
Chapter 3 – Electronic Business (E-Business) Systems
Principles of Information Systems, Sixth Edition Electronic Commerce Chapter 8.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Internet Security for Small & Medium Business Week 6
Exploring Business 2.0 © 2012 Flat World Knowledge Chapter 15: Managing Information And Technology.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
E-Commerce. Areas Definitions Needs Technical Infrastructure History Benefits Limitations Security.
Electronic Commerce & Marketing. What is E-Commerce? Business communications and transactions over networks and through computers, specifically –The buying.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
Advanced Accounting Information Systems Day 27 Financial Reporting in an Electronic Environment October 28, 2009.
Chapter 5: Networks, Internet & Ecommerce IT Auditing & Assurance, 2e, Hall & Singleton.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Electronic Commerce Jeff Campbell, Piyanuch Chuasiripattana, Travis Flood, Matthew Janocko, Kent Woodburn Research on Electronic Commerce.
Chapter Seven E-Business Risks. E-Business Model Evolution EDI EDI Web pages Web pages The online environment The online environment Distributed e-business.
Chapter 11 Interorganizational and International Information Systems.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
E-commerce 24/12/ Electronic Commerce (E-Commerce) Commerce refers to all the activities the purchase and sales of goods or services. Marketing,
1 EDI, Supply Chain Management, and Global Information Systems Chapter 11.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
Networking E-commerce. E-commerce ► A general term used to describe the buying and selling of products or services over the Internet. ► This covers a.
Electronic Data Interchange
Electronic Commerce Semester 1 Term 1 Lecture 14.
Electronic Banking & Security Electronic Banking & Security.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Successfully Implementing The Information System Systems Analysis and Design Kendall and Kendall Fifth Edition.
ACCOUNTING INFORMATION SYSTEMS
Chapter 5 – E-commerce and Enterprise Systems
E-Commerce Systems Chapter 8
Chapter 4 The Revenue Cycle 1.
Controlling Computer-Based Information Systems, Part II
Network Components Network Interface Card (NIC) Hub and Switches
E D I a new business paradigm
Chapter 17 Risks, Security and Disaster Recovery
Chapter 5 Electronic Commerce | Security
Chapter 2: Introduction to Electronic Commerce
Virtual Private Networks (VPN)
BY GAWARE S.R. DEPT.OF COMP.SCI
Consumer Benefits of Web Marketing
Chapter 9 e-Commerce Systems McGraw-Hill/Irwin
12 E-Commerce Overview.
Computer-Based Processing: Developing an Audit Assessment Approach
SECURITY MECHANISM & E-COMMERCE
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
Chapter 5 Electronic Commerce | Security
INFORMATION SYSTEMS SECURITY and CONTROL
Electronic Payment Security Technologies
Chapter 21 Successfully Implementing The Information System
EDI Systems What They Are and Why They Matter
Presentation transcript:

Electronic Commerce Systems Chapter 12 Electronic Commerce Systems 1

What is E-Commerce? The electronic processing and transmission of business data electronic buying and selling of goods and services on-line delivery of digital products electronic funds transfer (EFT) electronic trading of stocks direct consumer marketing electronic data interchange (EDI) the Internet revolution

Benefits of E-Commerce Access to a worldwide customer and/or supplier base Reductions in inventory investment and carrying costs Rapid creation of business partnerships to fill emerging market niches Reductions in retail prices through lower marketing costs Reductions in procurement costs Better customer service

The Internet Business Model Information level using the Internet to display and make accessible information about the company, its products, services, and business policies Transaction level using the Internet to accept orders from customers and/or to place them with their suppliers Distribution level using the Internet to sell and deliver digital products to customers

Areas of General Concern Data Security: are stored and transmitted data adequately protected? Business Policies: are policies publicly stated and consistently followed? Privacy: how confidential are customer and trading partner data? Business Process Integrity: how accurately, completely, and consistently does the company processes its transactions?

Internet Risks to Consumers How serious is the risk? National Consumer League: Internet fraud rose by 600% between 1997 and 1998 SEC: e-mail complaints alleging fraud rose from 12 per day in 1997 to 200-300 per day in 1999 Major areas of concern: Theft of credit card numbers Theft of passwords Consumer privacy--cookies

E-Commerce Security: Data Encryption Encryption - A computer program transforms a clear message into a coded (ciphertext) form using an algorithm. Key Ciphertext Encryption Program Communication System Cleartext Message Cleartext Message Encryption Program Ciphertext Communication System Key 7

E-Commerce Security: Digital Authentication Digital signature: electronic authentication technique that ensures that the transmitted message originated with the authorized sender and that it was not tampered with after the signature was applied Digital certificate: like an electronic identification card that is used in conjunction with a public key encryption system to verify the authenticity of the message sender

E-Commerce Security: Firewalls Firewalls: software and hardware that provide security by channeling all network connections through a control gateway Network level firewalls low cost/low security access control uses a screening router to its destination does not explicitly authenticate outside users penetrate the system using an IP spoofing technique Application level firewalls high level/high cost customizable network security allows routine services and e-mail to pass through performs sophisticated functions such as logging or user authentication for specific tasks

Assurance “Trusted” third-party organizations offer seals of assurance that businesses can display on their Web site home pages: BBB TRUSTe Veri-Sign, Inc ICSA AICPA/CICA WebTrust AICPA/CICA SysTrust

Implications for Accounting Continuous process auditing auditors review transactions at frequent intervals or as they occur intelligent control agents: heuristics that search electronic transactions for anomalies Electronic audit trails electronic transactions generated without human intervention no paper audit trail

Implications for Accounting Confidentiality of data open system designs allow mission-critical information to be at the risk to intruders Authentication in e-commerce systems, determining the identity of the customer is not a simple task Nonrepudiation repudiation can lead to uncollected revenues or legal action use digital signatures and digital certificates

Implications for Accounting Certification authority (CA) licensing trusted 3rd party vouches for identity Data integrity determine whether data has been intercepted and altered Access controls prevent unauthorized access to data Changing legal environment provide client with estimate of legal exposure

LAN Files LAN File Server Node Node Printer Server Node Node Printer 16

WAN Bridge LAN LAN Gateway Gateway LAN WAN

Star Network Topeka St. Louis Local Data Local Data Kansas City POS Central Data POS POS Local Data Dallas Tulsa POS Local Data POS POS

Hierarchical Topology A host computer is connected to several levels of subordinate smaller computers in a master-slave relationship. Production Planning System Corporate Level Regional Level Production Scheduling System Regional Sales System Sales Processing System Sales Processing System Sales Processing System Local Level Warehouse System Warehouse System Production System Production System

Ring Topology Server Central Files Local Local Files Files Local Local 23

Bus Topology Server Central Files Print Server Node Node Node Node Local Files Local Files Node Server Local Files Central Files Node Node Local Files Local Files 25

Client-Server Topology Data Manipulation Capabilities Data Manipulation Capabilities Server Record Searching Capabilities Client Data Manipulation Capabilities Common Files Client Client Data Manipulation Capabilities Data Manipulation Capabilities 27

Token Ring Server Node Node Node Central Files Local Files Local Files Contains data Empty token Node Local Files 42

What is Electronic Data Interchange? The exchange of business transaction information: between companies in a standard format (ANSI X.12 or EDIFACT) via a computerized information system In “pure” EDI systems, human involvements is not necessary to approve transactions. 31

EDI System Company A Company B VAN Application Software Sales Order Purchases System EDI Translation Software EDI Translation Software Direct Connection Communications Software Communications Software Other Mailbox Company A’s mailbox VAN Company B’s mailbox Other Mailbox 14

Advantages of EDI Reduction or elimination of data entry Reduction of errors Reduction of paper Reduction of paper processing and postage Reduction of inventories (via JIT systems) 34