Transcript Chapter 14

Chapter 14:
Accounting on the Internet
Introduction
The Internet and the World Wide Web
XBRL - Financial Reporting on the Internet
Electronic Business
Privacy and Security on the Internet
Chapter
14-1
The Internet and
World Wide Web
Internet Addresses and Software
Intranets and Extranets
The World Wide Web, HTML, and IDEA
Groupware, Electronic Conferencing, and
Blogs
Chapter
14-2
Internet Addresses and
Software
Domain Address
 Also
called a Uniform Resource Locator (URL)
 www.Name.com.uk
Internet Protocol (IP)
 Numeric
address of domain address
 207.142.131.248
 Transmission Control Protocol (TCP)
Chapter
14-3
Intranets and Extranets
Intranets
 Based
on same software as the Internet
 Internal to the organization
 Outsiders are unable to access information
Extranets
 Enable
external users to access intranets
 Utilize passwords or private data communications
channels
Chapter
14-4
The World Wide Web,
HTML, and IDEA
World Wide Web
 Multimedia
portion of the Internet
Hypertext Markup Language (HTML)
 Editing
language
 Used in design of web pages
Hypertext Transfer Protocol (HTTP)
 Communications
pages
protocol used to transfer web
Chapter
14-5
HTML Code
Chapter
14-6
Display of HTML Code
Chapter
14-7
Groupware, Electronic
Conferencing, and Blogs
Groupware
 Allow
users to complete numerous tasks
electronically
 Send and receive e-mail, collaborate on work
tasks, schedule appointments, share files
 Software include Exchange, Groupwise, Lotus
Notes, and Outlook
Chapter
14-8
Groupware, Electronic
Conferencing, and Blogs
Instant Messaging Software
 Remote users
communicate in real time
 Electronic Conferencing
Knowledge Management
 Programs utilized
to distribute expertise within the
organization
Blogs
 Collaboration tool
 Create, share,
and leverage knowledge
Chapter
14-9
Study Break #1
Which of the following is most likely to contain only numbers?
A.Domain address
B.URL address
C.IP address
D.Postal address
Chapter
14-10
Study Break #1 - Answer
Which of the following is most likely to contain only numbers?
A.Domain address
B.URL address
C.IP address
D.Postal address
Chapter
14-11
Study Break #2
Which of the following enables users to view data with a web
browser?
A.Intranet
B.Extranet
C.Internet
D.All of these
Chapter
14-12
Study Break #2 - Answer
Which of the following enables users to view data with a web
browser?
A.Intranet
B.Extranet
C.Internet
D.All of these
Chapter
14-13
XBRL - Financial Reporting
on the Internet
eXtensible Markup Language (XML)
 Similar
to HTML
 Users define their own tags
 XML tags describe the data
eXtensible Business Reporting Language
 Tags
are standardized for business reporting
purposes
Chapter
14-14
XBRL Code
Chapter
14-15
XBRL - Financial Reporting
on the Internet
XBRL Instance Documents and Taxonomies
 Must
understand the standard tags
 Must understand the rules that govern the use of
the tags
Current Status of XBRL
 XBRL
International Consortium
Chapter
14-16
How XBRL Affects
Accountants
Chapter
14-17
XBRL - Financial Reporting
on the Internet
The Benefits of XBRL
 Transmit
financial data in standard format
 Data items are uniquely defined
 Searching for tags is easier (IDEA)
 Data is self-checking
 Automatic and reliable exchange of financial
information
 Companies are not constrained to specific formats
Chapter
14-18
XBRL - Financial Reporting
on the Internet
The Drawbacks of XBRL
 Requires
new users to learn, and conform to, the
standards of the language
 Evolving standards require conformity to
changing specifications
 No requirement for auditors to provide assurance
 Costs of transition
Chapter
14-19
Study Break #3
All of the following are markup languages (that use edit tags)
except:
A.HTML
B.BYTE
C.XML
D.XBRL
Chapter
14-20
Study Break #3 - Answer
All of the following are markup languages (that use edit tags)
except:
A.HTML
B.BYTE
C.XML
D.XBRL
Chapter
14-21
Study Break #4
A document file containing XBRL tags is a(n):
A.Extranet document
B.Intranet document
C.Instance document
D.URL
Chapter
14-22
Study Break #4 - Answer
A document file containing XBRL tags is a(n):
A.Extranet document
B.Intranet document
C.Instance document
D.URL
Chapter
14-23
Electronic Business
Definition
 Conduct
of business with computers and data
communications
Categories of Electronic Commerce
 Retail
sales
 E-payments and E-wallets
 Electronic data interchange
 Cloud-computing services
Chapter
14-24
Retail Sales
Overview
 Virtual
stores to sell directly to customers
 Automated AISs
Problems with Internet Retail Sales
 Legitimacy
of web sites
 Reliance upon e-mails
 Reliance upon suppliers
 Click fraud
 Privacy concerns
Chapter
14-25
Advantages of Virtual Stores
Chapter
14-26
E-Payments and E-Wallets
E-Payments
 Faster,
easier, and safer way to handle online
transactions
 E-payment service acts as intermediary
E-Wallet
 Store
consumer’s personal information
 Customers pay for purchases by providing their ewallet account numbers
Chapter
14-27
E-Payment System
Chapter
14-28
Business-to-Business
E-Commerce
Definition
 Businesses
buying and selling goods and services to
each other over the Internet
Advantages
 Shortens
time from purchase to delivery
 Expanded variety of vendors
 Reduces processing costs
 Wider availability of real-time data
Chapter
14-29
Electronic Data Interchange
Electronic Data Interchange
 Transmit
information over high-speed data
communications channels
 Automates exchange of business information
Chapter
14-30
Cloud Computing
Processing Services
 Platform
as a Service (PaaS)
Backup Services
 Maintain
copies of critical data
Educational Services
 Research
and using specialized web tutorials
Chapter
14-31
Advantages of Cloud
Computing
Chapter
14-32
Cloud Computing – Backup
Provider Example
Chapter
14-33
Privacy and Identity Theft
Definition
 Using
another person’s personal data that involves
fraud or deception
 Identity Theft and Assumption Deterrence Act of 1998
(ITADA)
Company Prevention
 Use
preventive controls
 Exercise reasonable caution to protect personal
information
Chapter
14-34
Safeguarding Personal Data
Chapter
14-35
Safeguarding Personal Data
Chapter
14-36
Security
Safeguarding electronic resources and limiting
access to authorized users
Access Security – Authentication
you have – plastic card
 What you know – unique information
 Who you are - fingerprints
 What
Chapter
14-37
Spam and Phishing
Spam
 Unsolicited
e-mail messages
 Increasingly costly to organizations
Phishing
 Websites
requesting personal information from
consumers
 Most information is typically stored in AISs
Chapter
14-38
Social Networking
Commercial Utilization
 Public
reaction to launch of new product
 Developing an online presence
Privacy Concerns
 Searching
for “red flags”
 Evaluate employees
 Disqualify job applicants
Chapter
14-39
Firewalls
Purpose
 Guards
against unauthorized access
 Stand-alone devices and/or software
Two Primary Methods
 Inclusion
– Access Control List (ACL)
 Exclusion
Problems
 Denial-of-Service Attacks
 Spoofing
Chapter
14-40
Firewall Example
Chapter
14-41
Firewall Hardware
Chapter
14-42
Intrusion Detection Systems
Passive IDSs
 Create
logs of potential intrusions
 Alert network administrators
Reactive IDSs
 Detect
potential intrusions dynamically
 Log off potentially malicious users
 Program firewalls to block messages from
suspected source
Chapter
14-43
Value-Added Networks
Definition
 Private,
point-to-point communication channels
 Usually created for security purposes
Methods of Creation
 Blank
slate, create from scratch
 Lease secure, dedicated transmission lines
 Create a Virtual Private Network (VPN)
Chapter
14-44
Value Private Networks
Definition
 Similar
to a VAN
 Transmit messages over existing Internet
connections
Creating Secure Data Transmission
 Use
“tunneling” security protocols
 Encrypt transmitted data
 Authenticate remote computer
Chapter
14-45
VAN-based EDI System
Chapter
14-46
Proxy Server
Definition
 Network
server that controls web access
Advantages
 Funnel
internet requests through a single server
 Examine and test requests for authenticity
 Limit employee access to approved websites
 Limit stored information
 Store frequently-accessed web pages (Cache)
Chapter
14-47
Data Encryption
Definition
 Transform
plaintext messages into unintelligible
cyphertext messages
Encryption key
 Mathematical
function dependent upon a large
prime number
 Data Encryption Standard (DES)
Chapter
14-48
Simple Data Encryption
Chapter
14-49
Data Encryption
Secret Key Cryptography
 Users
must keep the key secret and not share the
key with other parties
Public Key Encryption
 Each
party uses a pair of public/private encryption
keys
 SSL and S-HTTP
Chapter
14-50
Digital Signatures and Digital
Time Stamping
Digital Signature
 Encrypted
portion of message
 Digital Signature Standard (DSS)
Digital Certificate
 Certificate
Authority
Digital Time-Stamping Services (DTSSs)
Chapter
14-51
Study Break #5
Which of these statements is correct?
A.A VPN is a type of VAN
B.DES stands for “data entry system”
C.An IDS is the same as a firewall
D.All of these statements are correct
Chapter
14-52
Study Break #5 - Answer
Which of these statements is correct?
A.A VPN is a type of VAN
B.DES stands for “data entry system”
C.An IDS is the same as a firewall
D.All of these statements are correct
Chapter
14-53
Study Break #6
Spoofing means:
A.Kidding someone about their firewall
B.Simulating a disaster to test the effectiveness of a disaster
recovery system
C.Posing as an authentic user to gain access to a computer
system
D.Encrypting data for security purposes
Chapter
14-54
Study Break #6 - Answer
Spoofing means:
A.Kidding someone about their firewall
B.Simulating a disaster to test the effectiveness of a disaster
recovery system
C.Posing as an authentic user to gain access to a computer
system
D.Encrypting data for security purposes
Chapter
14-55
Copyright
Copyright 2011 John Wiley & Sons, Inc. All rights reserved.
Reproduction or translation of this work beyond that permitted in
Section 117 of the 1976 United States Copyright Act without the
express written permission of the copyright owner is unlawful.
Request for further information should be addressed to the
Permissions Department, John Wiley & Sons, Inc. The purchaser
may make backup copies for his/her own use only and not for distribution
or resale. The Publisher assumes no responsibility for errors, omissions,
or damages, caused by the use of these programs or from the use of the
information contained herein.
Chapter
14-56
Chapter 14
Chapter
14-57