Chapter 15-1. Chapter 15-2 Chapter 15: Accounting on the Internet Introduction The Internet and the World Wide Web XBRL: Financial Reporting on the Internet.

Slides:



Advertisements
Similar presentations
Intermediate 2 Computing
Advertisements

Section 10.1 Identify how Web sites are structured Explain the role of URLs Describe the function of HTTP Section 10.2 Explain how the Web has affected.
Technology Guide 2 Software
Lesson 1. Course Outline E-Commerce and its types, Internet and WWW Basics, Internet standards and protocols, IP addressing, Data communication on internet,
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets Chapter 4.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
2 An Overview of Telecommunications and Networks Telecommunications: the _________ transmission of signals for communications (home net) (home net)
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
ACCOUNTING INFORMATION SYSTEMS
Chapter 12 Accounting on the Internet
Mgt 20600: IT Management & Applications Telecommuncations and Networks Tuesday March 28, 2006.
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Introduction to Information Technology.
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
Chapter9 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
1 Chapter 5 Electronic Commerce, Intranets, and Extranets Information Systems Today Leonard Jessup and Joseph Valacich.
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
Chapter 8-1 The Islamic University of Gaza Accounting Information Systems Information Technology Auditing Dr. Hisham madi.
Lesson 19: Configuring Windows Firewall
Communications and Networks
Chapter 3: Data Modeling
5th Edition, Irv Englander
Core Concepts of ACCOUNTING INFORMATION SYSTEMS Moscove, Simkin & Bagranoff John Wiley & Sons, Inc. Developed by: Marianne Bradford, Ph.D. Bryant College.
Basic Technology for Electronic Commerce Fan Fan address: GUANGXI UNIVERSITY BUSINESS SCHOOL 2005.
5-1 Chapter 5 Electronic Commerce, Intranets, and Extranets.
Core Concepts of ACCOUNTING INFORMATION SYSTEMS Moscove, Simkin & Bagranoff John Wiley & Sons, Inc. Developed by: S. Bhattacharya, Ph.D. Florida Atlantic.
CIS 1310 – HTML & CSS 12 E-Commerce Overview. CIS 1310 – HTML & CSS Learning Outcomes  Define E-commerce  Identify Benefits & Risks of E-Commerce 
Introduction to Information Technology, 2 nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 6-1 Introduction to Information Technology.
The Internet, Intranets, & Extranets Chapter 7. IS for Management2 The Internet (1) A collection of networks that pass data around in packets, each of.
DATA COMMUNICATION DONE BY: ALVIN SAMPATH CARLVIN SAMPATH.
The Internet, the Web, and Electronic Commerce Chapter 2 Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. 2-1.
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
“Copyright © 2001 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976.
Introduction to Information Technology, 2 nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 7-1 Introduction to Information Technology.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
Chapter 14: Accounting on the Internet
Electronic Commerce & Marketing. What is E-Commerce? Business communications and transactions over networks and through computers, specifically –The buying.
Chapter 2 Information Technology and AISs
HTML, XHTML, and CSS Sixth Edition Chapter 1 Introduction to HTML, XHTML, and CSS.
© 2003 Prentice Hall, Inc.5-1 Chapter 5 Electronic Commerce, Intranets, and Extranets Information Systems Today Leonard Jessup and Joseph Valacich.
Advanced Accounting Information Systems Day 27 Financial Reporting in an Electronic Environment October 28, 2009.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Slide 3-1 Chapter 3 Terms Electronic Commerce and Internet Technologies Introduction to Information Systems Judith C. Simon.
Slide 3-1 Chapter 3 Electronic Commerce and Internet Technologies Introduction to Information Systems Judith C. Simon.
Core Concepts of ACCOUNTING INFORMATION SYSTEMS Moscove, Simkin & Bagranoff John Wiley & Sons, Inc. Developed by: S. Bhattacharya, Ph.D. Florida Atlantic.
Copyright © 2000 John Wiley & Sons, Inc. All rights reserved
Chapter 16 Information and Operations Management 1e Management 1e - 2 Management 1e Learning Objectives  Explain how managers use controls.
McLean HIGHER COMPUTER NETWORKING Lesson 8 E-Commerce Explanation of ISP Description of E-commerce Description of E-sales.
The Intranet.
IT in Business Issues in Information Technology Lecture – 13.
Lesson 11: Configuring and Maintaining Network Security
Kuliah Pengantar Teknologi Informasi Coky Fauzi Alfi cokyfauzialfi.wordpress.com Internet (2)
Principles of Information Systems, Sixth Edition 1 The Internet, Intranets, and Extranets Chapter 7.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
1 Chapter 7 E-Commerce The Internet, Intranets, and Extranets.
Chapter 14 – Information Systems, First Edition John Wiley & Sons, Inc by France Belanger and Craig Van Slyke Contributor: Brian West, University of Louisiana.
Copyright 2004 John Wiley & Sons, Inc Information Technology: Strategic Decision Making For Managers Henry C. Lucas Jr. John Wiley & Sons, Inc Dinesh.
Chapter Chapter 14-2 Accounting Information Systems, 1 st Edition E-Commerce and E- Business.
Chapter 5-1. Chapter 5-2 Chapter 5: Organizing and Manipulating the Data in Databases Introduction Normalization Validating the Data in Databases Extracting.
Slide 11-1 Chapter 11 Terms Information Resource Management Strategies Introduction to Information Systems Judith C. Simon.
CHAPTER 5 Network Applications. Chapter Outline 5.1 Network Applications 5.2 Web E-Learning and Distance Learning 5.4 Telecommuting.
Chapter 8 E-Commerce Technologies Introduction to Business Information Systems by Mark Huber, Craig Piercy, Patrick McKeown, and James Norrie.
E-Business Infrastructure PRESENTED BY IKA NOVITA DEWI, MCS.
ACCOUNTING INFORMATION SYSTEMS
5th Edition, Irv Englander
Using Technology to Manage Information
ACCOUNTING INFORMATION SYSTEMS
Chapter 15 – Part 2 Networks The Internal Operating System
Accounting on the Internet
Presentation transcript:

Chapter 15-1

Chapter 15-2 Chapter 15: Accounting on the Internet Introduction The Internet and the World Wide Web XBRL: Financial Reporting on the Internet Electronic Commerce Privacy and Security on the Internet

Chapter 15-3 The Internet and World Wide Web Internet Addresses and Software Intranets and Extranets The World Wide Web, HTML, and IDEA Groupware, Electronic Conferencing, and Blogs

Chapter 15-4 Internet Addresses and Software Domain Address  Also called a Uniform Resource Locator (URL)  Internet Protocol (IP)  Numeric address of domain address   Transmission Control Protocol (TCP)

Chapter 15-5 Intranets and Extranets Intranets  Based on same software as the Internet  Internal to the organization  Outsiders are unable to access information Extranets  Enable external users to access intranets  Utilize passwords or private data communications channels

Chapter 15-6 The World Wide Web, HTML, and IDEA World Wide Web  Multimedia portion of the Internet Hypertext Markup Language (HTML)  Editing language  Used in design of web pages Hypertext Transfer Protocol (HTTP)  Communications protocol used to transfer web pages

Chapter 15-7 HTML Code

Chapter 15-8 Display of HTML Code

Chapter 15-9 Groupware, Electronic Conferencing, and Blogs Groupware  Allow users to complete numerous tasks electronically  Send and receive , collaborate on work tasks, schedule appointments, share files  Software include Exchange, Groupwise, Lotus Notes, and Outlook

Chapter Groupware, Electronic Conferencing, and Blogs Instant Messaging Software  Remote users communicate in real time  Electronic Conferencing Knowledge Management  Programs utilized to distribute expertise within the organization Blogs  Collaboration tool  Create, share, and leverage knowledge

Chapter Which of the following is most likely to contain only numbers? A.Domain address B.URL address C.IP address D.Postal address Study Break #1

Chapter Which of the following is most likely to contain only numbers? A.Domain address B.URL address C.IP address D.Postal address Study Break #1 - Answer

Chapter Which of the following enables users to view data with a web browser? A.Intranet B.Extranet C.Internet D.All of these Study Break #2

Chapter Which of the following enables users to view data with a web browser? A.Intranet B.Extranet C.Internet D.All of these Study Break #2 - Answer

Chapter XBRL: Financial Reporting on the Internet eXtensible Markup Language (XML)  Similar to HTML  Users define their own tags  XML tags describe the data eXtensible Business Reporting Language  Tags are standardized for business reporting purposes

Chapter XBRL Code

Chapter XBRL: Financial Reporting on the Internet XBRL Instance Documents and Taxonomies  Must understand the standard tags  Must understand the rules that govern the use of the tags Current Status of XBRL  XBRL International Consortium

Chapter How XBRL Affects Accountants

Chapter XBRL: Financial Reporting on the Internet The Benefits of XBRL  Transmit financial data in standard format  Data items are uniquely defined  Searching for tags is easier (IDEA)  Data is self-checking  Automatic and reliable exchange of financial information  Companies are not constrained to specific formats

Chapter Electronic Commerce Definition  Conduct of business with computers and data communications Categories of Electronic Commerce  Retail sales  E-payments and E-wallets  Electronic data interchange

Chapter All of the following are markup languages (that use edit tags) except: A.HTML B.XOR C.XML D.XBRL Study Break #3

Chapter All of the following are markup languages (that use edit tags) except: A.HTML B.XOR C.XML D.XBRL Study Break #3 - Answer

Chapter A document file containing XBRL tags is a(n): A.Extranet document B.Intranet document C.Instance document D.URL Study Break #4

Chapter A document file containing XBRL tags is a(n): A.Extranet document B.Intranet document C.Instance document D.URL Study Break #4 - Answer

Chapter Retail Sales Overview  Virtual stores to sell directly to customers  Automated AISs Problems with Internet Retail Sales  Legitimacy of web sites  Reliance upon s  Reliance upon suppliers  Click fraud  Privacy concerns

Chapter Advantages of Virtual Stores

Chapter E-Payments and E-Wallets E-Payments  Faster, easier, and safer way to handle online transactions  E-payment service acts as intermediary E-Wallet  Store consumer’s personal information  Customers pay for purchases by providing their e- wallet account numbers

Chapter E-Payment System

Chapter Business-to-Business E-Commerce Definition  Businesses buying and selling goods and services to each other over the Internet Advantages  Shortens time from purchase to delivery  Expanded variety of vendors  Reduces processing costs  Wider availability of real-time data

Chapter Electronic Data Interchange and Virtual PBXs Electronic Data Interchange  Transmit information over high-speed data communications channels  Automates exchange of business information Virtual PBXs  Private Branch Exchange  Phone system used in office settings  Voice Over Internet Protocol (VOIP)

Chapter Privacy and Identity Theft Definition  Using another person’s personal data that involves fraud or deception  Identity Theft and Assumption Deterrence Act of 1998 (ITADA) Company Prevention  Use preventive controls  Exercise reasonable caution to protect personal information

Chapter Safeguarding Personal Data

Chapter Safeguarding Personal Data

Chapter Security Safeguarding electronic resources and limiting access to authorized users Access Security – Authentication  What you have – plastic card  What you know – unique information  Who you are - fingerprints

Chapter Spam and Phishing Spam  Unsolicited messages  Increasingly costly to organizations Phishing  Websites requesting personal information from consumers  Most information is typically stored in AISs

Chapter Firewalls Purpose  Guards against unauthorized access  Stand-alone devices and/or software Two Primary Methods  Inclusion – Access Control List (ACL)  Exclusion Problems  Denial-of-Service Attacks  Spoofing

Chapter Firewall Example

Chapter Firewall Hardware

Chapter Intrusion Detection Systems Passive IDSs  Create logs of potential intrusions  Alert network administrators Reactive IDSs  Detect potential intrusions dynamically  Log off potentially malicious users  Program firewalls to block messages from suspected source

Chapter Value-Added Networks Definition  Private, point-to-point communication channels  Usually created for security purposes Methods of Creation  Blank slate, create from scratch  Lease secure, dedicated transmission lines  Create a Virtual Private Network (VPN)

Chapter Value Private Networks Definition  Similar to a VAN  Transmit messages over existing Internet connections Creating Secure Data Transmission  Use “tunneling” security protocols  Encrypt transmitted data  Authenticate remote computer

Chapter VAN-based EDI System

Chapter Proxy Server Definition  Network server that controls web access Advantages  Funnel internet requests through a single server  Examine and test requests for authenticity  Limit employee access to approved websites  Limit stored information  Store frequently-accessed web pages (Cache)

Chapter Data Encryption Definition  Transform plaintext messages into unintelligible cyphertext messages Encryption key  Mathematical function dependent upon a large prime number  Data Encryption Standard (DES)

Chapter Simple Data Encryption

Chapter Data Encryption Secret Key Cryptography  Users must keep the key secret and not share the key with other parties Public Key Cryptography  Each party uses a pair of public/private encryption keys  SSL and S-HTTP

Chapter Digital Signatures and Digital Time Stamping Digital Signature  Encrypted portion of message  Digital Signature Standard (DSS) Digital Certificate  Certificate Authority Digital Time-Stamping Services (DTSSs)

Chapter Which of these statements is correct? A.A VPN is a type of VAN B.DES stands for “data entry system” C.An IDS is the same as a firewall D.All of these statements are correct Study Break #5

Chapter Which of these statements is correct? A.A VPN is a type of VAN B.DES stands for “data entry system” C.An IDS is the same as a firewall D.All of these statements are correct Study Break #5 - Answer

Chapter Spoofing means: A.Kidding someone about their firewall B.Simulating a disaster to test the effectiveness of a disaster recovery system C.Posing as an authentic user to gain access to a computer system D.Encrypting data for security purposes Study Break #6

Chapter Spoofing means: A.Kidding someone about their firewall B.Simulating a disaster to test the effectiveness of a disaster recovery system C.Posing as an authentic user to gain access to a computer system D.Encrypting data for security purposes Study Break #6 - Answer

Chapter Copyright Copyright 2010 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United States Copyright Act without the express written permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make backup copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein.

Chapter Chapter 15