• The Internet and the World Wide Web• XBRL - Financial Reporting on the Internet • Electronic Business • Privacy and Security on the Internet... John Wiley & Sons, Inc.. The Internet an
Trang 1Prepared by Paula Funkhouser University of Nevada, Reno
Core Concepts of Accounting Information Systems, 13th Edition
Mark G Simkin ● Jacob M Rose ● Carolyn S Norman
Accounting on the Internet
Chapter 2
Trang 2• The Internet and the World Wide Web
• XBRL - Financial Reporting on the Internet
• Electronic Business
• Privacy and Security on the Internet
Trang 3Copyright © 2015 John Wiley & Sons, Inc All rights reserved.
The Internet and
World Wide Web
• Internet Addresses and Software
• Intranets and Extranets
• The World Wide Web, HTML, and IDEA
• Groupware, Electronic Conferencing, and Blogs
Trang 4Copyright © 2015 John Wiley & Sons, Inc All rights reserved.
Internet Addresses and Software
• Domain Address
– Also called a Uniform Resource Locator (URL)
– www.Name.com.uk
• Internet Protocol (IP)
– Numeric address of domain address
– 207.142.131.248
– Transmission Control Protocol (TCP)
Trang 5Copyright © 2015 John Wiley & Sons, Inc All rights reserved.
Intranets and Extranets
• Intranets
– Based on same software as the Internet
– Internal to the organization
– Outsiders are unable to access information
• Extranets
– Enable external users to access intranets
– Utilize passwords or private data communications channels
Trang 6Copyright © 2015 John Wiley & Sons, Inc All rights reserved.
The World Wide Web,
HTML, and IDEA
• World Wide Web
– Multimedia portion of the Internet
• Hypertext Markup Language (HTML)
– Editing language
– Used in design of web pages
• Hypertext Transfer Protocol (HTTP)
– Communications protocol used to transfer web pages
Trang 7Copyright © 2015 John Wiley & Sons, Inc All rights reserved.
HTML Code
Trang 8Copyright © 2015 John Wiley & Sons, Inc All rights reserved.
Display of HTML Code
Trang 9– Allow users to complete numerous tasks electronically
– Send and receive e-mail, collaborate on work tasks,
schedule appointments, share files
– Software include Exchange, Groupwise, Lotus Notes, and
Outlook
Trang 10Copyright © 2015 John Wiley & Sons, Inc All rights reserved.
Groupware, Electronic
Conferencing, and Blogs
• Instant Messaging Software
– Remote users communicate in real time
Trang 11– Increase organization recognition
– Public reaction to launch of new product
– Developing an online presence
– Seeking new clients
– Communicate on projects
– Identify consumer anger
Trang 12Copyright © 2015 John Wiley & Sons, Inc All rights reserved.
Which of the following is most likely to contain only numbers?
Trang 13Copyright © 2015 John Wiley & Sons, Inc All rights reserved.
Which of the following enables users to view data with a web browser?
Trang 14– Users define their own tags
– XML tags describe the data
• eXtensible Business Reporting Language
– Tags are standardized for business reporting purposes
Trang 15Copyright © 2015 John Wiley & Sons, Inc All rights reserved.
XBRL Code
Trang 16Copyright © 2015 John Wiley & Sons, Inc All rights reserved.
XBRL - Financial Reporting
on the Internet
• XBRL Instance Documents and Taxonomies
– Must understand the standard tags
– Must understand the rules that govern the use of the tags
• Current Status of XBRL
– XBRL International Consortium
Trang 17Copyright © 2015 John Wiley & Sons, Inc All rights reserved.
How XBRL Affects Accountants
Trang 18– Transmit financial data in standard format
– Data items are uniquely defined
– Searching for tags is easier (IDEA)
– Data is self-checking
– Automatic and reliable exchange of financial information – Companies are not constrained to specific formats
Trang 20Copyright © 2015 John Wiley & Sons, Inc All rights reserved.
All of the following are markup languages (that use edit tags) except:
Trang 21Copyright © 2015 John Wiley & Sons, Inc All rights reserved.
A document file containing XBRL tags is a(n):
Trang 22Copyright © 2015 John Wiley & Sons, Inc All rights reserved.
Electronic Business
• Definition
– Conduct of business with computers and data communications
• Categories of Electronic Commerce
– Accounting
– Retail sales
– E-payments and E-wallets
– Electronic data interchange
– Cloud-computing services
Trang 23Copyright © 2015 John Wiley & Sons, Inc All rights reserved.
E-Accounting
• Performing accounting functions on the Internet
– Preparing financial reports
– Completing income tax returns
– Preparing budgets
– Writing reports
– Publishing financial information
Trang 24• Problems with Internet Retail Sales
– Legitimacy of web sites
– Reliance upon e-mails
– Reliance upon suppliers
– Click fraud
– Privacy concerns
Trang 25Copyright © 2015 John Wiley & Sons, Inc All rights reserved.
Advantages of Virtual Stores
Trang 26– Credit card information
– Sensitive information (example – Rx)
Trang 27Copyright © 2015 John Wiley & Sons, Inc All rights reserved.
E-Payments and E-Wallets
• E-Payments
– Faster, easier, and safer way to handle online transactions – E-payment service acts as intermediary
• E-Wallet
– Store consumer’s personal information
– Customers pay for purchases by providing their
e-wallet account numbers
Trang 28Copyright © 2015 John Wiley & Sons, Inc All rights reserved.
E-Payment System
Trang 29Copyright © 2015 John Wiley & Sons, Inc All rights reserved.
Virtual Currency
• Medium of exchange that operates
– Beyond restriction of a particular country
– Beyond monetary policies
• Example - Bitcoin
Trang 30Copyright © 2015 John Wiley & Sons, Inc All rights reserved.
Virtual Currency
• Retailers accept virtual currency
– Ability to do more business
– Ease of electronic transactions
– No need for credit card middlemen or check clearing
Trang 31Copyright © 2015 John Wiley & Sons, Inc All rights reserved.
Virtual Currency
• Risks with virtual currency
– Potential devaluation of currency in response to market
forces
– Transactions are not independently auditable
– Earlier virtual currencies have failed
– Unwillingness of others to accept it
Trang 32– Businesses buying and selling goods and services to each
other over the Internet
• Advantages
– Shortens time from purchase to delivery
– Expanded variety of vendors
– Reduces processing costs
– Wider availability of real-time data
Trang 33Copyright © 2015 John Wiley & Sons, Inc All rights reserved.
Electronic Data Interchange
• Electronic Data Interchange
– Transmit information over high-speed data
communications channels
– Automates exchange of business information
• Advantages
– Ability to fax documents
– Can include handwritten signatures
– Ability to exchange graphic and photographic documents
Trang 34Copyright © 2015 John Wiley & Sons, Inc All rights reserved.
Cloud Computing
• Processing Services
– Platform as a Service (PaaS)
• Storage and Backup Services
– Maintain copies of critical data
• Educational Services
– Research and using specialized web tutorials
Trang 35Copyright © 2015 John Wiley & Sons, Inc All rights reserved.
Advantages of Cloud Computing
Trang 36Copyright © 2015 John Wiley & Sons, Inc All rights reserved.
Privacy and Security
– Use preventive controls
– Exercise reasonable caution to protect personal
information
Trang 37Copyright © 2015 John Wiley & Sons, Inc All rights reserved.
Safeguarding Personal Data
Trang 38• Access Security – Authentication
– What you have – plastic card
– What you know – unique information
– Who you are - fingerprints
Trang 39Copyright © 2015 John Wiley & Sons, Inc All rights reserved.
Spam and Phishing
• Spam
– Unsolicited e-mail messages
– Increasingly costly to organizations
• Phishing
– Websites requesting personal information from consumers – Most information is typically stored in AISs
Trang 40Copyright © 2015 John Wiley & Sons, Inc All rights reserved.
Firewalls
• Purpose
– Guards against unauthorized access
– Stand-alone devices and/or software
• Two Primary Methods
– Inclusion – Access Control List (ACL)
– Exclusion
• Problems
– Denial-of-Service Attacks
– Spoofing
Trang 41Copyright © 2015 John Wiley & Sons, Inc All rights reserved.
Firewall Example
Trang 42Copyright © 2015 John Wiley & Sons, Inc All rights reserved.
Intrusion Detection Systems
• Passive IDSs
– Create logs of potential intrusions
– Alert network administrators
• Reactive IDSs
– Detect potential intrusions dynamically
– Log off potentially malicious users
– Program firewalls to block messages from suspected source
Trang 43Copyright © 2015 John Wiley & Sons, Inc All rights reserved.
Value-Added Networks
• Definition
– Private, point-to-point communication channels
– Usually created for security purposes
• Methods of Creation
– Blank slate, create from scratch
– Lease secure, dedicated transmission lines
– Create a Virtual Private Network (VPN)
Trang 44Copyright © 2015 John Wiley & Sons, Inc All rights reserved.
Virtual Private Networks
• Definition
– Similar to VAN
– Transmit messages over existing Internet connections
• Creating Secure Data Transmission
– Use “tunneling” security protocols
– Encrypt transmitted data
– Authenticate remote computer
Trang 45Copyright © 2015 John Wiley & Sons, Inc All rights reserved.
VAN-based EDI System
Trang 46– Funnel internet requests through a single server
– Examine and test requests for authenticity
– Limit employee access to approved websites
– Limit stored information
– Store frequently-accessed web pages (Cache)
Trang 48Copyright © 2015 John Wiley & Sons, Inc All rights reserved.
Simple Data Encryption
Trang 49Copyright © 2015 John Wiley & Sons, Inc All rights reserved.
Data Encryption
• Secret Key Cryptography
– Users must keep the key secret and not share the key with
other parties
• Public Key Encryption
– Each party uses a pair of public/private encryption keys – SSL and S-HTTP
Trang 50Copyright © 2015 John Wiley & Sons, Inc All rights reserved.
Digital Signatures and Digital Time Stamping
• Digital Signature
– Encrypted portion of message
– Digital Signature Standard (DSS)
• Digital Certificate
– Certificate Authority
• Digital Time-Stamping Services (DTSSs)
Trang 51Copyright © 2015 John Wiley & Sons, Inc All rights reserved.
Which of these statements is correct?
A A VPN is a type of VAN
B DES stands for “data entry system”
C An IDS is the same as a firewall
D All of these statements are correct
Study Break #5
Trang 52Copyright © 2015 John Wiley & Sons, Inc All rights reserved.
Spoofing means:
A Kidding someone about their firewall
B Simulating a disaster to test the effectiveness of a disaster recovery system
C Posing as an authentic user to gain access to a computer system
D Encrypting data for security purposes
Study Break #6