E-Business Risks Chapter Seven
E-Business Models EDI Web pages The online environment Distributed e-business and intranets Supply chain linkage Collaborative business
E-Business Protocols, Software, and Hardware TCP/IP IP addresses Client/server architectures
The Languages of E-Business HTML XML XBRL ebXML
Privacy Privacy vs confidentiality Privacy and security trade-offs Privacy policies Internet tracking tools
Information System Security and Availability General network and telecommunications risks and controls Encryption – SSL, SET, S-HTTP Securing electronic payments Securing the web server System availability and reliability
Transaction Integrity and Business Policies The integrity of transactions – complete, accurate, timely, authorized Repudiation – origin and reception non-repudiation Digital signatures and digital certificates Electronic audit trails
Specialized E-Business Applications Electronic Data Interchange (EDI) – VAN vs web-based Collaborative Commerce Security and Privacy – spamming, spoofing, and e- mail policies and controls
Managing Third Party Providers Third-party services – ISP’s, ASP’s, certificate authorities, and electronic payment providers Independent evaluations of third parties
Third Party Assurance Services CPA Trust engagements TRUSTe BBB Online Veri-Sign