Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter Seven E-Business Risks. E-Business Model Evolution EDI EDI Web pages Web pages The online environment The online environment Distributed e-business.

Similar presentations


Presentation on theme: "Chapter Seven E-Business Risks. E-Business Model Evolution EDI EDI Web pages Web pages The online environment The online environment Distributed e-business."— Presentation transcript:

1 Chapter Seven E-Business Risks

2 E-Business Model Evolution EDI EDI Web pages Web pages The online environment The online environment Distributed e-business and intranets Distributed e-business and intranets Supply chain linkage Supply chain linkage Collaborative business (e.g., Web Services) Collaborative business (e.g., Web Services)

3 E-Business Protocols, Software, and Hardware TCP/IP TCP/IP IP addresses IP addresses Client/server architectures Client/server architectures

4 1 - 4 Internet Communication Standards LayerCommon Standards 5. Application layer HTTP, HTML (Web) IMAP, POP (e-mail) 4. Transport layer TCP 3. Network layer IP 2. Data link layer Ethernet (LAN) PPP (dial-up via modem for MAN) 1. Physical layer Category 5 twisted pair (LAN) Fiber optic cable (WAN)

5 The Languages of E-Business HTML HTML XML XML XBRL XBRL ebXML ebXML

6 Privacy Privacy vs confidentiality Privacy vs confidentiality Privacy and security trade-offs Privacy and security trade-offs Privacy policies Privacy policies Internet tracking tools Internet tracking tools

7 Information System Security and Availability General network and telecommunications risks and controls General network and telecommunications risks and controls Encryption – SSL, SET, S-HTTP Encryption – SSL, SET, S-HTTP Securing electronic payments Securing electronic payments Securing the web server Securing the web server System availability and reliability System availability and reliability

8 Transaction Integrity and Business Policies The integrity of transactions – complete, accurate, timely, authorized The integrity of transactions – complete, accurate, timely, authorized Repudiation – origin and reception non- repudiation Repudiation – origin and reception non- repudiation Digital signatures and digital certificates Digital signatures and digital certificates Electronic audit trails Electronic audit trails

9 Specialized E-Business Applications Electronic Data Interchange (EDI) – VAN vs web-based Electronic Data Interchange (EDI) – VAN vs web-based Collaborative Commerce Collaborative Commerce E-Mail Security and Privacy – spamming, spoofing, and e-mail policies and controls E-Mail Security and Privacy – spamming, spoofing, and e-mail policies and controls

10 Managing Third Party Providers Third-party services – ISP’s, ASP’s, certificate authorities, and electronic payment providers Third-party services – ISP’s, ASP’s, certificate authorities, and electronic payment providers Independent evaluations of third parties Independent evaluations of third parties

11 Third Party Assurance Services CPA Trust engagements CPA Trust engagements TRUSTe TRUSTe BBB Online BBB Online Veri-Sign Veri-Sign

12


Download ppt "Chapter Seven E-Business Risks. E-Business Model Evolution EDI EDI Web pages Web pages The online environment The online environment Distributed e-business."

Similar presentations


Ads by Google