Chapter 14-1Chapter 14: Accounting on the Internet Introduction The Internet and the World Wide Web XBRL - Financial Reporting on the Internet Electronic Business Privacy and Security on
Trang 1Chapter 14-1
Chapter 14:
Accounting on the Internet
Introduction
The Internet and the World Wide Web
XBRL - Financial Reporting on the Internet
Electronic Business
Privacy and Security on the Internet
Trang 2Chapter 14-2
The Internet and World Wide Web
Internet Addresses and Software
Intranets and Extranets
The World Wide Web, HTML, and IDEA
Groupware, Electronic Conferencing, and Blogs
Trang 3Chapter 14-3
Internet Addresses and
Software
Domain Address
Also called a Uniform Resource Locator (URL)
www.Name.com.uk
Internet Protocol (IP)
Numeric address of domain address
207.142.131.248
Transmission Control Protocol (TCP)
Trang 4Chapter 14-4
Intranets and Extranets
Intranets
Based on same software as the Internet
Internal to the organization
Outsiders are unable to access information
Extranets
Enable external users to access intranets
Utilize passwords or private data communications channels
Trang 5Chapter 14-5
The World Wide Web,
HTML, and IDEA
World Wide Web
Multimedia portion of the Internet
Hypertext Markup Language (HTML)
Editing language
Used in design of web pages
Hypertext Transfer Protocol (HTTP)
Communications protocol used to transfer web pages
Trang 6Chapter 14-6
HTML Code
Trang 7Chapter 14-7
Display of HTML Code
Trang 8Chapter 14-8
Groupware, Electronic Conferencing, and Blogs
Groupware
Allow users to complete numerous tasks electronically
Send and receive e-mail, collaborate on work tasks, schedule appointments, share files
Software include Exchange, Groupwise, Lotus Notes, and Outlook
Trang 9Chapter 14-9
Groupware, Electronic Conferencing, and Blogs
Instant Messaging Software
Remote users communicate in real time
Trang 10Chapter 14-10
Which of the following is most likely to contain only numbers?
Trang 11Chapter 14-11
Which of the following is most likely to contain only numbers?
Trang 12Chapter 14-12
Which of the following enables users to view data with a web browser?
Trang 13Chapter 14-13
Which of the following enables users to view data with a web browser?
Trang 14Chapter 14-14
XBRL - Financial Reporting
on the Internet
eXtensible Markup Language (XML)
Similar to HTML
Users define their own tags
XML tags describe the data
eXtensible Business Reporting Language
Tags are standardized for business reporting purposes
Trang 15Chapter 14-15
XBRL Code
Trang 16Chapter 14-16
XBRL - Financial Reporting
on the Internet
XBRL Instance Documents and Taxonomies
Must understand the standard tags
Must understand the rules that govern the use of the tags
Current Status of XBRL
XBRL International Consortium
Trang 17Chapter 14-17
How XBRL Affects Accountants
Trang 18Chapter 14-18
XBRL - Financial Reporting
on the Internet
The Benefits of XBRL
Transmit financial data in standard format
Data items are uniquely defined
Searching for tags is easier (IDEA)
Data is self-checking
Automatic and reliable exchange of financial information
Companies are not constrained to specific formats
Trang 19Chapter 14-19
XBRL - Financial Reporting
on the Internet
The Drawbacks of XBRL
Requires new users to learn, and conform to, the standards of the language
Evolving standards require conformity to changing specifications
No requirement for auditors to provide assurance
Costs of transition
Trang 20Chapter 14-20
All of the following are markup languages (that use edit tags) except:
Trang 21Chapter 14-21
All of the following are markup languages (that use edit tags) except:
Trang 22Chapter 14-22
A document file containing XBRL tags is a(n):
Trang 23Chapter 14-23
A document file containing XBRL tags is a(n):
Trang 24Chapter 14-24
Electronic Business
Definition
Conduct of business with computers and data communications
Categories of Electronic Commerce
Retail sales
E-payments and E-wallets
Electronic data interchange
Cloud-computing services
Trang 25Chapter 14-25
Retail Sales
Overview
Virtual stores to sell directly to customers
Automated AISs
Problems with Internet Retail Sales
Legitimacy of web sites
Reliance upon e-mails
Reliance upon suppliers
Click fraud
Privacy concerns
Trang 26Chapter 14-26
Advantages of Virtual Stores
Trang 27Chapter 14-27
E-Payments and E-Wallets
E-Payments
Faster, easier, and safer way to handle online transactions
E-payment service acts as intermediary
E-Wallet
Store consumer’s personal information
Customers pay for purchases by providing their e-wallet account numbers
Trang 28Chapter 14-28
E-Payment System
Trang 29Chapter 14-29
Shortens time from purchase to delivery
Expanded variety of vendors
Reduces processing costs
Wider availability of real-time data
Trang 30Chapter 14-30
Electronic Data Interchange
Electronic Data Interchange
Transmit information over high-speed data communications channels
Automates exchange of business information
Trang 31Chapter 14-31
Trang 32Chapter 14-32
Advantages of Cloud
Computing
Trang 33Chapter 14-33
Cloud Computing – Backup
Provider Example
Trang 34Chapter 14-34
Privacy and Identity Theft
Use preventive controls
Exercise reasonable caution to protect personal
information
Trang 35Chapter 14-35
Safeguarding Personal Data
Trang 36Chapter 14-36
Safeguarding Personal Data
Trang 37Chapter 14-37
Security
Safeguarding electronic resources and limiting access to authorized users
Access Security – Authentication
What you have – plastic card
What you know – unique information
Who you are - fingerprints
Trang 38Chapter 14-38
Spam and Phishing
Spam
Unsolicited e-mail messages
Increasingly costly to organizations
Phishing
Websites requesting personal information from consumers
Most information is typically stored in AISs
Trang 39Chapter 14-39
Social Networking
Commercial Utilization
Public reaction to launch of new product
Developing an online presence
Trang 40Chapter 14-40
Firewalls
Purpose
Guards against unauthorized access
Stand-alone devices and/or software
Two Primary Methods
Inclusion – Access Control List (ACL)
Exclusion
Problems
Denial-of-Service Attacks
Spoofing
Trang 41Chapter 14-41
Firewall Example
Trang 42Chapter 14-42
Firewall Hardware
Trang 43Chapter 14-43
Intrusion Detection Systems
Passive IDSs
Create logs of potential intrusions
Alert network administrators
Reactive IDSs
Detect potential intrusions dynamically
Log off potentially malicious users
Program firewalls to block messages from suspected source
Trang 44Chapter 14-44
Value-Added Networks
Definition
Private, point-to-point communication channels
Usually created for security purposes
Methods of Creation
Blank slate, create from scratch
Lease secure, dedicated transmission lines
Create a Virtual Private Network (VPN)
Trang 45Chapter 14-45
Value Private Networks
Definition
Similar to a VAN
Transmit messages over existing Internet connections
Creating Secure Data Transmission
Use “tunneling” security protocols
Encrypt transmitted data
Authenticate remote computer
Trang 46Chapter 14-46
VAN-based EDI System
Trang 47Chapter 14-47
Proxy Server
Definition
Network server that controls web access
Advantages
Funnel internet requests through a single server
Examine and test requests for authenticity
Limit employee access to approved websites
Limit stored information
Store frequently-accessed web pages (Cache)
Trang 48Chapter 14-48
Data Encryption
Definition
Transform plaintext messages into unintelligible cyphertext messages
Encryption key
Mathematical function dependent upon a large prime number
Data Encryption Standard (DES)
Trang 49Chapter 14-49
Simple Data Encryption
Trang 50Chapter 14-50
Data Encryption
Secret Key Cryptography
Users must keep the key secret and not share the key with other parties
Public Key Encryption
Each party uses a pair of public/private encryption keys
SSL and S-HTTP
Trang 51Chapter 14-51
Digital Signatures and Digital
Time Stamping
Digital Signature
Encrypted portion of message
Digital Signature Standard (DSS)
Digital Certificate
Certificate Authority
Digital Time-Stamping Services (DTSSs)
Trang 52Chapter 14-52
Which of these statements is correct?
A.A VPN is a type of VAN
B.DES stands for “data entry system”
C.An IDS is the same as a firewall
D.All of these statements are correct
Study Break #5
Trang 53Chapter 14-53
Which of these statements is correct?
A.A VPN is a type of VAN
B.DES stands for “data entry system”
C.An IDS is the same as a firewall
D.All of these statements are correct
Study Break #5 - Answer
Trang 54Chapter 14-54
Spoofing means:
A.Kidding someone about their firewall
B.Simulating a disaster to test the effectiveness of a disaster
Trang 55Chapter 14-55
Spoofing means:
A.Kidding someone about their firewall
B.Simulating a disaster to test the effectiveness of a disaster
recovery system
C.Posing as an authentic user to gain access to a computer
system
D.Encrypting data for security purposes
Study Break #6 - Answer
Trang 56Chapter 14-56
Copyright
Copyright 2011 John Wiley & Sons, Inc All rights reserved
Reproduction or translation of this work beyond that permitted in
Section 117 of the 1976 United States Copyright Act without the
express written permission of the copyright owner is unlawful
Request for further information should be addressed to the
Permissions Department, John Wiley & Sons, Inc The purchaser
may make backup copies for his/her own use only and not for
distribution or resale The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein.
Trang 57Chapter 14-57
Chapter 14