SlideShare a Scribd company logo
Chapter 12 Electronic Commerce Systems Accounting Information Systems,  5 th  edition James A. Hall (Revised by Jiin-Feng Chen, National Chengchi University for classroom use) COPYRIGHT © 2007 Thomson South-Western, a part of The Thomson Corporation. Thomson, the Star logo, and South-Western are trademarks used herein under license
Objectives for Chapter 12 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is E-Commerce? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Internet Technologies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Protocol Functions… ,[object Object],[object Object],[object Object],[object Object],[object Object]
Internet Protocols ,[object Object],[object Object],[object Object],[object Object],[object Object]
SSL (Secure Socket Layer) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SSL Architecture Two layers of protocols
Secure Electronic Transaction (SET) 憑證中心
Open System Interface (OSI) 開放系統介面 ,[object Object],[object Object]
The OSI Protocol Data Manipulation Tasks Data Communications Tasks Communications Channel NODE 1 NODE 2 HARD WARE HARD WARE Layer 1 Physical Layer 2 Data Link Layer 3 Network Layer 4 Transport Layer 5 Session Layer 6 Presentation Layer 7 Application SOFT WARE HARD WARE Layer 1 Physical Layer 2 Data Link Layer 3 Network Layer 4 Transport Layer 5 Session Layer 6 Presentation Layer 7 Application SOFT WARE HARD WARE
HTML: Hyper Text Markup Language 超文字標記語言 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
XML: eXtensible Markup Language 可延伸標記語言 ,[object Object],[object Object],[object Object],[object Object]
Comparing HTML and XML
XBRL: eXtensible Business Reporting Language 可延伸企業報導語言 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Benefits of E-Commerce ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Internet Business Model ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Dynamic Virtual Organization Perhaps the greatest potential benefit to be derived from  e-commerce is  the firm’s ability to forge dynamic business alliances with other organizations  to fill unique market niches as the opportunities arise.
Areas of General Concern ,[object Object],[object Object],[object Object],[object Object]
Intranet Risks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Internet Risks to Consumers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Internet Risks to Businesses ,[object Object],[object Object],[object Object],[object Object]
DOS Attack Sender Receiver Step 1:  SYN messages Step 2:  SYN/ACK Step 3:  ACK packet code In a DOS Attack, the sender sends hundreds of messages, receives the  SYN/ACK packet, but does not response with an ACK packet.  This leaves the receiver with clogged transmission ports, and legitimate messages cannot be  received.
E-Commerce Security: Data Encryption ,[object Object],Key Key Cleartext Message Cleartext Message 明文 密文 金鑰 Encryption Program Encryption Program Ciphertext Ciphertext Communication System Communication System
Public and Private Key Encryption 公開及秘密金鑰加密 Public Key is used for  encoding  messages.  Message B Message C Message D Multiple people may have the public key (e.g., subordinates). Private Key is used for decoding  messages. Typically one person or a small number of people have the private key (e.g., a supervisor). Message A Ciphertext Ciphertext Ciphertext Ciphertext Message A Message D Message C Message B
E-Commerce Security:  Digital Authentication ,[object Object],[object Object]
Text Message Compute Digest of Message Digest Encrypt Using Sender’s Private Key Digital Signature Digital Signature Encrypt Using Receiver’s Public Key Encrypted Message  with Digital Signature Attached   Decrypt Using Receiver’s Private Key Digital Signature Text Message Decrypt Using Sender’s Public Key Compute Digest of Message Digest Digest Compare Digital Signature  數位簽章 Sender’s Location Receiver's Location
E-Commerce Security: Firewalls ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Assurance 認證 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Implications for Accounting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Implications for Accounting ,[object Object],[object Object],[object Object],[object Object]
Implications for Accounting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Implications for Accounting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Implications for Accounting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Local Area Networks (LAN) 區域網路 ,[object Object],[object Object],[object Object]
[object Object],LAN LAN Node Node Node Node Printer Server Files Printer
Wide Are Network (WAN) 廣域網路 ,[object Object],[object Object],[object Object],[object Object]
LAN LAN Bridge Gateway Gateway LAN WAN WAN 環狀網路 星狀網路 匯流排網路
Star Topology  星狀網路 ,[object Object],[object Object],[object Object],[object Object]
POS POS POS POS POS Topeka St. Louis Kansas City Dallas Tulsa Star Network 主電腦 Local Data Local Data Local Data Local Data Central Data
Hierarchical Topology  階層式網路 ,[object Object],Production Planning System Production Scheduling System Regional Sales System Warehouse System Warehouse System Production System Production System Sales Processing System Sales Processing System Sales Processing System Corporate Level Regional Level Local Level
Ring Topology  環狀網路 ,[object Object],[object Object],[object Object]
[object Object],Ring Topology Local Files Local Files Local Files Local Files Local Files Central Files
Bus Topology  匯流排網路 ,[object Object],[object Object],[object Object]
[object Object],Bus Topology Node Node Node Node Local Files Local Files Local Files Local Files Local Files Node Central  Files Print Server
Client-Server Topology  主從式網路 ,[object Object],[object Object],[object Object]
[object Object],Client-Server Topology Client Client Client Client Record Searching Capabilities Data Manipulation Capabilities Client Data Manipulation Capabilities Data Manipulation Capabilities Data Manipulation Capabilities Data Manipulation Capabilities Common  Files
Network Control Objectives ,[object Object],[object Object],[object Object],[object Object]
POLLING METHOD OF CONTROLLING DATA COLLISIONS MASTER Locked Locked Locked Polling Signal Data Transmission One Site, the “master,” polls the other “slave” sites to determine if they have data to transmit. If a slave responds in the affirmative, the master site locks the network while the data are transmitted. Allows priorities to be set for data communications across the network SLAVE  SLAVE  SLAVE  SLAVE  WAN
[object Object],Token Ring 記號環狀網路 Node Node Node Central Files Local Files Local Files Local Files Contains data Empty token
Carrier Sensing  載體偵測 ,[object Object],[object Object],[object Object],[object Object],[object Object]
What is Electronic Data Interchange (EDI)? 電子資料交換 ,[object Object],[object Object],[object Object],[object Object],[object Object]
Communications Links ,[object Object],[object Object],[object Object]
EDI System Purchases System Company A’s mailbox Company B’s mailbox Sales Order System Application Software Application Software Direct Connection VAN Company A Company B EDI  Translation Software EDI  Translation Software Communications Software Communications Software Other Mailbox Other Mailbox
Advantages of EDI ,[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Internet vs intranet vs extranet
Internet vs intranet vs extranetInternet vs intranet vs extranet
Internet vs intranet vs extranetTej Kiran
 
A Mobile Messaging Apps: Service Usage Classification to Internet Traffic and...
A Mobile Messaging Apps: Service Usage Classification to Internet Traffic and...A Mobile Messaging Apps: Service Usage Classification to Internet Traffic and...
A Mobile Messaging Apps: Service Usage Classification to Internet Traffic and...
dbpublications
 
Internet
InternetInternet
Internet
Vasu Dev
 
Diff intranet and extranet
Diff intranet and extranetDiff intranet and extranet
Diff intranet and extranetNadeem Khazi
 
Communications & Networks
Communications & NetworksCommunications & Networks
Communications & Networkscoachhahn
 
Communications & Networks
Communications & NetworksCommunications & Networks
Communications & Networkscoachhahn
 
M A M C H A R O
M A M  C H A R OM A M  C H A R O
M A M C H A R Olime17
 
Business Data Communications and Networking 12th Edition FitzGerald Solutions...
Business Data Communications and Networking 12th Edition FitzGerald Solutions...Business Data Communications and Networking 12th Edition FitzGerald Solutions...
Business Data Communications and Networking 12th Edition FitzGerald Solutions...
TylerYuli
 
How secure is the cloud? and Amazon vs Walmart which giant will dominant?
How secure is the cloud? and Amazon vs Walmart which giant will dominant?How secure is the cloud? and Amazon vs Walmart which giant will dominant?
How secure is the cloud? and Amazon vs Walmart which giant will dominant?
Mohammad Mydul Islam
 
Law technology product news understanding methods of establishing electroni...
Law technology product news   understanding methods of establishing electroni...Law technology product news   understanding methods of establishing electroni...
Law technology product news understanding methods of establishing electroni...David Cunningham
 
Intranets and Extranets
Intranets and Extranets Intranets and Extranets
Taking Account of Privacy When Designing Cloud Computing Services
Taking Account of Privacy When Designing Cloud Computing ServicesTaking Account of Privacy When Designing Cloud Computing Services
Taking Account of Privacy When Designing Cloud Computing Serviceswhite paper
 
IT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_ChannelsIT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_Channels
Palani Kumar
 
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defenderUsing a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Remmy Nweke, mNGE, mNUJ, mGOCOP
 
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
Editor IJMTER
 
Internetintranetandextranet..
Internetintranetandextranet..Internetintranetandextranet..
Internetintranetandextranet..
Paulo Sambo
 
Cloud Information Accountability Frameworks for Data Sharing in Cloud
Cloud Information Accountability Frameworks for Data Sharing in CloudCloud Information Accountability Frameworks for Data Sharing in Cloud
Cloud Information Accountability Frameworks for Data Sharing in Cloud
IOSR Journals
 
M A M C H A R O 2003
M A M  C H A R O 2003M A M  C H A R O 2003
M A M C H A R O 2003lime17
 

What's hot (20)

Internet vs intranet vs extranet
Internet vs intranet vs extranetInternet vs intranet vs extranet
Internet vs intranet vs extranet
 
A Mobile Messaging Apps: Service Usage Classification to Internet Traffic and...
A Mobile Messaging Apps: Service Usage Classification to Internet Traffic and...A Mobile Messaging Apps: Service Usage Classification to Internet Traffic and...
A Mobile Messaging Apps: Service Usage Classification to Internet Traffic and...
 
Internet
InternetInternet
Internet
 
Intranet and extranet
Intranet and extranetIntranet and extranet
Intranet and extranet
 
Diff intranet and extranet
Diff intranet and extranetDiff intranet and extranet
Diff intranet and extranet
 
Report on intranet
Report on intranetReport on intranet
Report on intranet
 
Communications & Networks
Communications & NetworksCommunications & Networks
Communications & Networks
 
Communications & Networks
Communications & NetworksCommunications & Networks
Communications & Networks
 
M A M C H A R O
M A M  C H A R OM A M  C H A R O
M A M C H A R O
 
Business Data Communications and Networking 12th Edition FitzGerald Solutions...
Business Data Communications and Networking 12th Edition FitzGerald Solutions...Business Data Communications and Networking 12th Edition FitzGerald Solutions...
Business Data Communications and Networking 12th Edition FitzGerald Solutions...
 
How secure is the cloud? and Amazon vs Walmart which giant will dominant?
How secure is the cloud? and Amazon vs Walmart which giant will dominant?How secure is the cloud? and Amazon vs Walmart which giant will dominant?
How secure is the cloud? and Amazon vs Walmart which giant will dominant?
 
Law technology product news understanding methods of establishing electroni...
Law technology product news   understanding methods of establishing electroni...Law technology product news   understanding methods of establishing electroni...
Law technology product news understanding methods of establishing electroni...
 
Intranets and Extranets
Intranets and Extranets Intranets and Extranets
Intranets and Extranets
 
Taking Account of Privacy When Designing Cloud Computing Services
Taking Account of Privacy When Designing Cloud Computing ServicesTaking Account of Privacy When Designing Cloud Computing Services
Taking Account of Privacy When Designing Cloud Computing Services
 
IT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_ChannelsIT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_Channels
 
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defenderUsing a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
 
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
 
Internetintranetandextranet..
Internetintranetandextranet..Internetintranetandextranet..
Internetintranetandextranet..
 
Cloud Information Accountability Frameworks for Data Sharing in Cloud
Cloud Information Accountability Frameworks for Data Sharing in CloudCloud Information Accountability Frameworks for Data Sharing in Cloud
Cloud Information Accountability Frameworks for Data Sharing in Cloud
 
M A M C H A R O 2003
M A M  C H A R O 2003M A M  C H A R O 2003
M A M C H A R O 2003
 

Viewers also liked

James hall ch 6
James hall ch 6James hall ch 6
James hall ch 6
David Julian
 
Plugin ch12edited-ok
Plugin ch12edited-okPlugin ch12edited-ok
Plugin ch12edited-okdonasiilmu
 
James hall ch 14
James hall ch 14James hall ch 14
James hall ch 14
David Julian
 
James hall ch 13
James hall ch 13James hall ch 13
James hall ch 13
David Julian
 
Lecture 22 expenditure cycle part ii - payroll processing accounting informa...
Lecture 22  expenditure cycle part ii - payroll processing accounting informa...Lecture 22  expenditure cycle part ii - payroll processing accounting informa...
Lecture 22 expenditure cycle part ii - payroll processing accounting informa...
Habib Ullah Qamar
 
James hall ch 9
James hall ch 9James hall ch 9
James hall ch 9
David Julian
 
James hall ch 5
James hall ch 5James hall ch 5
James hall ch 5
David Julian
 
Chapter 1 - The Information System: An Accountant's Perspective
Chapter 1 - The Information System: An Accountant's PerspectiveChapter 1 - The Information System: An Accountant's Perspective
Chapter 1 - The Information System: An Accountant's Perspective
ermin08
 
The Revenue Cycle
The Revenue Cycle The Revenue Cycle
The Revenue Cycle
Qamar Farooq
 

Viewers also liked (9)

James hall ch 6
James hall ch 6James hall ch 6
James hall ch 6
 
Plugin ch12edited-ok
Plugin ch12edited-okPlugin ch12edited-ok
Plugin ch12edited-ok
 
James hall ch 14
James hall ch 14James hall ch 14
James hall ch 14
 
James hall ch 13
James hall ch 13James hall ch 13
James hall ch 13
 
Lecture 22 expenditure cycle part ii - payroll processing accounting informa...
Lecture 22  expenditure cycle part ii - payroll processing accounting informa...Lecture 22  expenditure cycle part ii - payroll processing accounting informa...
Lecture 22 expenditure cycle part ii - payroll processing accounting informa...
 
James hall ch 9
James hall ch 9James hall ch 9
James hall ch 9
 
James hall ch 5
James hall ch 5James hall ch 5
James hall ch 5
 
Chapter 1 - The Information System: An Accountant's Perspective
Chapter 1 - The Information System: An Accountant's PerspectiveChapter 1 - The Information System: An Accountant's Perspective
Chapter 1 - The Information System: An Accountant's Perspective
 
The Revenue Cycle
The Revenue Cycle The Revenue Cycle
The Revenue Cycle
 

Similar to Ch12(revised 20071226)

Communications Technologies
Communications TechnologiesCommunications Technologies
Communications Technologies
Sarah Jimenez
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvan
itrraincity
 
L25 network fundamentals
L25   network fundamentalsL25   network fundamentals
L25 network fundamentalsheidirobison
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptx
RushikeshChikane2
 
Ecommerce(3)
Ecommerce(3)Ecommerce(3)
Ecommerce(3)ecommerce
 
E commerce 5_units_notes
E commerce 5_units_notesE commerce 5_units_notes
E commerce 5_units_notes
Vivek Kumar Sinha
 
202160902-Internet-Intranet-Extranet.ppt
202160902-Internet-Intranet-Extranet.ppt202160902-Internet-Intranet-Extranet.ppt
202160902-Internet-Intranet-Extranet.ppt
Dizzi1
 
Knowing where the safe zone is ovum october 22 2013
Knowing where the safe zone is  ovum october 22 2013 Knowing where the safe zone is  ovum october 22 2013
Knowing where the safe zone is ovum october 22 2013
Mark Skilton
 
IS-Crypttools.pptx
IS-Crypttools.pptxIS-Crypttools.pptx
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commercem8817
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber lawDivyank Jindal
 
basic it presentation........
basic it presentation........basic it presentation........
basic it presentation........
vlsaroj
 
CTO-CybersecurityForum-2010-RonWilliams
CTO-CybersecurityForum-2010-RonWilliamsCTO-CybersecurityForum-2010-RonWilliams
CTO-CybersecurityForum-2010-RonWilliamssegughana
 
Unit4 ppt1 introduction to internet
Unit4 ppt1 introduction to internetUnit4 ppt1 introduction to internet
Unit4 ppt1 introduction to internet
FarhanMalik93
 
Securing Digital_Adams
Securing Digital_AdamsSecuring Digital_Adams
Securing Digital_AdamsJulius Adams
 
1, prevalent network threats and telecommunication security challenges and co...
1, prevalent network threats and telecommunication security challenges and co...1, prevalent network threats and telecommunication security challenges and co...
1, prevalent network threats and telecommunication security challenges and co...
Alexander Decker
 
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET Journal
 

Similar to Ch12(revised 20071226) (20)

Communications Technologies
Communications TechnologiesCommunications Technologies
Communications Technologies
 
Final ppt ecommerce
Final ppt ecommerceFinal ppt ecommerce
Final ppt ecommerce
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvan
 
L25 network fundamentals
L25   network fundamentalsL25   network fundamentals
L25 network fundamentals
 
Ecommerce final ppt
Ecommerce final pptEcommerce final ppt
Ecommerce final ppt
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptx
 
Ecommerce(3)
Ecommerce(3)Ecommerce(3)
Ecommerce(3)
 
E commerce 5_units_notes
E commerce 5_units_notesE commerce 5_units_notes
E commerce 5_units_notes
 
202160902-Internet-Intranet-Extranet.ppt
202160902-Internet-Intranet-Extranet.ppt202160902-Internet-Intranet-Extranet.ppt
202160902-Internet-Intranet-Extranet.ppt
 
Knowing where the safe zone is ovum october 22 2013
Knowing where the safe zone is  ovum october 22 2013 Knowing where the safe zone is  ovum october 22 2013
Knowing where the safe zone is ovum october 22 2013
 
Overview
OverviewOverview
Overview
 
IS-Crypttools.pptx
IS-Crypttools.pptxIS-Crypttools.pptx
IS-Crypttools.pptx
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber law
 
basic it presentation........
basic it presentation........basic it presentation........
basic it presentation........
 
CTO-CybersecurityForum-2010-RonWilliams
CTO-CybersecurityForum-2010-RonWilliamsCTO-CybersecurityForum-2010-RonWilliams
CTO-CybersecurityForum-2010-RonWilliams
 
Unit4 ppt1 introduction to internet
Unit4 ppt1 introduction to internetUnit4 ppt1 introduction to internet
Unit4 ppt1 introduction to internet
 
Securing Digital_Adams
Securing Digital_AdamsSecuring Digital_Adams
Securing Digital_Adams
 
1, prevalent network threats and telecommunication security challenges and co...
1, prevalent network threats and telecommunication security challenges and co...1, prevalent network threats and telecommunication security challenges and co...
1, prevalent network threats and telecommunication security challenges and co...
 
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
 

Recently uploaded

Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 

Recently uploaded (20)

Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 

Ch12(revised 20071226)

  • 1. Chapter 12 Electronic Commerce Systems Accounting Information Systems, 5 th edition James A. Hall (Revised by Jiin-Feng Chen, National Chengchi University for classroom use) COPYRIGHT © 2007 Thomson South-Western, a part of The Thomson Corporation. Thomson, the Star logo, and South-Western are trademarks used herein under license
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. SSL Architecture Two layers of protocols
  • 9. Secure Electronic Transaction (SET) 憑證中心
  • 10.
  • 11. The OSI Protocol Data Manipulation Tasks Data Communications Tasks Communications Channel NODE 1 NODE 2 HARD WARE HARD WARE Layer 1 Physical Layer 2 Data Link Layer 3 Network Layer 4 Transport Layer 5 Session Layer 6 Presentation Layer 7 Application SOFT WARE HARD WARE Layer 1 Physical Layer 2 Data Link Layer 3 Network Layer 4 Transport Layer 5 Session Layer 6 Presentation Layer 7 Application SOFT WARE HARD WARE
  • 12.
  • 13.
  • 15.
  • 16.
  • 17.
  • 18. Dynamic Virtual Organization Perhaps the greatest potential benefit to be derived from e-commerce is the firm’s ability to forge dynamic business alliances with other organizations to fill unique market niches as the opportunities arise.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23. DOS Attack Sender Receiver Step 1: SYN messages Step 2: SYN/ACK Step 3: ACK packet code In a DOS Attack, the sender sends hundreds of messages, receives the SYN/ACK packet, but does not response with an ACK packet. This leaves the receiver with clogged transmission ports, and legitimate messages cannot be received.
  • 24.
  • 25. Public and Private Key Encryption 公開及秘密金鑰加密 Public Key is used for encoding messages. Message B Message C Message D Multiple people may have the public key (e.g., subordinates). Private Key is used for decoding messages. Typically one person or a small number of people have the private key (e.g., a supervisor). Message A Ciphertext Ciphertext Ciphertext Ciphertext Message A Message D Message C Message B
  • 26.
  • 27. Text Message Compute Digest of Message Digest Encrypt Using Sender’s Private Key Digital Signature Digital Signature Encrypt Using Receiver’s Public Key Encrypted Message with Digital Signature Attached Decrypt Using Receiver’s Private Key Digital Signature Text Message Decrypt Using Sender’s Public Key Compute Digest of Message Digest Digest Compare Digital Signature 數位簽章 Sender’s Location Receiver's Location
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38. LAN LAN Bridge Gateway Gateway LAN WAN WAN 環狀網路 星狀網路 匯流排網路
  • 39.
  • 40. POS POS POS POS POS Topeka St. Louis Kansas City Dallas Tulsa Star Network 主電腦 Local Data Local Data Local Data Local Data Central Data
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49. POLLING METHOD OF CONTROLLING DATA COLLISIONS MASTER Locked Locked Locked Polling Signal Data Transmission One Site, the “master,” polls the other “slave” sites to determine if they have data to transmit. If a slave responds in the affirmative, the master site locks the network while the data are transmitted. Allows priorities to be set for data communications across the network SLAVE SLAVE SLAVE SLAVE WAN
  • 50.
  • 51.
  • 52.
  • 53.
  • 54. EDI System Purchases System Company A’s mailbox Company B’s mailbox Sales Order System Application Software Application Software Direct Connection VAN Company A Company B EDI Translation Software EDI Translation Software Communications Software Communications Software Other Mailbox Other Mailbox
  • 55.

Editor's Notes

  1. 31
  2. SSL probably most widely used Web security mechanism. Its implemented at the Transport layer; cf IPSec at Network layer; or various Application layer mechanisms eg. S/MIME & SET (later).
  3. Stallings Fig 17-2.
  4. 6
  5. 7
  6. 8
  7. 16
  8. 23
  9. 25
  10. 27
  11. 42
  12. 31
  13. 33
  14. 14
  15. 34