INTRODUCTION 351 consumers are placing their orders online, but companies still provide toll-free numbers for those who are hesitant to provide confidential information, such as credit card numbers, online. Airlines were among the first providers to provide a financial incentive to purchase online. Later, they shifted to an additional financial cost if toll-free numbers of support personnel were accessed to make a purchase. Concerns about Internet security have been blown out of proportion. Although online business transactions are not perfectly secure, they are no riskier than ordering via telephone or fax. Computer hackers are similar to everyday criminals who try to find ways to circumvent security systems and procedures, although there are some additional security issues associated with electronic commerce. First, the Internet is an open network without any physical barriers to prevent theft (e.g., hidden cameras, safes, security guards). Second, the same technologies that are being used for commerce can be used to breach security (e.g., computer software used to search for passwords). Several methods can be used to restrict access and improve security in electronic commerce. First, a form of authentication can be required through the use of some combination of account numbers, passwords, and IP (Internet protocol) addresses. Second, a firewall can be used to monitor traffic between an organization's network and the Internet. This barrier can restrict access to certain IP addresses or applications. A third method is to use coding or encryption techniques to transform data to protect their meaning. These security methods can be used individually or together depending on the level of security desired. For instance, firms that are transmitting payment information will be more inclined to use all three levels of defense. This next section covers four topics: the traits of a networked economy, the definition and scope of electronic commerce, the use of electronic marketing, and the beginning of electronic commerce. Authentication Verifying the appropriate access by a user through the use of some combination of account numbers, passwords, and IP (Internet protocol) addresses. Firewall A filter is used to monitor traffic between an organization's network and the Internet. This barrier can restrict access to certain IP addresses, applications or content. INTRODUCTION 349 Traits of a Networked Economy Some people view electronic commerce as a boom-and-bust cycle, but that is really not true. In the mid-1990s, there was a dramatic increase in activity in the broad field of e-commerce. Companies such as eBay, Amazon, and Expc dia provide tangible evidence of the impact that e-commerce has had on th business world. These companies, and hundreds like them, created an ecc nomic boom unlike anything seen before. It began to unravel in 2000, wit the dot-com bust." The impacts are still being felt. Most traditional comp; nies.