1. Trang chủ
  2. » Giáo án - Bài giảng

Core concepts of accounting information systems 13 by simkin norman chapter 02

52 293 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 52
Dung lượng 3,69 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

• The Internet and the World Wide Web• XBRL - Financial Reporting on the Internet • Electronic Business • Privacy and Security on the Internet... John Wiley & Sons, Inc.. The Internet an

Trang 1

Prepared by Paula Funkhouser University of Nevada, Reno

Core Concepts of Accounting Information Systems, 13th Edition

Mark G Simkin ● Jacob M Rose ● Carolyn S Norman

Accounting on the Internet

Chapter 2

Trang 2

• The Internet and the World Wide Web

• XBRL - Financial Reporting on the Internet

• Electronic Business

• Privacy and Security on the Internet

Trang 3

Copyright © 2015 John Wiley & Sons, Inc All rights reserved.

The Internet and

World Wide Web

• Internet Addresses and Software

• Intranets and Extranets

• The World Wide Web, HTML, and IDEA

• Groupware, Electronic Conferencing, and Blogs

Trang 4

Copyright © 2015 John Wiley & Sons, Inc All rights reserved.

Internet Addresses and Software

• Domain Address

– Also called a Uniform Resource Locator (URL)

– www.Name.com.uk

• Internet Protocol (IP)

– Numeric address of domain address

– 207.142.131.248

– Transmission Control Protocol (TCP)

Trang 5

Copyright © 2015 John Wiley & Sons, Inc All rights reserved.

Intranets and Extranets

• Intranets

– Based on same software as the Internet

– Internal to the organization

– Outsiders are unable to access information

• Extranets

– Enable external users to access intranets

– Utilize passwords or private data communications channels

Trang 6

Copyright © 2015 John Wiley & Sons, Inc All rights reserved.

The World Wide Web,

HTML, and IDEA

• World Wide Web

– Multimedia portion of the Internet

• Hypertext Markup Language (HTML)

– Editing language

– Used in design of web pages

• Hypertext Transfer Protocol (HTTP)

– Communications protocol used to transfer web pages

Trang 7

Copyright © 2015 John Wiley & Sons, Inc All rights reserved.

HTML Code

Trang 8

Copyright © 2015 John Wiley & Sons, Inc All rights reserved.

Display of HTML Code

Trang 9

– Allow users to complete numerous tasks electronically

– Send and receive e-mail, collaborate on work tasks,

schedule appointments, share files

– Software include Exchange, Groupwise, Lotus Notes, and

Outlook

Trang 10

Copyright © 2015 John Wiley & Sons, Inc All rights reserved.

Groupware, Electronic

Conferencing, and Blogs

• Instant Messaging Software

– Remote users communicate in real time

Trang 11

– Increase organization recognition

– Public reaction to launch of new product

– Developing an online presence

– Seeking new clients

– Communicate on projects

– Identify consumer anger

Trang 12

Copyright © 2015 John Wiley & Sons, Inc All rights reserved.

Which of the following is most likely to contain only numbers?

Trang 13

Copyright © 2015 John Wiley & Sons, Inc All rights reserved.

Which of the following enables users to view data with a web browser?

Trang 14

– Users define their own tags

– XML tags describe the data

• eXtensible Business Reporting Language

– Tags are standardized for business reporting purposes

Trang 15

Copyright © 2015 John Wiley & Sons, Inc All rights reserved.

XBRL Code

Trang 16

Copyright © 2015 John Wiley & Sons, Inc All rights reserved.

XBRL - Financial Reporting

on the Internet

• XBRL Instance Documents and Taxonomies

– Must understand the standard tags

– Must understand the rules that govern the use of the tags

• Current Status of XBRL

– XBRL International Consortium

Trang 17

Copyright © 2015 John Wiley & Sons, Inc All rights reserved.

How XBRL Affects Accountants

Trang 18

– Transmit financial data in standard format

– Data items are uniquely defined

– Searching for tags is easier (IDEA)

– Data is self-checking

– Automatic and reliable exchange of financial information – Companies are not constrained to specific formats

Trang 20

Copyright © 2015 John Wiley & Sons, Inc All rights reserved.

All of the following are markup languages (that use edit tags) except:

Trang 21

Copyright © 2015 John Wiley & Sons, Inc All rights reserved.

A document file containing XBRL tags is a(n):

Trang 22

Copyright © 2015 John Wiley & Sons, Inc All rights reserved.

Electronic Business

• Definition

– Conduct of business with computers and data communications

• Categories of Electronic Commerce

– Accounting

– Retail sales

– E-payments and E-wallets

– Electronic data interchange

– Cloud-computing services

Trang 23

Copyright © 2015 John Wiley & Sons, Inc All rights reserved.

E-Accounting

• Performing accounting functions on the Internet

– Preparing financial reports

– Completing income tax returns

– Preparing budgets

– Writing reports

– Publishing financial information

Trang 24

• Problems with Internet Retail Sales

– Legitimacy of web sites

– Reliance upon e-mails

– Reliance upon suppliers

– Click fraud

– Privacy concerns

Trang 25

Copyright © 2015 John Wiley & Sons, Inc All rights reserved.

Advantages of Virtual Stores

Trang 26

– Credit card information

– Sensitive information (example – Rx)

Trang 27

Copyright © 2015 John Wiley & Sons, Inc All rights reserved.

E-Payments and E-Wallets

• E-Payments

– Faster, easier, and safer way to handle online transactions – E-payment service acts as intermediary

• E-Wallet

– Store consumer’s personal information

– Customers pay for purchases by providing their

e-wallet account numbers

Trang 28

Copyright © 2015 John Wiley & Sons, Inc All rights reserved.

E-Payment System

Trang 29

Copyright © 2015 John Wiley & Sons, Inc All rights reserved.

Virtual Currency

• Medium of exchange that operates

– Beyond restriction of a particular country

– Beyond monetary policies

• Example - Bitcoin

Trang 30

Copyright © 2015 John Wiley & Sons, Inc All rights reserved.

Virtual Currency

• Retailers accept virtual currency

– Ability to do more business

– Ease of electronic transactions

– No need for credit card middlemen or check clearing

Trang 31

Copyright © 2015 John Wiley & Sons, Inc All rights reserved.

Virtual Currency

• Risks with virtual currency

– Potential devaluation of currency in response to market

forces

– Transactions are not independently auditable

– Earlier virtual currencies have failed

– Unwillingness of others to accept it

Trang 32

– Businesses buying and selling goods and services to each

other over the Internet

• Advantages

– Shortens time from purchase to delivery

– Expanded variety of vendors

– Reduces processing costs

– Wider availability of real-time data

Trang 33

Copyright © 2015 John Wiley & Sons, Inc All rights reserved.

Electronic Data Interchange

• Electronic Data Interchange

– Transmit information over high-speed data

communications channels

– Automates exchange of business information

• Advantages

– Ability to fax documents

– Can include handwritten signatures

– Ability to exchange graphic and photographic documents

Trang 34

Copyright © 2015 John Wiley & Sons, Inc All rights reserved.

Cloud Computing

• Processing Services

– Platform as a Service (PaaS)

• Storage and Backup Services

– Maintain copies of critical data

• Educational Services

– Research and using specialized web tutorials

Trang 35

Copyright © 2015 John Wiley & Sons, Inc All rights reserved.

Advantages of Cloud Computing

Trang 36

Copyright © 2015 John Wiley & Sons, Inc All rights reserved.

Privacy and Security

– Use preventive controls

– Exercise reasonable caution to protect personal

information

Trang 37

Copyright © 2015 John Wiley & Sons, Inc All rights reserved.

Safeguarding Personal Data

Trang 38

• Access Security – Authentication

– What you have – plastic card

– What you know – unique information

– Who you are - fingerprints

Trang 39

Copyright © 2015 John Wiley & Sons, Inc All rights reserved.

Spam and Phishing

• Spam

– Unsolicited e-mail messages

– Increasingly costly to organizations

• Phishing

– Websites requesting personal information from consumers – Most information is typically stored in AISs

Trang 40

Copyright © 2015 John Wiley & Sons, Inc All rights reserved.

Firewalls

• Purpose

– Guards against unauthorized access

– Stand-alone devices and/or software

• Two Primary Methods

– Inclusion – Access Control List (ACL)

– Exclusion

• Problems

– Denial-of-Service Attacks

– Spoofing

Trang 41

Copyright © 2015 John Wiley & Sons, Inc All rights reserved.

Firewall Example

Trang 42

Copyright © 2015 John Wiley & Sons, Inc All rights reserved.

Intrusion Detection Systems

• Passive IDSs

– Create logs of potential intrusions

– Alert network administrators

• Reactive IDSs

– Detect potential intrusions dynamically

– Log off potentially malicious users

– Program firewalls to block messages from suspected source

Trang 43

Copyright © 2015 John Wiley & Sons, Inc All rights reserved.

Value-Added Networks

• Definition

– Private, point-to-point communication channels

– Usually created for security purposes

• Methods of Creation

– Blank slate, create from scratch

– Lease secure, dedicated transmission lines

– Create a Virtual Private Network (VPN)

Trang 44

Copyright © 2015 John Wiley & Sons, Inc All rights reserved.

Virtual Private Networks

• Definition

– Similar to VAN

– Transmit messages over existing Internet connections

• Creating Secure Data Transmission

– Use “tunneling” security protocols

– Encrypt transmitted data

– Authenticate remote computer

Trang 45

Copyright © 2015 John Wiley & Sons, Inc All rights reserved.

VAN-based EDI System

Trang 46

– Funnel internet requests through a single server

– Examine and test requests for authenticity

– Limit employee access to approved websites

– Limit stored information

– Store frequently-accessed web pages (Cache)

Trang 48

Copyright © 2015 John Wiley & Sons, Inc All rights reserved.

Simple Data Encryption

Trang 49

Copyright © 2015 John Wiley & Sons, Inc All rights reserved.

Data Encryption

• Secret Key Cryptography

– Users must keep the key secret and not share the key with

other parties

• Public Key Encryption

– Each party uses a pair of public/private encryption keys – SSL and S-HTTP

Trang 50

Copyright © 2015 John Wiley & Sons, Inc All rights reserved.

Digital Signatures and Digital Time Stamping

• Digital Signature

– Encrypted portion of message

– Digital Signature Standard (DSS)

• Digital Certificate

– Certificate Authority

• Digital Time-Stamping Services (DTSSs)

Trang 51

Copyright © 2015 John Wiley & Sons, Inc All rights reserved.

Which of these statements is correct?

A A VPN is a type of VAN

B DES stands for “data entry system”

C An IDS is the same as a firewall

D All of these statements are correct

Study Break #5

Trang 52

Copyright © 2015 John Wiley & Sons, Inc All rights reserved.

Spoofing means:

A Kidding someone about their firewall

B Simulating a disaster to test the effectiveness of a disaster recovery system

C Posing as an authentic user to gain access to a computer system

D Encrypting data for security purposes

Study Break #6

Ngày đăng: 15/05/2017, 11:43

TỪ KHÓA LIÊN QUAN

🧩 Sản phẩm bạn có thể quan tâm