Chapter 12 Electronic Commerce Systems

Slides:



Advertisements
Similar presentations
Hall, Accounting Information Systems, 7e ©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly.
Advertisements

Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets Chapter 4.
E-Business Risks Chapter Seven. E-Business Models EDI Web pages The online environment Distributed e-business and intranets Supply chain linkage Collaborative.
Principles of Information Systems, Sixth Edition Electronic Commerce Chapter 8.
LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
2 An Overview of Telecommunications and Networks Telecommunications: the _________ transmission of signals for communications (home net) (home net)
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
IS Network and Telecommunications Risks
Principles of Information Systems, Sixth Edition 1 Electronic Commerce Chapter 8.
Computers Are Your Future © 2008 Prentice-Hall, Inc.
Chapter 6 Telecommunications & Networks.
Networks Adapting Computers to Telecommunications Media.
Mgt 20600: IT Management & Applications Telecommuncations and Networks Tuesday March 28, 2006.
1 Chapter 9 Computer Networks. 2 Chapter Topics OSI network layers Network Topology Media access control Addressing and routing Network hardware Network.
Layer 7- Application Layer
OSI Model.
All Organizations Need to Share and Communicate Information...
Bob Baker Communications Bob Baker September 1999.
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
Data Networking Fundamentals Unit 7 7/2/ Modified by: Brierley.
COMPUTER NETWORKS.
©Brooks/Cole, 2003 Chapter 6 Computer Networks. ©Brooks/Cole, 2003 Understand the rationale for the existence of networks. Distinguish between the three.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
© 2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Chapter 4.  Understand network connectivity.  Peer-to-Peer network & Client-Server network  Understand network topology  Star, Bus & Ring topology.
Basic Technology for Electronic Commerce Fan Fan address: GUANGXI UNIVERSITY BUSINESS SCHOOL 2005.
Chapter 2 The Infrastructure. Copyright © 2003, Addison Wesley Understand the structure & elements As a business student, it is important that you understand.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada Lecture Outline eCommerce Highlights of Electronic Business 2-1.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
The Internet, Intranets, & Extranets Chapter 7. IS for Management2 The Internet (1) A collection of networks that pass data around in packets, each of.
Networks A network is a collection of computers and devices connected together via communications devices and transmission media Advantages of a network.
Principles of Information Systems, Sixth Edition Electronic Commerce Chapter 8.
COMP 6005 An Introduction To Computing Session Four: Internetworking and the World Wide Web.
Chapter 16 IT Controls Part II: Security and Access
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
Communications and Networks Chapter 8. 2 Introduction We live in a truly connected society. Increased connectivity potentially means increased productivity,
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Electronic Commerce & Marketing. What is E-Commerce? Business communications and transactions over networks and through computers, specifically –The buying.
Telecommunication, Internet, and E-Commerce. Communication hardware Communication channel Communication devices.
Networks QUME 185 Introduction to Computer Applications.
Advanced Accounting Information Systems Day 27 Financial Reporting in an Electronic Environment October 28, 2009.
Chapter 5: Networks, Internet & Ecommerce IT Auditing & Assurance, 2e, Hall & Singleton.
Living Online Module Lesson 23 — Networks and Telecommunication
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Chapter Seven E-Business Risks. E-Business Model Evolution EDI EDI Web pages Web pages The online environment The online environment Distributed e-business.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
ACM 511 Introduction to Computer Networks. Computer Networks.
E-commerce 24/12/ Electronic Commerce (E-Commerce) Commerce refers to all the activities the purchase and sales of goods or services. Marketing,
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
1 Chapter 12 Electronic Commerce Systems. 2 Objectives for Chapter 12 zBasic network topologies used to achieve connectivity within an Intranet zFunctions.
By Kim Young Jun IGCSE1.  Computer network  Common types of network  Ring, bus, star and tree  Local are networks  Wide are networks  Wireless LANs.
Data Networking Fundamentals Chapter 7. Objectives In this chapter, you will learn to: Discuss basic networking concepts, including the elements common.
Chapter2 Networking Fundamentals
Living Online Module Lesson 23 — Networks and Telecommunication Computer Literacy BASICS.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Communications and Networks Chapter 9 9-1Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
ISDS 4120 Project 1 DWAYNE CARRAL JR 3/27/15. There are seven layers which make up the OSI (Open Systems Interconnection Model) which is the model for.
Lesson 7 Networks Unit 1—Computer Basics. Computer Concepts BASICS - 2 Objectives Describe the benefits and disadvantages of networks. List and describe.
1 Lesson 24 Network Fundamentals Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
Successfully Implementing The Information System Systems Analysis and Design Kendall and Kendall Fifth Edition.
E-Business Infrastructure PRESENTED BY IKA NOVITA DEWI, MCS.
Chapter Objectives In this chapter, you will learn:
Computer Networks.
Electronic Commerce Systems
Controlling Computer-Based Information Systems, Part II
Presentation transcript:

Chapter 12 Electronic Commerce Systems Accounting Information Systems, 5th edition James A. Hall COPYRIGHT © 2007 Thomson South-Western, a part of The Thomson Corporation. Thomson, the Star logo, and South-Western are trademarks used herein under license

Objectives for Chapter 12 Topologies that are employed to achieve connectivity across the Internet Protocols and understand the specific purposes served by several Internet protocols Business benefits associated with Internet commerce and be aware of several Internet business models Risks associated with intranet and Internet electronic commerce Issues of security, assurance, and trust pertaining to electronic commerce Electronic commerce implications for the accounting profession 31

What is E-Commerce? The electronic processing and transmission of business data electronic buying and selling of goods and services on-line delivery of digital products electronic funds transfer (EFT) electronic trading of stocks direct consumer marketing electronic data interchange (EDI) the Internet revolution

Internet Technologies Packet switching messages are divided into small packets each packet of the message takes a different routes Virtual private network (VPN) a private network within a public network Extranets a password controlled network for private users World Wide Web an Internet facility that links users locally and globally Internet addresses e-mail address URL address IP address

Protocol Functions… facilitate the physical connection between the network devices synchronize the transfer of data between physical devices provide a basis for error checking and measuring network performance promote compatibility among network devices promote network designs that are flexible, expandable, and cost-effective

Internet Protocols Transfer Control Protocol/Internet Protocol (TCP/IP) - controls how individual packets of data are formatted, transmitted, and received Hypertext Transfer Protocol (HTTP) - controls web browsers File Transfer Protocol (FTP) - used to transfer files across the internet Simple Network Mail Protocol (SNMP) - e-mail Secure Sockets Layer (SSL) and Secure Electronic Transmission (SET) - encryption schemes

Open System Interface (OSI) The International Standards Organization developed a layered set of protocols called OSI. The purpose of OSI is to provide standards by which the products of different manufacturers can interface with one another in a seamless interconnection at the user level.

The OSI Protocol NODE 2 NODE 1 Layer 1 Physical Layer 2 Data Link Layer 3 Network Layer 4 Transport Layer 5 Session Layer 6 Presentation Layer 7 Application SOFT WARE HARD Layer 1 Physical Layer 2 Data Link Layer 3 Network Layer 4 Transport Layer 5 Session Layer 6 Presentation Layer 7 Application SOFT WARE HARD Data Manipulation Tasks Data Communications Tasks HARD WARE HARD WARE Communications Channel

HTML: Hyper Text Markup Language Format used to produce Web pages defines the page layout, fonts, and graphic elements used to lay out information for display in an appealing manner like one sees in magazines and newspapers using both text and graphics (including pictures) appeals to users Hypertext links to other documents on the Web Even more pertinent is HTML’s support for hypertext links in text and graphics that enable the reader to ‘jump’ to another document located anywhere on the World Wide Web.

XML: eXtensible Markup Language XML is a meta-language for describing markup languages. Extensible means that any markup language can be created using XML. includes the creation of markup languages capable of storing data in relational form, where tags (formatting commands) are mapped to data values can be used to model the data structure of an organization’s internal database

Comparing HTML and XML

XBRL: eXtensible Business Reporting Language XBRL is an XML-based language for standardizing methods for preparing, publishing, and exchanging financial information, e.g., financial statements. XBRL taxonomies are classification schemes. Advantages: Business offer expanded financial information to all interested parties virtually instantaneously. Companies that use XBRL database technology can further speed the process of reporting. Consumers import XBRL documents into internal databases and analysis tools to greatly facilitate their decision-making processes.

Benefits of E-Commerce Access to a worldwide customer and/or supplier base Reductions in inventory investment and carrying costs Rapid creation of business partnerships to fill emerging market niches Reductions in retail prices through lower marketing costs Reductions in procurement costs Better customer service

The Internet Business Model Information level using the Internet to display and make accessible information about the company, its products, services, and business policies Transaction level using the Internet to accept orders from customers and/or to place them with their suppliers Distribution level using the Internet to sell and deliver digital products to customers

Dynamic Virtual Organization Perhaps the greatest potential benefit to be derived from e-commerce is the firm’s ability to forge dynamic business alliances with other organizations to fill unique market niches as the opportunities arise.

Areas of General Concern Data Security: are stored and transmitted data adequately protected? Business Policies: are policies publicly stated and consistently followed? Privacy: how confidential are customer and trading partner data? Business Process Integrity: how accurately, completely, and consistently does the company processes its transactions?

Intranet Risks Intercepting network messages sniffing: interception of user IDs, passwords, confidential e-mails, and financial data files Accessing corporate databases connections to central databases increase the risk that data will be accessible by employees Privileged employees override privileges may allow unauthorized access to mission-critical data Reluctance to prosecute fear of negative publicity leads to such reluctance but encourages criminal behavior

Internet Risks to Consumers How serious is the risk? National Consumer League: Internet fraud rose by 600% between 1997 and 1998 SEC: e-mail complaints alleging fraud rose from 12 per day in 1997 to 200-300 per day in 1999 Major areas of concern: Theft of credit card numbers Theft of passwords Consumer privacy--cookies

Internet Risks to Businesses IP spoofing: masquerading to gain access to a Web server and/or to perpetrate an unlawful act without revealing one’s identity Denial of service (DOS) attacks: assaulting a Web server to prevent it from servicing users particularly devastating to business entities that cannot receive and process business transactions Malicious programs: viruses, worms, logic bombs, and Trojan horses pose a threat to both Internet and Intranet users

DOS Attack Sender Receiver Step 1: SYN messages Step 2: SYN/ACK Step 3: ACK packet code In a DOS Attack, the sender sends hundreds of messages, receives the SYN/ACK packet, but does not response with an ACK packet. This leaves the receiver with clogged transmission ports, and legitimate messages cannot be received. 6

E-Commerce Security: Data Encryption Encryption - A computer program transforms a clear message into a coded (ciphertext) form using an algorithm. Key Ciphertext Encryption Program Communication System Cleartext Message Cleartext Message Encryption Program Ciphertext Communication System Key 7

Public and Private Key Encryption Message A Message B Message C Message D Multiple people may have the public key (e.g., subordinates). Public Key is used for encoding messages. Ciphertext Ciphertext Ciphertext Ciphertext Typically one person or a small number of people have the private key (e.g., a supervisor). Private Key is used for decoding messages. Message A Message B Message C Message D 8

E-Commerce Security: Digital Authentication Digital signature: electronic authentication technique that ensures that the transmitted message originated with the authorized sender and that it was not tampered with after the signature was applied Digital certificate: like an electronic identification card that is used in conjunction with a public key encryption system to verify the authenticity of the message sender

E-Commerce Security: Firewalls Firewalls: software and hardware that provide security by channeling all network connections through a control gateway Network level firewalls low cost/low security access control uses a screening router to its destination does not explicitly authenticate outside users penetrate the system using an IP spoofing technique Application level firewalls high level/high cost customizable network security allows routine services and e-mail to pass through performs sophisticated functions such as logging or user authentication for specific tasks

Assurance “Trusted” third-party organizations offer seals of assurance that businesses can display on their Web site home pages: BBB TRUSTe Veri-Sign, Inc ICSA AICPA/CICA WebTrust AICPA/CICA SysTrust

Implications for Accounting Privacy violation major issues: a stated privacy policy consistent application of stated privacy policies what information is the company capturing sharing or selling of information ability of individuals and businesses to verify and update information on them 1995 Safe Harbor Agreement establishes standards for information transmittal between US and European companies

Implications for Accounting Audit implication for XBRL taxonomy creation: incorrect taxonomy results in invalid mapping that may cause material misrepresentation of financial data validation of instance documents: ensure that appropriate taxonomy and tags have been applied audit scope and timeframe: impact on auditor responsibility as a consequence of real-time distribution of financial statements

Implications for Accounting Continuous process auditing auditors review transactions at frequent intervals or as they occur intelligent control agents: heuristics that search electronic transactions for anomalies Electronic audit trails electronic transactions generated without human intervention no paper audit trail

Implications for Accounting Confidentiality of data open system designs allow mission-critical information to be at the risk to intruders Authentication in e-commerce systems, determining the identity of the customer is not a simple task Nonrepudiation repudiation can lead to uncollected revenues or legal action use digital signatures and digital certificates

Implications for Accounting Certification authority (CA) licensing trusted 3rd party vouches for identity Data integrity determine whether data has been intercepted and altered Access controls prevent unauthorized access to data Changing legal environment provide client with estimate of legal exposure

Local Area Networks (LAN) A federation of computers located close together (on the same floor or in the same building) linked together to share data and hardware The physical connection of workstations to the LAN is achieved through a network interface card (NIC) which fits into a PC’s expansion slot and contains the circuitry necessary for inter-node communications. A server is used to store the network operating system, application programs, and data to be shared.

LAN Files LAN File Server Node Node Printer Server Node Node Printer 16

Wide Are Network (WAN) A WAN is a network that is dispersed over a wider geographic area than a LAN. It typically requires the use of: gateways to connect different types of LANs bridges to connect same-type LANs WANs may use common carrier facilities, such as telephone lines, or they may use a Value Added Network (VAN).

WAN Bridge LAN LAN Gateway Gateway LAN WAN

Star Topology A network of IPUs with a large central computer (the host) The host computer has direct connections to smaller computers, typically desktop or laptop PCs. This topology is popular for mainframe computing. All communications must go through the host computer, except for local computing.

Star Network Topeka St. Louis Local Data Local Data Kansas City POS Central Data POS POS Local Data Dallas Tulsa POS Local Data POS POS

Hierarchical Topology A host computer is connected to several levels of subordinate smaller computers in a master-slave relationship. Production Planning System Corporate Level Production Scheduling System Regional Level Regional Sales System Sales Processing System Sales Processing System Sales Processing System Local Level Warehouse System Warehouse System Production System Production System

Ring Topology This configuration eliminates the central site. All nodes in this configuration are of equal status (peers). Responsibility for managing communications is distributed among the nodes. Common resources that are shared by all nodes can be centralized and managed by a file server that is also a node.

Ring Topology Server Central Files Local Local Files Files Local Local 23

Bus Topology The nodes are all connected to a common cable - the bus. Communications and file transfers between workstations are controlled by a server. It is generally less costly to install than a ring topology.

Bus Topology Server Central Files Print Server Node Node Node Node Local Files Local Files Node Server Central Files Local Files Node Node Local Files Local Files 25

Client-Server Topology This configuration distributes the processing between the user’s (client’s) computer and the central file server. Both types of computers are part of the network, but each is assigned functions that it best performs. This approach reduces data communications traffic, thus reducing queues and increasing response time.

Client-Server Topology Data Manipulation Capabilities Data Manipulation Capabilities Server Record Searching Capabilities Client Data Manipulation Capabilities Common Files Client Client Data Manipulation Capabilities Data Manipulation Capabilities 27

Network Control Objectives establish a communications session between the sender and the receiver manage the flow of data across the network detect errors in data caused by line failure or signal degeneration detect and resolve data collisions between competing nodes

WAN SLAVE SLAVE SLAVE SLAVE POLLING METHOD OF CONTROLLING DATA COLLISIONS SLAVE SLAVE Locked Locked MASTER WAN Polling Signal SLAVE SLAVE Data Transmission Locked One Site, the “master,” polls the other “slave” sites to determine if they have data to transmit. If a slave responds in the affirmative, the master site locks the network while the data are transmitted. Allows priorities to be set for data communications across the network

Token Ring Server Node Node Node Central Files Local Files Local Files Contains data Empty token Node Local Files 42

Carrier Sensing A random access technique that detects collisions when they occur This technique is widely used--found on Ethernets. The node wishing to transmit listens to the line to determine if in use. If it is, it waits a pre-specified time to transmit. Collisions occur when nodes listen, hear no transmissions, and then simultaneously transmit. Data collides and the nodes are instructed to hang up and try again. Disadvantage: The line may not be used optimally when multiple nodes are trying to transmit simultaneously.

What is Electronic Data Interchange (EDI)? The exchange of business transaction information: between companies in a standard format (ANSI X.12 or EDIFACT) via a computerized information system In “pure” EDI systems, human involvements is not necessary to approve transactions. 31

Communications Links Companies may have internal EDI translation/communication software and hardware. OR They may subscribe to VANs to perform this function without having to invest in personnel, software, and hardware. 33

EDI System Company A Company B VAN Application Software Sales Order Purchases System EDI Translation Software EDI Translation Software Direct Connection Communications Software Communications Software Other Mailbox Company A’s mailbox VAN Company B’s mailbox Other Mailbox 14

Advantages of EDI Reduction or elimination of data entry Reduction of errors Reduction of paper Reduction of paper processing and postage Reduction of inventories (via JIT systems) 34