Test 2 Review - PowerPoint PPT Presentation

1 / 25
About This Presentation
Title:

Test 2 Review

Description:

Companies register competitors' domain names and use them as their own. Agents warehouse domain names and try to extract high fees for transfers ... – PowerPoint PPT presentation

Number of Views:83
Avg rating:3.0/5.0
Slides: 26
Provided by: temp
Category:
Tags: domain | names | review | test

less

Transcript and Presenter's Notes

Title: Test 2 Review


1
Test 2 Review
2
Internet Markup Languages
  • HTML
  • XML
  • XBRL

3
Three components of e-commerce
  • Economic exchange
  • Electronic transmission
  • Transportation

4
E-commerce and e-business
E-commerce
E-business-- Transaction elements
5
E-commerce vs. traditional commerce
  • E-commerce customers actively search a large set
    of sellers
  • Broadcast advertising is less effective in
    e-commerce
  • Media is less active and buyers are more active
    in e-commerce

6
Comparing systems
  • Electronic Data Exchange (EDI)
  • Value Added Network
  • Internet based e-commerce
  • Non-EDI/Non-internet system
  • (e-mail?)

7
EDI vs. Internet
  • EDI
  • Formal contracts
  • Fixed data transfer standards
  • Dedicated or secure telecommunications
  • Long term relationships
  • Internet
  • Event driven
  • Standards only now developing
  • Open systems
  • Based on event level trust relationships

8
Definition of the Internet
  • Network of networks
  • May connect to local area networks (LAN)
  • May interface with EDI systems
  • Hypertext links
  • Navigate the internet via hypertext links
  • Text or image that has another internet address
    attached to it
  • Data are transmitted in small addressed pieces
    called packets

9
IP addresses and domain names
  • Internet protocol (IP) addresses
  • 111.111.111.111
  • Each block can be 0-255
  • Domain name
  • www.utsa.edu
  • Domain name host
  • Domain name warehousing
  • E-mail address
  • Name_at_utsa.edu

10
Domain name disputes
  • Companies with similar names try to register the
    same domain name
  • Companies register competitors domain names and
    use them as their own
  • Agents warehouse domain names and try to extract
    high fees for transfers

11
Auditing of e-commerce systems
  • Auditing around the computer
  • Processing portion is ignored
  • Reports and alarms
  • Logs and data files
  • Auditing through the computer
  • Verification of controls in a computerized system
  • How is electronic data collected
  • What authentication techniques are employed

12
Categories or concerns in web-based e-commerce
  • What are examples of each of these
  • Security of data
  • Business policies
  • Transaction processing integrity
  • Privacy of data

13
Trust Seals
  • TRUSTe
  • WebTrust
  • Verisign
  • BBBOnline
  • Issues
  • Cost
  • Authentication
  • Who uses them
  • What is required to earn

14
EDI
  • Financial EDI
  • Partial EDI
  • Fully Integrated EDI
  • EDI/Web-based interface

15
Savings and costs of e-commerce
  • How does technology
  • Lower costs
  • Improve accuracy
  • Improve timeliness
  • Increase/decrease reliability
  • Increase/decrease security

16
What are the e-business relationships
  • B2C
  • B2B
  • G2B
  • G2C
  • Where is the most opportunity for growth?

17
Encryption
  • Tight regulations on strong encryption
  • Trend is to allow export of stronger encryption
  • To subsidiaries
  • To business partners
  • Still highly controlled
  • Potential illegal activity
  • Loss of potential business for US companies

18
EDI transaction standards
  • EDIFACT
  • ANSI ASC X12
  • XBRL

19
Value Added Networks (VAN) provide
  • Increased security of data during transmission
  • Audit trails
  • Acknowledgements
  • Authentication
  • Note that when the internet is incorporated with
    EDI security of transactions decreases

20
Consumer risks on the internet
  • False websites stealing credit card information
  • Theft of customer data from sellers or ISP
  • Invasion of privacy
  • Cookies
  • Are there legitimate uses of cookies?

21
What is a
  • Virus-replicates itself and spreads to other
    programs
  • Wormmoves from program to program over a network
    getting bigger as it moves
  • Trojan horselike a virus but stays within a
    single system
  • Virus Hoax
  • Sniffer
  • Hacker

22
Hackers may
  • Destroy data or programs
  • Use data without authorization
  • Alter applications
  • Lock up systems by causing buffer overflows
  • Cause denial of service attacks

23
  • Firewalls are protections against hackers
  • Digital signatures are tools for verifying
    acceptances of contracts

24
Be ready to explain
  • The differences between EDI and web-based
    e-commerce
  • What are trust seals? How and why are they used?
  • What are cookies? What are their legitimate and
    illegitimate uses?
  • Why is it important that internal and web-based
    systems be fully integrated?
  • How does doing business on the web impact
    auditing?
  • How do you construct a website? How should files
    be identified and related to each other?

25
  • Risks for customers and merchants resulting from
    Internet based commerce.
  • Domain names, issues related to the
    authorization, protection and marketing of domain
    names.
  • Markup languages, how they are used on the
    Internet, problems and solutions associated with
    markup languages.
  • The impact of e-commerce on operating cost,
    timeliness, accuracy, reliability and security of
    transactions.
Write a Comment
User Comments (0)
About PowerShow.com