SlideShare a Scribd company logo
1 of 55
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Accounting Information Systems, 8e
James A. Hall
Chapter 12
Electronic Commerce Systems
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Objectives for Chapter 12
 Be acquainted with the topologies that are employed
to achieve connectivity across the Internet.
 Possess a conceptual appreciation of the protocols
and understand the specific purposes several Internet
protocols serve.
 Understand the business benefits associated with
Internet commerce and be aware of several Internet
business models.
 Be familiar with risks associated with intranet and
Internet electronic commerce.
 Understand issues of security, assurance, and trust
pertaining to electronic commerce.
 Be familiar with electronic commerce implications for
the accounting profession.
2
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
What is E-Commerce?
The electronic processing and transmission
of business data
 electronic buying and selling of goods and
services
 on-line delivery of digital products
 electronic funds transfer (EFT)
 electronic trading of stocks
 direct consumer marketing
 electronic data interchange (EDI)
 the Internet revolution
3
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Internet Technologies
 Packet switching
 messages are divided into small packets
 each packet of the message takes a different routes
 Virtual private network (VPN)
 a private network within a public network
 Extranets
 a password controlled network for private users
 World Wide Web
 an Internet facility that links users locally and globally
 Internet addresses
 e-mail address
 URL address
 IP address
4
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Protocol Functions…
 facilitate the physical connection between
the network devices.
 synchronize the transfer of data between
physical devices.
 provide a basis for error checking and
measuring network performance.
 promote compatibility among network
devices.
 promote network designs that are flexible,
expandable, and cost-effective.
5
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Internet Protocols
 Transfer Control Protocol/Internet Protocol
(TCP/IP) - controls how individual packets of
data are formatted, transmitted, and received
 Hypertext Transfer Protocol (HTTP) - controls
web browsers
 File Transfer Protocol (FTP) - used to transfer
files across the internet
 Simple Network Mail Protocol (SNMP) - e-
mail
 Secure Sockets Layer (SSL) and Secure
Electronic Transmission (SET) - encryption
schemes
6
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Open System Interface (OSI)
 The International Standards
Organization developed a layered set
of protocols called OSI.
 The purpose of OSI is to provide
standards by which the products of
different manufacturers can interface
with one another in a seamless
interconnection at the user level.
7
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
The OSI Protocol
Layer 1 Physical
Layer 2 Data Link
Layer 3 Network
Layer 4 Transport
Layer 5 Session
Layer 6 Presentation
Layer 7 Application
HARD
WARE
Layer 1 Physical
Layer 2 Data Link
Layer 3 Network
Layer 4 Transport
Layer 5 Session
Layer 6 Presentation
Layer 7 Application
HARD-
WARE
Data
Manipulation
Tasks
Data
Communications
Tasks
Communications Channel
NODE 1 NODE 2
HARD-
WARE
8
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Benefits of Internet Commerce
 Access to a worldwide customer and/or
supplier base
 Reductions in inventory investment and
carrying costs
 Rapid creation of business partnerships to fill
emerging market niches
 Reductions in retail prices through lower
marketing costs
 Reductions in procurement costs
 Better customer service
9
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
The Internet Business Model
 Information level
 using the Internet to display and make accessible
information about the company, its products,
services, and business policies
 Transaction level
 using the Internet to accept orders from
customers and/or to place them with their
suppliers
 Distribution level
 using the Internet to sell and deliver digital
products to customers
10
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Cloud Computing
 is a model for enabling convenient, on-
demand network access to a shared pool of
configurable computing resources that can be
rapidly provisioned and released with minimal
management effort or service provider
interaction.
11
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Cloud Computing: Key Features
 Client firms can acquire IT resources from
vendors on demand and as needed.
 Resources are provided over a network and
accessed through network terminals at the
client location.
 Acquisition of resources is rapid and infinitely
scalable.
 Computing resources are pooled to meet the
needs of multiple client firms.
12
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Cloud Computing: Primary Services
 Software-as-a-Service (SaaS)
 service providers host applications for client
organizations over a network.
 Infrastructure-as-a-Service (IaaS)
 the provision of computing power and disk space
to client firms who access it from desktop PCs.
 Platform-as-a-Service (PaaS)
 enables client firms to develop and deploy onto the
cloud infrastructure consumer-generated
applications using vendor-provided facilities.
13
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Virtualization
 The technology that unleashed cloud
computing.
 Virtualization multiplies the effectiveness of the
physical system by creating virtual versions of
the computer with separate operating systems
that reside in the same physical equipment.
 Virtualization is the concept of running more than
one virtual computer on one physical computer.
 Since each virtual system runs its own application,
total computing power is multiplied with no additional
hardware investment.
14
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Cloud Computing: Issues
 Cloud computing is not for all companies.
 Large companies’ needs may conflict with the
cloud solution because these firms have
 already incurred massive investments in
equipment, proprietary software, and human
resources.
 mission-critical functions running on legacy
systems that are many decades old.
 no interest in a one-size-fits-all mentality.
 concerns about internal control and security issues
due to outsourcing IT to the cloud.
15
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Dynamic Virtual Organization
16
Perhaps the greatest
potential benefit to
be derived from
e-commerce is the
firm’s ability to forge
dynamic business
alliances with other
organizations to fill
unique market
niches as the
opportunities arise.
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Areas of General Concern
 Data Security: are stored and
transmitted data adequately protected?
 Business Policies: are policies publicly
stated and consistently followed?
 Privacy: how confidential are customer
and trading partner data?
 Business Process Integrity: how
accurately, completely, and consistently
does the company process its
transactions?
17
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Intranet Risks
 Intercepting network messages
 sniffing: interception of user IDs, passwords,
confidential e-mails, and financial data files
 Accessing corporate databases
 connections to central databases increase the risk
that data will be accessible by employees
 Privileged employees
 override privileges may allow unauthorized access
to mission-critical data
 Reluctance to prosecute
 fear of negative publicity leads to such reluctance
but encourages criminal behavior
18
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Internet Risks to Consumers
 How serious is the risk?
 National Consumer League: Internet fraud rose by
600% between 1997 and 1998
 SEC: e-mail complaints alleging fraud rose from
12 per day in 1997 to 200-300 per day in 1999
 Major areas of concern:
 Theft of credit card numbers
 Theft of passwords
 Consumer privacy--cookies
19
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Internet Risks to Businesses
 IP spoofing: masquerading to gain access to
a Web server and/or to perpetrate an
unlawful act without revealing one’s identity
 Denial of service (DOS) attacks: assaulting a
Web server to prevent it from servicing users
 particularly devastating to business entities that
cannot receive and process business transactions
 Other malicious programs: viruses, worms,
logic bombs, and Trojan horses pose a threat
to both Internet and Intranet users
20
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
SYN Flood DOS Attack
21
Sender Receiver
Step 1: SYN messages
Step 2: SYN/ACK
Step 3: ACK packet code
In a DOS Attack, the sender sends hundreds of messages, receives the
SYN/ACK packet, but does not response with an ACK packet. This
leaves the receiver with clogged transmission ports, and legitimate
messages cannot be received.
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Three Common Types of DOS Attacks
 SYN Flood – when the three-way handshake
needed to establish an Internet connection occurs,
the final acknowledgement is not sent by the DOS
attacker, thereby tying-up the receiving server while it
waits.
 Smurf – the DOS attacker uses numerous
intermediary computer to flood the target computer
with test messages, “pings”.
 Distributed DOS (DDOS) – can take the form of
Smurf or SYN attacks, but distinguished by the vast
number of “zombie” computers hi-jacked to launch
the attacks.
22
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
23
SMURF Attack
Figure 12-3
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
24
Distributed Denial of Service Attack
Figure 12-4
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
E-Commerce Security:
Data Encryption
 Encryption - A computer program
transforms a clear message into a coded
(ciphertext) form using an algorithm.
25
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
26
Public Key Encryption
Figure 12-5
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
E-Commerce Security:
Digital Authentication
 Digital signature: electronic authentication
technique that ensures that the transmitted
message originated with the authorized sender
and that it was not tampered with after the
signature was applied
 Digital certificate: like an electronic
identification card that is used in conjunction
with a public key encryption system to verify
the authenticity of the message sender
27
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
E-Commerce Security: Firewalls
 Firewalls: software and hardware that
provide security by channeling all network
connections through a control gateway
 Network level firewalls
 low cost/low security access control
 uses a screening router to its destination
 does not explicitly authenticate outside users
 penetrate the system using an IP spoofing technique
 Application level firewalls
 high level/high cost customizable network security
 allows routine services and e-mail to pass through
 performs sophisticated functions such as logging or
user authentication for specific tasks 28
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Seals of Assurance
 “Trusted” third-party organizations offer seals
of assurance that businesses can display on
their Web site home pages:
 BBB
 TRUSTe
 Veri-Sign, Inc
 ICSA
 AICPA/CICA WebTrust
 AICPA/CICA SysTrust
29
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Implications for Accounting
 Privacy violation
 major issues:
• a stated privacy policy
• consistent application of stated privacy policies
• what information is the company capturing
• sharing or selling of information
• ability of individuals and businesses to verify
and update information captured about them
 1995 Safe Harbor Agreement
• establishes standards for information transmittal
between US and European companies
30
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Implications for Accounting
 Continuous auditing
 auditors review transactions at frequent
intervals or as they occur
 intelligent control agents: heuristics that
search electronic transactions for anomalies
 Electronic audit trails
 electronic transactions generated without
human intervention
 no paper audit trail
31
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Implications for Accounting
 Confidentiality of data
 open system designs allow mission-critical
information to be at the risk to intruders
 Authentication
 in e-commerce systems, determining the
identity of the customer is not a simple task
 Nonrepudiation
 repudiation can lead to uncollected revenues or
legal action
 use digital signatures and digital certificates
32
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Implications for Accounting
 Data integrity
 determine whether data has been intercepted
and altered
 Access controls
 prevent unauthorized access to data
 Changing legal environment
 provide client with estimate of legal exposure
33
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Appendix
34
Intra-Organizational
Electronic Commerce
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Local Area Networks (LAN)
 A federation of computers located close
together (on the same floor or in the same
building) linked together to share data and
hardware
 The physical connection of workstations to the
LAN is achieved through a network interface
card (NIC) which fits into a PC’s expansion slot
and contains the circuitry necessary for inter-node
communications.
 A server is used to store the network operating
system, application programs, and data to be
shared.
35
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
File Server
LAN
LAN
Node
Node
Node
Node
Printer Server
Files
Printer
36
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Wide Area Network (WAN)
 A WAN is a network that is dispersed over a
wider geographic area than a LAN. It
typically requires the use of:
 gateways to connect different types of
LANs
 bridges to connect same-type LANs
 WANs may use common carrier facilities,
such as telephone lines, or they may use a
Value Added Network (VAN).
37
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
LAN
LAN
Bridge
Gateway
Gateway
LAN
WAN
WAN
38
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Star Topology
 A network of IPUs with a large central
computer (the host)
 The host computer has direct connections
to smaller computers, typically desktop or
laptop PCs.
 This topology is popular for mainframe
computing.
 All communications must go through the
host computer, except for local computing.
39
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Local Data Local Data
Local Data
Local Data
Central Data
POS
POS
POS
POS
POS
Topeka St. Louis
Kansas
City
Dallas
Tulsa
Star Network
40
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Hierarchical Topology
 A host computer is connected to several
levels of subordinate smaller computers in
a master-slave relationship.
41
Production
Planning System
Production
Scheduling
System
Regional
Sales System
Warehouse
System
Warehouse
System
Production
System
Production
System
Sales
Processing
System
Sales
Processing
System
Sales
Processing
System
Corporate
Level
Regional
Level
Local
Level
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Ring Topology
 This configuration eliminates the central
site. All nodes in this configuration are
of equal status (peers).
 Responsibility for managing
communications is distributed among
the nodes.
 Common resources that are shared by
all nodes can be centralized and
managed by a file server that is also a
node.
42
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
43
Ring Topology
Figure 12-10
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Bus Topology
 The nodes are all connected to a
common cable - the bus.
 Communications and file transfers
between workstations are controlled by
a server.
 It is generally less costly to install than a
ring topology.
44
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
45
Bus Topology
Figure 12-11
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Client-Server Topology
 This configuration distributes the
processing between the user’s (client’s)
computer and the central file server.
 Both types of computers are part of the
network, but each is assigned functions
that it best performs.
 This approach reduces data
communications traffic, thus reducing
queues and increasing response time.
46
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
47
Client-Server Topology
Figure 12-12
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Network Control Objectives
 establish a communications session
between the sender and the receiver
 manage the flow of data across the network
 detect errors in data caused by line failure or
signal degeneration
 detect and resolve data collisions between
competing nodes
48
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
49
Figure 12-13
Polling Method
of Controlling Data Collisions
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
50
Figure 12-14
Token-Passing Approach to Controlling Data Collision
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Carrier Sensing
 A random access technique that detects
collisions when they occur
 This technique is widely used--found on Ethernets.
 The node wishing to transmit listens to the line to
determine if in use. If it is, it waits a pre-specified
time to transmit.
 Collisions occur when nodes listen, hear no
transmissions, and then simultaneously transmit.
Data collides and the nodes are instructed to hang
up and try again.
 Disadvantage: The line may not be used optimally
when multiple nodes are trying to transmit
simultaneously.
51
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
What is Electronic Data
Interchange (EDI)?
 The exchange of business
transaction information:
 between companies
 in a standard format (ANSI X.12 or
EDIFACT)
 via a computerized information system
 In “pure” EDI systems, human
involvements is not necessary to
approve transactions. 52
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Communications Links
 Companies may have internal EDI
translation/communication software and
hardware.
OR
 They may subscribe to VANs to perform
this function without having to invest in
personnel, software, and hardware.
53
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
54
Overview of EDI
Figure 12-15
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Advantages of EDI
 Reduction or elimination of data entry
 Reduction of errors
 Reduction of paper
 Reduction of paper processing and
postage
 Reduction of inventories (via JIT
systems)
55

More Related Content

What's hot

Chapter 8
Chapter 8Chapter 8
Chapter 8uabir
 
Introduction to Transaction Processing Chapter No. 2
Introduction to Transaction Processing   Chapter No. 2Introduction to Transaction Processing   Chapter No. 2
Introduction to Transaction Processing Chapter No. 2Qamar Farooq
 
Chapter 6: Transaction Processing and Financial Reporting Systems Overview (C...
Chapter 6: Transaction Processing and Financial Reporting Systems Overview (C...Chapter 6: Transaction Processing and Financial Reporting Systems Overview (C...
Chapter 6: Transaction Processing and Financial Reporting Systems Overview (C...Vhena Pilongo
 
Audit of the acquisition and payment cycle
Audit of the acquisition and payment cycleAudit of the acquisition and payment cycle
Audit of the acquisition and payment cyclesellyhood
 
Ethics fraud & internal control ppt @ dom s
Ethics fraud & internal control ppt @ dom sEthics fraud & internal control ppt @ dom s
Ethics fraud & internal control ppt @ dom sBabasab Patil
 
Auditing the sales and collections cycle
Auditing the sales and collections cycleAuditing the sales and collections cycle
Auditing the sales and collections cyclemit111217
 

What's hot (20)

Pp 16-new
Pp 16-newPp 16-new
Pp 16-new
 
Deegan fat4e ppt_ch09
Deegan fat4e ppt_ch09Deegan fat4e ppt_ch09
Deegan fat4e ppt_ch09
 
James hall ch 4
James hall ch 4James hall ch 4
James hall ch 4
 
James hall ch 15
James hall ch 15James hall ch 15
James hall ch 15
 
James hall ch 1
James hall ch 1James hall ch 1
James hall ch 1
 
Pp 03-new
Pp 03-newPp 03-new
Pp 03-new
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
 
James hall ch 5
James hall ch 5James hall ch 5
James hall ch 5
 
James hall ch 9
James hall ch 9James hall ch 9
James hall ch 9
 
Revenue cycle (AIS)
Revenue cycle (AIS)Revenue cycle (AIS)
Revenue cycle (AIS)
 
Pp 02-new
Pp 02-newPp 02-new
Pp 02-new
 
James hall ch 2
James hall ch 2James hall ch 2
James hall ch 2
 
Pp 17-new
Pp 17-newPp 17-new
Pp 17-new
 
Introduction to Transaction Processing Chapter No. 2
Introduction to Transaction Processing   Chapter No. 2Introduction to Transaction Processing   Chapter No. 2
Introduction to Transaction Processing Chapter No. 2
 
Chapter 6: Transaction Processing and Financial Reporting Systems Overview (C...
Chapter 6: Transaction Processing and Financial Reporting Systems Overview (C...Chapter 6: Transaction Processing and Financial Reporting Systems Overview (C...
Chapter 6: Transaction Processing and Financial Reporting Systems Overview (C...
 
Audit of the acquisition and payment cycle
Audit of the acquisition and payment cycleAudit of the acquisition and payment cycle
Audit of the acquisition and payment cycle
 
Ethics fraud & internal control ppt @ dom s
Ethics fraud & internal control ppt @ dom sEthics fraud & internal control ppt @ dom s
Ethics fraud & internal control ppt @ dom s
 
Pp 02-new
Pp 02-newPp 02-new
Pp 02-new
 
Auditing the sales and collections cycle
Auditing the sales and collections cycleAuditing the sales and collections cycle
Auditing the sales and collections cycle
 
Pp 06-new
Pp 06-newPp 06-new
Pp 06-new
 

Similar to Pp 12-new

Incorporating cloud computing for enhanced communication v2
Incorporating cloud computing for enhanced communication v2Incorporating cloud computing for enhanced communication v2
Incorporating cloud computing for enhanced communication v2Christian Verstraete
 
Firewall friendly pipeline for secure data access
Firewall friendly pipeline for secure data accessFirewall friendly pipeline for secure data access
Firewall friendly pipeline for secure data accessSumit Sarkar
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewallsCastleforce
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloudtcarrucan
 
Virtualization and cloud impact overview auditor spin enterprise gr-cv3
Virtualization and cloud impact overview auditor spin   enterprise gr-cv3Virtualization and cloud impact overview auditor spin   enterprise gr-cv3
Virtualization and cloud impact overview auditor spin enterprise gr-cv3EnterpriseGRC Solutions, Inc.
 
Cloud computing Introductory Session
Cloud computing Introductory SessionCloud computing Introductory Session
Cloud computing Introductory SessionAbhinav Parmar
 
Cisco Domain Ten solution overview
Cisco Domain Ten solution overviewCisco Domain Ten solution overview
Cisco Domain Ten solution overviewCharles Malkiel
 
IRJET - Cloud Computing Over Traditional Computing
IRJET - Cloud Computing Over Traditional ComputingIRJET - Cloud Computing Over Traditional Computing
IRJET - Cloud Computing Over Traditional ComputingIRJET Journal
 
Introduction to Cloud B2B Integration
Introduction to Cloud B2B IntegrationIntroduction to Cloud B2B Integration
Introduction to Cloud B2B IntegrationMark Morley, MBA
 
PowerPoint Presentation
PowerPoint Presentation PowerPoint Presentation
PowerPoint Presentation christina0310
 
Gvf rio cloud computing for slideshare 24 apr14
Gvf rio cloud computing for slideshare 24 apr14Gvf rio cloud computing for slideshare 24 apr14
Gvf rio cloud computing for slideshare 24 apr14Orange Business Services
 
ScenarioIntegrated Distributors Incorporated (IDI), a public.docx
ScenarioIntegrated Distributors Incorporated (IDI), a public.docxScenarioIntegrated Distributors Incorporated (IDI), a public.docx
ScenarioIntegrated Distributors Incorporated (IDI), a public.docxtodd491
 
Implementing cloud based devops for distributed agile projects
Implementing cloud based devops for distributed agile projectsImplementing cloud based devops for distributed agile projects
Implementing cloud based devops for distributed agile projectsTom Stiehm
 
How the Cloud is Revolutionizing the Retail Industry
How the Cloud is Revolutionizing the Retail IndustryHow the Cloud is Revolutionizing the Retail Industry
How the Cloud is Revolutionizing the Retail IndustryRaymark
 
Cloud Computing Webinar - John Reza
Cloud Computing Webinar - John RezaCloud Computing Webinar - John Reza
Cloud Computing Webinar - John RezaJohn Reza, MBA
 

Similar to Pp 12-new (20)

Pp 14-new
Pp 14-newPp 14-new
Pp 14-new
 
Incorporating cloud computing for enhanced communication v2
Incorporating cloud computing for enhanced communication v2Incorporating cloud computing for enhanced communication v2
Incorporating cloud computing for enhanced communication v2
 
Firewall friendly pipeline for secure data access
Firewall friendly pipeline for secure data accessFirewall friendly pipeline for secure data access
Firewall friendly pipeline for secure data access
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloud
 
Virtualization and cloud impact overview auditor spin enterprise gr-cv3
Virtualization and cloud impact overview auditor spin   enterprise gr-cv3Virtualization and cloud impact overview auditor spin   enterprise gr-cv3
Virtualization and cloud impact overview auditor spin enterprise gr-cv3
 
Cloud computing Introductory Session
Cloud computing Introductory SessionCloud computing Introductory Session
Cloud computing Introductory Session
 
Cisco Domain Ten solution overview
Cisco Domain Ten solution overviewCisco Domain Ten solution overview
Cisco Domain Ten solution overview
 
IRJET - Cloud Computing Over Traditional Computing
IRJET - Cloud Computing Over Traditional ComputingIRJET - Cloud Computing Over Traditional Computing
IRJET - Cloud Computing Over Traditional Computing
 
AE foyer: From Server Virtualization to Hybrid Cloud
AE foyer: From Server Virtualization to Hybrid CloudAE foyer: From Server Virtualization to Hybrid Cloud
AE foyer: From Server Virtualization to Hybrid Cloud
 
Introduction to Cloud B2B Integration
Introduction to Cloud B2B IntegrationIntroduction to Cloud B2B Integration
Introduction to Cloud B2B Integration
 
Pp 15-new
Pp 15-newPp 15-new
Pp 15-new
 
PowerPoint Presentation
PowerPoint Presentation PowerPoint Presentation
PowerPoint Presentation
 
Gvf rio cloud computing for slideshare 24 apr14
Gvf rio cloud computing for slideshare 24 apr14Gvf rio cloud computing for slideshare 24 apr14
Gvf rio cloud computing for slideshare 24 apr14
 
ScenarioIntegrated Distributors Incorporated (IDI), a public.docx
ScenarioIntegrated Distributors Incorporated (IDI), a public.docxScenarioIntegrated Distributors Incorporated (IDI), a public.docx
ScenarioIntegrated Distributors Incorporated (IDI), a public.docx
 
Implementing cloud based devops for distributed agile projects
Implementing cloud based devops for distributed agile projectsImplementing cloud based devops for distributed agile projects
Implementing cloud based devops for distributed agile projects
 
How the Cloud is Revolutionizing the Retail Industry
How the Cloud is Revolutionizing the Retail IndustryHow the Cloud is Revolutionizing the Retail Industry
How the Cloud is Revolutionizing the Retail Industry
 
Cloud computing usa
Cloud computing usaCloud computing usa
Cloud computing usa
 
bishu pdf1
bishu pdf1bishu pdf1
bishu pdf1
 
Cloud Computing Webinar - John Reza
Cloud Computing Webinar - John RezaCloud Computing Webinar - John Reza
Cloud Computing Webinar - John Reza
 

More from Sri Apriyanti Husain

7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...
7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...
7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...Sri Apriyanti Husain
 
7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...
7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...
7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...Sri Apriyanti Husain
 
15 ma aksya_tafakkur ke 1_sri apriyanti husain
15 ma aksya_tafakkur ke 1_sri apriyanti husain15 ma aksya_tafakkur ke 1_sri apriyanti husain
15 ma aksya_tafakkur ke 1_sri apriyanti husainSri Apriyanti Husain
 
15 ma aksya_tafakkur ke 1_sri apriyanti husain
15 ma aksya_tafakkur ke 1_sri apriyanti husain15 ma aksya_tafakkur ke 1_sri apriyanti husain
15 ma aksya_tafakkur ke 1_sri apriyanti husainSri Apriyanti Husain
 
Formulir pendaftaran-s3 p ps feb ub
Formulir pendaftaran-s3 p ps feb ubFormulir pendaftaran-s3 p ps feb ub
Formulir pendaftaran-s3 p ps feb ubSri Apriyanti Husain
 
Informasi pendaftaran pasca s2 & s3
Informasi pendaftaran  pasca s2 & s3Informasi pendaftaran  pasca s2 & s3
Informasi pendaftaran pasca s2 & s3Sri Apriyanti Husain
 
Informasi pendaftaran pasca s2 & s3
Informasi pendaftaran  pasca s2 & s3Informasi pendaftaran  pasca s2 & s3
Informasi pendaftaran pasca s2 & s3Sri Apriyanti Husain
 
146020300111009 sri apriyanti husain review jurnal_metode penelitian non posi...
146020300111009 sri apriyanti husain review jurnal_metode penelitian non posi...146020300111009 sri apriyanti husain review jurnal_metode penelitian non posi...
146020300111009 sri apriyanti husain review jurnal_metode penelitian non posi...Sri Apriyanti Husain
 
Review jurnal akuntansi forensik uas pp_ak kelas malam
Review jurnal akuntansi forensik uas pp_ak kelas malamReview jurnal akuntansi forensik uas pp_ak kelas malam
Review jurnal akuntansi forensik uas pp_ak kelas malamSri Apriyanti Husain
 
Review jurnal akuntansi forensik uas pp_ak kelas malam angkatan 24
Review jurnal akuntansi forensik uas pp_ak kelas malam angkatan 24Review jurnal akuntansi forensik uas pp_ak kelas malam angkatan 24
Review jurnal akuntansi forensik uas pp_ak kelas malam angkatan 24Sri Apriyanti Husain
 
Profit over people; neoliberalism, global order 1888363894
Profit over people; neoliberalism, global order 1888363894Profit over people; neoliberalism, global order 1888363894
Profit over people; neoliberalism, global order 1888363894Sri Apriyanti Husain
 
Review disertasi pak bambang haryadi
Review disertasi pak bambang haryadiReview disertasi pak bambang haryadi
Review disertasi pak bambang haryadiSri Apriyanti Husain
 
Review disertasi pak bambang haryadi
Review disertasi pak bambang haryadiReview disertasi pak bambang haryadi
Review disertasi pak bambang haryadiSri Apriyanti Husain
 
Psak 65-laporan-keuangan-konsolidasian-ifrs-10-consolidated-fs-22012014
Psak 65-laporan-keuangan-konsolidasian-ifrs-10-consolidated-fs-22012014Psak 65-laporan-keuangan-konsolidasian-ifrs-10-consolidated-fs-22012014
Psak 65-laporan-keuangan-konsolidasian-ifrs-10-consolidated-fs-22012014Sri Apriyanti Husain
 
Psak 58-aset-tidak-lancar-yang-dimiliki-untuk-dijual-dan-operasi-yang-dihenti...
Psak 58-aset-tidak-lancar-yang-dimiliki-untuk-dijual-dan-operasi-yang-dihenti...Psak 58-aset-tidak-lancar-yang-dimiliki-untuk-dijual-dan-operasi-yang-dihenti...
Psak 58-aset-tidak-lancar-yang-dimiliki-untuk-dijual-dan-operasi-yang-dihenti...Sri Apriyanti Husain
 
Psak 55-pengakuan-instrumen-keuangan-ias-39-18122013-pokok
Psak 55-pengakuan-instrumen-keuangan-ias-39-18122013-pokokPsak 55-pengakuan-instrumen-keuangan-ias-39-18122013-pokok
Psak 55-pengakuan-instrumen-keuangan-ias-39-18122013-pokokSri Apriyanti Husain
 

More from Sri Apriyanti Husain (20)

7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...
7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...
7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...
 
7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...
7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...
7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...
 
15 ma aksya_tafakkur ke 1_sri apriyanti husain
15 ma aksya_tafakkur ke 1_sri apriyanti husain15 ma aksya_tafakkur ke 1_sri apriyanti husain
15 ma aksya_tafakkur ke 1_sri apriyanti husain
 
15 ma aksya_tafakkur ke 1_sri apriyanti husain
15 ma aksya_tafakkur ke 1_sri apriyanti husain15 ma aksya_tafakkur ke 1_sri apriyanti husain
15 ma aksya_tafakkur ke 1_sri apriyanti husain
 
Formulir pendaftaran-s3 p ps feb ub
Formulir pendaftaran-s3 p ps feb ubFormulir pendaftaran-s3 p ps feb ub
Formulir pendaftaran-s3 p ps feb ub
 
Informasi pendaftaran pasca s2 & s3
Informasi pendaftaran  pasca s2 & s3Informasi pendaftaran  pasca s2 & s3
Informasi pendaftaran pasca s2 & s3
 
Informasi pendaftaran pasca s2 & s3
Informasi pendaftaran  pasca s2 & s3Informasi pendaftaran  pasca s2 & s3
Informasi pendaftaran pasca s2 & s3
 
Tugas regresi berganda
Tugas regresi bergandaTugas regresi berganda
Tugas regresi berganda
 
Alfamart
AlfamartAlfamart
Alfamart
 
146020300111009 sri apriyanti husain review jurnal_metode penelitian non posi...
146020300111009 sri apriyanti husain review jurnal_metode penelitian non posi...146020300111009 sri apriyanti husain review jurnal_metode penelitian non posi...
146020300111009 sri apriyanti husain review jurnal_metode penelitian non posi...
 
Review jurnal akuntansi forensik uas pp_ak kelas malam
Review jurnal akuntansi forensik uas pp_ak kelas malamReview jurnal akuntansi forensik uas pp_ak kelas malam
Review jurnal akuntansi forensik uas pp_ak kelas malam
 
Review jurnal akuntansi forensik uas pp_ak kelas malam angkatan 24
Review jurnal akuntansi forensik uas pp_ak kelas malam angkatan 24Review jurnal akuntansi forensik uas pp_ak kelas malam angkatan 24
Review jurnal akuntansi forensik uas pp_ak kelas malam angkatan 24
 
Profit over people; neoliberalism, global order 1888363894
Profit over people; neoliberalism, global order 1888363894Profit over people; neoliberalism, global order 1888363894
Profit over people; neoliberalism, global order 1888363894
 
Review disertasi pak bambang haryadi
Review disertasi pak bambang haryadiReview disertasi pak bambang haryadi
Review disertasi pak bambang haryadi
 
Review disertasi full
Review disertasi fullReview disertasi full
Review disertasi full
 
Review disertasi pak bambang haryadi
Review disertasi pak bambang haryadiReview disertasi pak bambang haryadi
Review disertasi pak bambang haryadi
 
Psak 65-laporan-keuangan-konsolidasian-ifrs-10-consolidated-fs-22012014
Psak 65-laporan-keuangan-konsolidasian-ifrs-10-consolidated-fs-22012014Psak 65-laporan-keuangan-konsolidasian-ifrs-10-consolidated-fs-22012014
Psak 65-laporan-keuangan-konsolidasian-ifrs-10-consolidated-fs-22012014
 
Psak 62-kontrak-asuransi-140212
Psak 62-kontrak-asuransi-140212Psak 62-kontrak-asuransi-140212
Psak 62-kontrak-asuransi-140212
 
Psak 58-aset-tidak-lancar-yang-dimiliki-untuk-dijual-dan-operasi-yang-dihenti...
Psak 58-aset-tidak-lancar-yang-dimiliki-untuk-dijual-dan-operasi-yang-dihenti...Psak 58-aset-tidak-lancar-yang-dimiliki-untuk-dijual-dan-operasi-yang-dihenti...
Psak 58-aset-tidak-lancar-yang-dimiliki-untuk-dijual-dan-operasi-yang-dihenti...
 
Psak 55-pengakuan-instrumen-keuangan-ias-39-18122013-pokok
Psak 55-pengakuan-instrumen-keuangan-ias-39-18122013-pokokPsak 55-pengakuan-instrumen-keuangan-ias-39-18122013-pokok
Psak 55-pengakuan-instrumen-keuangan-ias-39-18122013-pokok
 

Recently uploaded

SBP-Market-Operations and market managment
SBP-Market-Operations and market managmentSBP-Market-Operations and market managment
SBP-Market-Operations and market managmentfactical
 
VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...Suhani Kapoor
 
Call Girls In Yusuf Sarai Women Seeking Men 9654467111
Call Girls In Yusuf Sarai Women Seeking Men 9654467111Call Girls In Yusuf Sarai Women Seeking Men 9654467111
Call Girls In Yusuf Sarai Women Seeking Men 9654467111Sapana Sha
 
Bladex Earnings Call Presentation 1Q2024
Bladex Earnings Call Presentation 1Q2024Bladex Earnings Call Presentation 1Q2024
Bladex Earnings Call Presentation 1Q2024Bladex
 
Financial Leverage Definition, Advantages, and Disadvantages
Financial Leverage Definition, Advantages, and DisadvantagesFinancial Leverage Definition, Advantages, and Disadvantages
Financial Leverage Definition, Advantages, and Disadvantagesjayjaymabutot13
 
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...makika9823
 
Lundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdfLundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdfAdnet Communications
 
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
OAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptx
OAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptxOAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptx
OAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptxhiddenlevers
 
Unveiling the Top Chartered Accountants in India and Their Staggering Net Worth
Unveiling the Top Chartered Accountants in India and Their Staggering Net WorthUnveiling the Top Chartered Accountants in India and Their Staggering Net Worth
Unveiling the Top Chartered Accountants in India and Their Staggering Net WorthShaheen Kumar
 
20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdf20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdfAdnet Communications
 
The Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh KumarThe Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh KumarHarsh Kumar
 
Q3 2024 Earnings Conference Call and Webcast Slides
Q3 2024 Earnings Conference Call and Webcast SlidesQ3 2024 Earnings Conference Call and Webcast Slides
Q3 2024 Earnings Conference Call and Webcast SlidesMarketing847413
 
Stock Market Brief Deck for "this does not happen often".pdf
Stock Market Brief Deck for "this does not happen often".pdfStock Market Brief Deck for "this does not happen often".pdf
Stock Market Brief Deck for "this does not happen often".pdfMichael Silva
 
call girls in Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in  Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in  Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Vp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsAppVp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsAppmiss dipika
 
Andheri Call Girls In 9825968104 Mumbai Hot Models
Andheri Call Girls In 9825968104 Mumbai Hot ModelsAndheri Call Girls In 9825968104 Mumbai Hot Models
Andheri Call Girls In 9825968104 Mumbai Hot Modelshematsharma006
 
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...Henry Tapper
 
How Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of ReportingHow Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of ReportingAggregage
 

Recently uploaded (20)

SBP-Market-Operations and market managment
SBP-Market-Operations and market managmentSBP-Market-Operations and market managment
SBP-Market-Operations and market managment
 
VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...
 
Call Girls In Yusuf Sarai Women Seeking Men 9654467111
Call Girls In Yusuf Sarai Women Seeking Men 9654467111Call Girls In Yusuf Sarai Women Seeking Men 9654467111
Call Girls In Yusuf Sarai Women Seeking Men 9654467111
 
Bladex Earnings Call Presentation 1Q2024
Bladex Earnings Call Presentation 1Q2024Bladex Earnings Call Presentation 1Q2024
Bladex Earnings Call Presentation 1Q2024
 
Financial Leverage Definition, Advantages, and Disadvantages
Financial Leverage Definition, Advantages, and DisadvantagesFinancial Leverage Definition, Advantages, and Disadvantages
Financial Leverage Definition, Advantages, and Disadvantages
 
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...
 
Lundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdfLundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdf
 
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
 
OAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptx
OAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptxOAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptx
OAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptx
 
Unveiling the Top Chartered Accountants in India and Their Staggering Net Worth
Unveiling the Top Chartered Accountants in India and Their Staggering Net WorthUnveiling the Top Chartered Accountants in India and Their Staggering Net Worth
Unveiling the Top Chartered Accountants in India and Their Staggering Net Worth
 
20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdf20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdf
 
The Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh KumarThe Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh Kumar
 
Q3 2024 Earnings Conference Call and Webcast Slides
Q3 2024 Earnings Conference Call and Webcast SlidesQ3 2024 Earnings Conference Call and Webcast Slides
Q3 2024 Earnings Conference Call and Webcast Slides
 
Stock Market Brief Deck for "this does not happen often".pdf
Stock Market Brief Deck for "this does not happen often".pdfStock Market Brief Deck for "this does not happen often".pdf
Stock Market Brief Deck for "this does not happen often".pdf
 
Monthly Economic Monitoring of Ukraine No 231, April 2024
Monthly Economic Monitoring of Ukraine No 231, April 2024Monthly Economic Monitoring of Ukraine No 231, April 2024
Monthly Economic Monitoring of Ukraine No 231, April 2024
 
call girls in Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in  Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in  Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Vp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsAppVp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsApp
 
Andheri Call Girls In 9825968104 Mumbai Hot Models
Andheri Call Girls In 9825968104 Mumbai Hot ModelsAndheri Call Girls In 9825968104 Mumbai Hot Models
Andheri Call Girls In 9825968104 Mumbai Hot Models
 
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
 
How Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of ReportingHow Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of Reporting
 

Pp 12-new

  • 1. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Accounting Information Systems, 8e James A. Hall Chapter 12 Electronic Commerce Systems
  • 2. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Objectives for Chapter 12  Be acquainted with the topologies that are employed to achieve connectivity across the Internet.  Possess a conceptual appreciation of the protocols and understand the specific purposes several Internet protocols serve.  Understand the business benefits associated with Internet commerce and be aware of several Internet business models.  Be familiar with risks associated with intranet and Internet electronic commerce.  Understand issues of security, assurance, and trust pertaining to electronic commerce.  Be familiar with electronic commerce implications for the accounting profession. 2
  • 3. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. What is E-Commerce? The electronic processing and transmission of business data  electronic buying and selling of goods and services  on-line delivery of digital products  electronic funds transfer (EFT)  electronic trading of stocks  direct consumer marketing  electronic data interchange (EDI)  the Internet revolution 3
  • 4. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Internet Technologies  Packet switching  messages are divided into small packets  each packet of the message takes a different routes  Virtual private network (VPN)  a private network within a public network  Extranets  a password controlled network for private users  World Wide Web  an Internet facility that links users locally and globally  Internet addresses  e-mail address  URL address  IP address 4
  • 5. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Protocol Functions…  facilitate the physical connection between the network devices.  synchronize the transfer of data between physical devices.  provide a basis for error checking and measuring network performance.  promote compatibility among network devices.  promote network designs that are flexible, expandable, and cost-effective. 5
  • 6. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Internet Protocols  Transfer Control Protocol/Internet Protocol (TCP/IP) - controls how individual packets of data are formatted, transmitted, and received  Hypertext Transfer Protocol (HTTP) - controls web browsers  File Transfer Protocol (FTP) - used to transfer files across the internet  Simple Network Mail Protocol (SNMP) - e- mail  Secure Sockets Layer (SSL) and Secure Electronic Transmission (SET) - encryption schemes 6
  • 7. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Open System Interface (OSI)  The International Standards Organization developed a layered set of protocols called OSI.  The purpose of OSI is to provide standards by which the products of different manufacturers can interface with one another in a seamless interconnection at the user level. 7
  • 8. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. The OSI Protocol Layer 1 Physical Layer 2 Data Link Layer 3 Network Layer 4 Transport Layer 5 Session Layer 6 Presentation Layer 7 Application HARD WARE Layer 1 Physical Layer 2 Data Link Layer 3 Network Layer 4 Transport Layer 5 Session Layer 6 Presentation Layer 7 Application HARD- WARE Data Manipulation Tasks Data Communications Tasks Communications Channel NODE 1 NODE 2 HARD- WARE 8
  • 9. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Benefits of Internet Commerce  Access to a worldwide customer and/or supplier base  Reductions in inventory investment and carrying costs  Rapid creation of business partnerships to fill emerging market niches  Reductions in retail prices through lower marketing costs  Reductions in procurement costs  Better customer service 9
  • 10. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. The Internet Business Model  Information level  using the Internet to display and make accessible information about the company, its products, services, and business policies  Transaction level  using the Internet to accept orders from customers and/or to place them with their suppliers  Distribution level  using the Internet to sell and deliver digital products to customers 10
  • 11. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Cloud Computing  is a model for enabling convenient, on- demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction. 11
  • 12. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Cloud Computing: Key Features  Client firms can acquire IT resources from vendors on demand and as needed.  Resources are provided over a network and accessed through network terminals at the client location.  Acquisition of resources is rapid and infinitely scalable.  Computing resources are pooled to meet the needs of multiple client firms. 12
  • 13. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Cloud Computing: Primary Services  Software-as-a-Service (SaaS)  service providers host applications for client organizations over a network.  Infrastructure-as-a-Service (IaaS)  the provision of computing power and disk space to client firms who access it from desktop PCs.  Platform-as-a-Service (PaaS)  enables client firms to develop and deploy onto the cloud infrastructure consumer-generated applications using vendor-provided facilities. 13
  • 14. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Virtualization  The technology that unleashed cloud computing.  Virtualization multiplies the effectiveness of the physical system by creating virtual versions of the computer with separate operating systems that reside in the same physical equipment.  Virtualization is the concept of running more than one virtual computer on one physical computer.  Since each virtual system runs its own application, total computing power is multiplied with no additional hardware investment. 14
  • 15. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Cloud Computing: Issues  Cloud computing is not for all companies.  Large companies’ needs may conflict with the cloud solution because these firms have  already incurred massive investments in equipment, proprietary software, and human resources.  mission-critical functions running on legacy systems that are many decades old.  no interest in a one-size-fits-all mentality.  concerns about internal control and security issues due to outsourcing IT to the cloud. 15
  • 16. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Dynamic Virtual Organization 16 Perhaps the greatest potential benefit to be derived from e-commerce is the firm’s ability to forge dynamic business alliances with other organizations to fill unique market niches as the opportunities arise.
  • 17. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Areas of General Concern  Data Security: are stored and transmitted data adequately protected?  Business Policies: are policies publicly stated and consistently followed?  Privacy: how confidential are customer and trading partner data?  Business Process Integrity: how accurately, completely, and consistently does the company process its transactions? 17
  • 18. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Intranet Risks  Intercepting network messages  sniffing: interception of user IDs, passwords, confidential e-mails, and financial data files  Accessing corporate databases  connections to central databases increase the risk that data will be accessible by employees  Privileged employees  override privileges may allow unauthorized access to mission-critical data  Reluctance to prosecute  fear of negative publicity leads to such reluctance but encourages criminal behavior 18
  • 19. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Internet Risks to Consumers  How serious is the risk?  National Consumer League: Internet fraud rose by 600% between 1997 and 1998  SEC: e-mail complaints alleging fraud rose from 12 per day in 1997 to 200-300 per day in 1999  Major areas of concern:  Theft of credit card numbers  Theft of passwords  Consumer privacy--cookies 19
  • 20. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Internet Risks to Businesses  IP spoofing: masquerading to gain access to a Web server and/or to perpetrate an unlawful act without revealing one’s identity  Denial of service (DOS) attacks: assaulting a Web server to prevent it from servicing users  particularly devastating to business entities that cannot receive and process business transactions  Other malicious programs: viruses, worms, logic bombs, and Trojan horses pose a threat to both Internet and Intranet users 20
  • 21. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. SYN Flood DOS Attack 21 Sender Receiver Step 1: SYN messages Step 2: SYN/ACK Step 3: ACK packet code In a DOS Attack, the sender sends hundreds of messages, receives the SYN/ACK packet, but does not response with an ACK packet. This leaves the receiver with clogged transmission ports, and legitimate messages cannot be received.
  • 22. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Three Common Types of DOS Attacks  SYN Flood – when the three-way handshake needed to establish an Internet connection occurs, the final acknowledgement is not sent by the DOS attacker, thereby tying-up the receiving server while it waits.  Smurf – the DOS attacker uses numerous intermediary computer to flood the target computer with test messages, “pings”.  Distributed DOS (DDOS) – can take the form of Smurf or SYN attacks, but distinguished by the vast number of “zombie” computers hi-jacked to launch the attacks. 22
  • 23. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. 23 SMURF Attack Figure 12-3
  • 24. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. 24 Distributed Denial of Service Attack Figure 12-4
  • 25. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. E-Commerce Security: Data Encryption  Encryption - A computer program transforms a clear message into a coded (ciphertext) form using an algorithm. 25
  • 26. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. 26 Public Key Encryption Figure 12-5
  • 27. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. E-Commerce Security: Digital Authentication  Digital signature: electronic authentication technique that ensures that the transmitted message originated with the authorized sender and that it was not tampered with after the signature was applied  Digital certificate: like an electronic identification card that is used in conjunction with a public key encryption system to verify the authenticity of the message sender 27
  • 28. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. E-Commerce Security: Firewalls  Firewalls: software and hardware that provide security by channeling all network connections through a control gateway  Network level firewalls  low cost/low security access control  uses a screening router to its destination  does not explicitly authenticate outside users  penetrate the system using an IP spoofing technique  Application level firewalls  high level/high cost customizable network security  allows routine services and e-mail to pass through  performs sophisticated functions such as logging or user authentication for specific tasks 28
  • 29. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Seals of Assurance  “Trusted” third-party organizations offer seals of assurance that businesses can display on their Web site home pages:  BBB  TRUSTe  Veri-Sign, Inc  ICSA  AICPA/CICA WebTrust  AICPA/CICA SysTrust 29
  • 30. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Implications for Accounting  Privacy violation  major issues: • a stated privacy policy • consistent application of stated privacy policies • what information is the company capturing • sharing or selling of information • ability of individuals and businesses to verify and update information captured about them  1995 Safe Harbor Agreement • establishes standards for information transmittal between US and European companies 30
  • 31. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Implications for Accounting  Continuous auditing  auditors review transactions at frequent intervals or as they occur  intelligent control agents: heuristics that search electronic transactions for anomalies  Electronic audit trails  electronic transactions generated without human intervention  no paper audit trail 31
  • 32. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Implications for Accounting  Confidentiality of data  open system designs allow mission-critical information to be at the risk to intruders  Authentication  in e-commerce systems, determining the identity of the customer is not a simple task  Nonrepudiation  repudiation can lead to uncollected revenues or legal action  use digital signatures and digital certificates 32
  • 33. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Implications for Accounting  Data integrity  determine whether data has been intercepted and altered  Access controls  prevent unauthorized access to data  Changing legal environment  provide client with estimate of legal exposure 33
  • 34. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Appendix 34 Intra-Organizational Electronic Commerce
  • 35. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Local Area Networks (LAN)  A federation of computers located close together (on the same floor or in the same building) linked together to share data and hardware  The physical connection of workstations to the LAN is achieved through a network interface card (NIC) which fits into a PC’s expansion slot and contains the circuitry necessary for inter-node communications.  A server is used to store the network operating system, application programs, and data to be shared. 35
  • 36. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. File Server LAN LAN Node Node Node Node Printer Server Files Printer 36
  • 37. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Wide Area Network (WAN)  A WAN is a network that is dispersed over a wider geographic area than a LAN. It typically requires the use of:  gateways to connect different types of LANs  bridges to connect same-type LANs  WANs may use common carrier facilities, such as telephone lines, or they may use a Value Added Network (VAN). 37
  • 38. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. LAN LAN Bridge Gateway Gateway LAN WAN WAN 38
  • 39. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Star Topology  A network of IPUs with a large central computer (the host)  The host computer has direct connections to smaller computers, typically desktop or laptop PCs.  This topology is popular for mainframe computing.  All communications must go through the host computer, except for local computing. 39
  • 40. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Local Data Local Data Local Data Local Data Central Data POS POS POS POS POS Topeka St. Louis Kansas City Dallas Tulsa Star Network 40
  • 41. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Hierarchical Topology  A host computer is connected to several levels of subordinate smaller computers in a master-slave relationship. 41 Production Planning System Production Scheduling System Regional Sales System Warehouse System Warehouse System Production System Production System Sales Processing System Sales Processing System Sales Processing System Corporate Level Regional Level Local Level
  • 42. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Ring Topology  This configuration eliminates the central site. All nodes in this configuration are of equal status (peers).  Responsibility for managing communications is distributed among the nodes.  Common resources that are shared by all nodes can be centralized and managed by a file server that is also a node. 42
  • 43. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. 43 Ring Topology Figure 12-10
  • 44. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Bus Topology  The nodes are all connected to a common cable - the bus.  Communications and file transfers between workstations are controlled by a server.  It is generally less costly to install than a ring topology. 44
  • 45. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. 45 Bus Topology Figure 12-11
  • 46. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Client-Server Topology  This configuration distributes the processing between the user’s (client’s) computer and the central file server.  Both types of computers are part of the network, but each is assigned functions that it best performs.  This approach reduces data communications traffic, thus reducing queues and increasing response time. 46
  • 47. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. 47 Client-Server Topology Figure 12-12
  • 48. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Network Control Objectives  establish a communications session between the sender and the receiver  manage the flow of data across the network  detect errors in data caused by line failure or signal degeneration  detect and resolve data collisions between competing nodes 48
  • 49. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. 49 Figure 12-13 Polling Method of Controlling Data Collisions
  • 50. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. 50 Figure 12-14 Token-Passing Approach to Controlling Data Collision
  • 51. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Carrier Sensing  A random access technique that detects collisions when they occur  This technique is widely used--found on Ethernets.  The node wishing to transmit listens to the line to determine if in use. If it is, it waits a pre-specified time to transmit.  Collisions occur when nodes listen, hear no transmissions, and then simultaneously transmit. Data collides and the nodes are instructed to hang up and try again.  Disadvantage: The line may not be used optimally when multiple nodes are trying to transmit simultaneously. 51
  • 52. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. What is Electronic Data Interchange (EDI)?  The exchange of business transaction information:  between companies  in a standard format (ANSI X.12 or EDIFACT)  via a computerized information system  In “pure” EDI systems, human involvements is not necessary to approve transactions. 52
  • 53. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Communications Links  Companies may have internal EDI translation/communication software and hardware. OR  They may subscribe to VANs to perform this function without having to invest in personnel, software, and hardware. 53
  • 54. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. 54 Overview of EDI Figure 12-15
  • 55. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Advantages of EDI  Reduction or elimination of data entry  Reduction of errors  Reduction of paper  Reduction of paper processing and postage  Reduction of inventories (via JIT systems) 55