SlideShare une entreprise Scribd logo
1  sur  55
Chapter 12 Electronic Commerce Systems Accounting Information Systems,  5 th  edition James A. Hall (Revised by Jiin-Feng Chen, National Chengchi University for classroom use) COPYRIGHT © 2007 Thomson South-Western, a part of The Thomson Corporation. Thomson, the Star logo, and South-Western are trademarks used herein under license
Objectives for Chapter 12 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is E-Commerce? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Internet Technologies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Protocol Functions… ,[object Object],[object Object],[object Object],[object Object],[object Object]
Internet Protocols ,[object Object],[object Object],[object Object],[object Object],[object Object]
SSL (Secure Socket Layer) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SSL Architecture Two layers of protocols
Secure Electronic Transaction (SET) 憑證中心
Open System Interface (OSI) 開放系統介面 ,[object Object],[object Object]
The OSI Protocol Data Manipulation Tasks Data Communications Tasks Communications Channel NODE 1 NODE 2 HARD WARE HARD WARE Layer 1 Physical Layer 2 Data Link Layer 3 Network Layer 4 Transport Layer 5 Session Layer 6 Presentation Layer 7 Application SOFT WARE HARD WARE Layer 1 Physical Layer 2 Data Link Layer 3 Network Layer 4 Transport Layer 5 Session Layer 6 Presentation Layer 7 Application SOFT WARE HARD WARE
HTML: Hyper Text Markup Language 超文字標記語言 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
XML: eXtensible Markup Language 可延伸標記語言 ,[object Object],[object Object],[object Object],[object Object]
Comparing HTML and XML
XBRL: eXtensible Business Reporting Language 可延伸企業報導語言 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Benefits of E-Commerce ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Internet Business Model ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Dynamic Virtual Organization Perhaps the greatest potential benefit to be derived from  e-commerce is  the firm’s ability to forge dynamic business alliances with other organizations  to fill unique market niches as the opportunities arise.
Areas of General Concern ,[object Object],[object Object],[object Object],[object Object]
Intranet Risks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Internet Risks to Consumers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Internet Risks to Businesses ,[object Object],[object Object],[object Object],[object Object]
DOS Attack Sender Receiver Step 1:  SYN messages Step 2:  SYN/ACK Step 3:  ACK packet code In a DOS Attack, the sender sends hundreds of messages, receives the  SYN/ACK packet, but does not response with an ACK packet.  This leaves the receiver with clogged transmission ports, and legitimate messages cannot be  received.
E-Commerce Security: Data Encryption ,[object Object],Key Key Cleartext Message Cleartext Message 明文 密文 金鑰 Encryption Program Encryption Program Ciphertext Ciphertext Communication System Communication System
Public and Private Key Encryption 公開及秘密金鑰加密 Public Key is used for  encoding  messages.  Message B Message C Message D Multiple people may have the public key (e.g., subordinates). Private Key is used for decoding  messages. Typically one person or a small number of people have the private key (e.g., a supervisor). Message A Ciphertext Ciphertext Ciphertext Ciphertext Message A Message D Message C Message B
E-Commerce Security:  Digital Authentication ,[object Object],[object Object]
Text Message Compute Digest of Message Digest Encrypt Using Sender’s Private Key Digital Signature Digital Signature Encrypt Using Receiver’s Public Key Encrypted Message  with Digital Signature Attached   Decrypt Using Receiver’s Private Key Digital Signature Text Message Decrypt Using Sender’s Public Key Compute Digest of Message Digest Digest Compare Digital Signature  數位簽章 Sender’s Location Receiver's Location
E-Commerce Security: Firewalls ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Assurance 認證 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Implications for Accounting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Implications for Accounting ,[object Object],[object Object],[object Object],[object Object]
Implications for Accounting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Implications for Accounting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Implications for Accounting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Local Area Networks (LAN) 區域網路 ,[object Object],[object Object],[object Object]
[object Object],LAN LAN Node Node Node Node Printer Server Files Printer
Wide Are Network (WAN) 廣域網路 ,[object Object],[object Object],[object Object],[object Object]
LAN LAN Bridge Gateway Gateway LAN WAN WAN 環狀網路 星狀網路 匯流排網路
Star Topology  星狀網路 ,[object Object],[object Object],[object Object],[object Object]
POS POS POS POS POS Topeka St. Louis Kansas City Dallas Tulsa Star Network 主電腦 Local Data Local Data Local Data Local Data Central Data
Hierarchical Topology  階層式網路 ,[object Object],Production Planning System Production Scheduling System Regional Sales System Warehouse System Warehouse System Production System Production System Sales Processing System Sales Processing System Sales Processing System Corporate Level Regional Level Local Level
Ring Topology  環狀網路 ,[object Object],[object Object],[object Object]
[object Object],Ring Topology Local Files Local Files Local Files Local Files Local Files Central Files
Bus Topology  匯流排網路 ,[object Object],[object Object],[object Object]
[object Object],Bus Topology Node Node Node Node Local Files Local Files Local Files Local Files Local Files Node Central  Files Print Server
Client-Server Topology  主從式網路 ,[object Object],[object Object],[object Object]
[object Object],Client-Server Topology Client Client Client Client Record Searching Capabilities Data Manipulation Capabilities Client Data Manipulation Capabilities Data Manipulation Capabilities Data Manipulation Capabilities Data Manipulation Capabilities Common  Files
Network Control Objectives ,[object Object],[object Object],[object Object],[object Object]
POLLING METHOD OF CONTROLLING DATA COLLISIONS MASTER Locked Locked Locked Polling Signal Data Transmission One Site, the “master,” polls the other “slave” sites to determine if they have data to transmit. If a slave responds in the affirmative, the master site locks the network while the data are transmitted. Allows priorities to be set for data communications across the network SLAVE  SLAVE  SLAVE  SLAVE  WAN
[object Object],Token Ring 記號環狀網路 Node Node Node Central Files Local Files Local Files Local Files Contains data Empty token
Carrier Sensing  載體偵測 ,[object Object],[object Object],[object Object],[object Object],[object Object]
What is Electronic Data Interchange (EDI)? 電子資料交換 ,[object Object],[object Object],[object Object],[object Object],[object Object]
Communications Links ,[object Object],[object Object],[object Object]
EDI System Purchases System Company A’s mailbox Company B’s mailbox Sales Order System Application Software Application Software Direct Connection VAN Company A Company B EDI  Translation Software EDI  Translation Software Communications Software Communications Software Other Mailbox Other Mailbox
Advantages of EDI ,[object Object],[object Object],[object Object],[object Object],[object Object]

Contenu connexe

Tendances

Internet vs intranet vs extranet
Internet vs intranet vs extranetInternet vs intranet vs extranet
Internet vs intranet vs extranetTej Kiran
 
A Mobile Messaging Apps: Service Usage Classification to Internet Traffic and...
A Mobile Messaging Apps: Service Usage Classification to Internet Traffic and...A Mobile Messaging Apps: Service Usage Classification to Internet Traffic and...
A Mobile Messaging Apps: Service Usage Classification to Internet Traffic and...dbpublications
 
Diff intranet and extranet
Diff intranet and extranetDiff intranet and extranet
Diff intranet and extranetNadeem Khazi
 
Communications & Networks
Communications & NetworksCommunications & Networks
Communications & Networkscoachhahn
 
Communications & Networks
Communications & NetworksCommunications & Networks
Communications & Networkscoachhahn
 
M A M C H A R O
M A M  C H A R OM A M  C H A R O
M A M C H A R Olime17
 
Business Data Communications and Networking 12th Edition FitzGerald Solutions...
Business Data Communications and Networking 12th Edition FitzGerald Solutions...Business Data Communications and Networking 12th Edition FitzGerald Solutions...
Business Data Communications and Networking 12th Edition FitzGerald Solutions...TylerYuli
 
How secure is the cloud? and Amazon vs Walmart which giant will dominant?
How secure is the cloud? and Amazon vs Walmart which giant will dominant?How secure is the cloud? and Amazon vs Walmart which giant will dominant?
How secure is the cloud? and Amazon vs Walmart which giant will dominant?Mohammad Mydul Islam
 
Law technology product news understanding methods of establishing electroni...
Law technology product news   understanding methods of establishing electroni...Law technology product news   understanding methods of establishing electroni...
Law technology product news understanding methods of establishing electroni...David Cunningham
 
Taking Account of Privacy When Designing Cloud Computing Services
Taking Account of Privacy When Designing Cloud Computing ServicesTaking Account of Privacy When Designing Cloud Computing Services
Taking Account of Privacy When Designing Cloud Computing Serviceswhite paper
 
IT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_ChannelsIT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_ChannelsPalani Kumar
 
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defenderUsing a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defenderRemmy Nweke, mNGE, mNUJ, mGOCOP
 
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...Editor IJMTER
 
Internetintranetandextranet..
Internetintranetandextranet..Internetintranetandextranet..
Internetintranetandextranet..Paulo Sambo
 
Cloud Information Accountability Frameworks for Data Sharing in Cloud
Cloud Information Accountability Frameworks for Data Sharing in CloudCloud Information Accountability Frameworks for Data Sharing in Cloud
Cloud Information Accountability Frameworks for Data Sharing in CloudIOSR Journals
 
M A M C H A R O 2003
M A M  C H A R O 2003M A M  C H A R O 2003
M A M C H A R O 2003lime17
 

Tendances (20)

Internet vs intranet vs extranet
Internet vs intranet vs extranetInternet vs intranet vs extranet
Internet vs intranet vs extranet
 
A Mobile Messaging Apps: Service Usage Classification to Internet Traffic and...
A Mobile Messaging Apps: Service Usage Classification to Internet Traffic and...A Mobile Messaging Apps: Service Usage Classification to Internet Traffic and...
A Mobile Messaging Apps: Service Usage Classification to Internet Traffic and...
 
Internet
InternetInternet
Internet
 
Intranet and extranet
Intranet and extranetIntranet and extranet
Intranet and extranet
 
Diff intranet and extranet
Diff intranet and extranetDiff intranet and extranet
Diff intranet and extranet
 
Report on intranet
Report on intranetReport on intranet
Report on intranet
 
Communications & Networks
Communications & NetworksCommunications & Networks
Communications & Networks
 
Communications & Networks
Communications & NetworksCommunications & Networks
Communications & Networks
 
M A M C H A R O
M A M  C H A R OM A M  C H A R O
M A M C H A R O
 
Business Data Communications and Networking 12th Edition FitzGerald Solutions...
Business Data Communications and Networking 12th Edition FitzGerald Solutions...Business Data Communications and Networking 12th Edition FitzGerald Solutions...
Business Data Communications and Networking 12th Edition FitzGerald Solutions...
 
How secure is the cloud? and Amazon vs Walmart which giant will dominant?
How secure is the cloud? and Amazon vs Walmart which giant will dominant?How secure is the cloud? and Amazon vs Walmart which giant will dominant?
How secure is the cloud? and Amazon vs Walmart which giant will dominant?
 
Law technology product news understanding methods of establishing electroni...
Law technology product news   understanding methods of establishing electroni...Law technology product news   understanding methods of establishing electroni...
Law technology product news understanding methods of establishing electroni...
 
Intranets and Extranets
Intranets and Extranets Intranets and Extranets
Intranets and Extranets
 
Taking Account of Privacy When Designing Cloud Computing Services
Taking Account of Privacy When Designing Cloud Computing ServicesTaking Account of Privacy When Designing Cloud Computing Services
Taking Account of Privacy When Designing Cloud Computing Services
 
IT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_ChannelsIT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_Channels
 
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defenderUsing a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
 
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
 
Internetintranetandextranet..
Internetintranetandextranet..Internetintranetandextranet..
Internetintranetandextranet..
 
Cloud Information Accountability Frameworks for Data Sharing in Cloud
Cloud Information Accountability Frameworks for Data Sharing in CloudCloud Information Accountability Frameworks for Data Sharing in Cloud
Cloud Information Accountability Frameworks for Data Sharing in Cloud
 
M A M C H A R O 2003
M A M  C H A R O 2003M A M  C H A R O 2003
M A M C H A R O 2003
 

En vedette

Plugin ch12edited-ok
Plugin ch12edited-okPlugin ch12edited-ok
Plugin ch12edited-okdonasiilmu
 
Lecture 22 expenditure cycle part ii - payroll processing accounting informa...
Lecture 22  expenditure cycle part ii - payroll processing accounting informa...Lecture 22  expenditure cycle part ii - payroll processing accounting informa...
Lecture 22 expenditure cycle part ii - payroll processing accounting informa...Habib Ullah Qamar
 
Chapter 1 - The Information System: An Accountant's Perspective
Chapter 1 - The Information System: An Accountant's PerspectiveChapter 1 - The Information System: An Accountant's Perspective
Chapter 1 - The Information System: An Accountant's Perspectiveermin08
 
The Revenue Cycle
The Revenue Cycle The Revenue Cycle
The Revenue Cycle Qamar Farooq
 

En vedette (9)

James hall ch 6
James hall ch 6James hall ch 6
James hall ch 6
 
Plugin ch12edited-ok
Plugin ch12edited-okPlugin ch12edited-ok
Plugin ch12edited-ok
 
James hall ch 14
James hall ch 14James hall ch 14
James hall ch 14
 
James hall ch 13
James hall ch 13James hall ch 13
James hall ch 13
 
Lecture 22 expenditure cycle part ii - payroll processing accounting informa...
Lecture 22  expenditure cycle part ii - payroll processing accounting informa...Lecture 22  expenditure cycle part ii - payroll processing accounting informa...
Lecture 22 expenditure cycle part ii - payroll processing accounting informa...
 
James hall ch 9
James hall ch 9James hall ch 9
James hall ch 9
 
James hall ch 5
James hall ch 5James hall ch 5
James hall ch 5
 
Chapter 1 - The Information System: An Accountant's Perspective
Chapter 1 - The Information System: An Accountant's PerspectiveChapter 1 - The Information System: An Accountant's Perspective
Chapter 1 - The Information System: An Accountant's Perspective
 
The Revenue Cycle
The Revenue Cycle The Revenue Cycle
The Revenue Cycle
 

Similaire à Ch12(revised 20071226)

Communications Technologies
Communications TechnologiesCommunications Technologies
Communications TechnologiesSarah Jimenez
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvanitrraincity
 
L25 network fundamentals
L25   network fundamentalsL25   network fundamentals
L25 network fundamentalsheidirobison
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptxRushikeshChikane2
 
Ecommerce(3)
Ecommerce(3)Ecommerce(3)
Ecommerce(3)ecommerce
 
202160902-Internet-Intranet-Extranet.ppt
202160902-Internet-Intranet-Extranet.ppt202160902-Internet-Intranet-Extranet.ppt
202160902-Internet-Intranet-Extranet.pptDizzi1
 
Knowing where the safe zone is ovum october 22 2013
Knowing where the safe zone is  ovum october 22 2013 Knowing where the safe zone is  ovum october 22 2013
Knowing where the safe zone is ovum october 22 2013 Mark Skilton
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commercem8817
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber lawDivyank Jindal
 
basic it presentation........
basic it presentation........basic it presentation........
basic it presentation........vlsaroj
 
CTO-CybersecurityForum-2010-RonWilliams
CTO-CybersecurityForum-2010-RonWilliamsCTO-CybersecurityForum-2010-RonWilliams
CTO-CybersecurityForum-2010-RonWilliamssegughana
 
Unit4 ppt1 introduction to internet
Unit4 ppt1 introduction to internetUnit4 ppt1 introduction to internet
Unit4 ppt1 introduction to internetFarhanMalik93
 
Securing Digital_Adams
Securing Digital_AdamsSecuring Digital_Adams
Securing Digital_AdamsJulius Adams
 
1, prevalent network threats and telecommunication security challenges and co...
1, prevalent network threats and telecommunication security challenges and co...1, prevalent network threats and telecommunication security challenges and co...
1, prevalent network threats and telecommunication security challenges and co...Alexander Decker
 
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET Journal
 

Similaire à Ch12(revised 20071226) (20)

Communications Technologies
Communications TechnologiesCommunications Technologies
Communications Technologies
 
Final ppt ecommerce
Final ppt ecommerceFinal ppt ecommerce
Final ppt ecommerce
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvan
 
L25 network fundamentals
L25   network fundamentalsL25   network fundamentals
L25 network fundamentals
 
Ecommerce final ppt
Ecommerce final pptEcommerce final ppt
Ecommerce final ppt
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptx
 
Ecommerce(3)
Ecommerce(3)Ecommerce(3)
Ecommerce(3)
 
E commerce 5_units_notes
E commerce 5_units_notesE commerce 5_units_notes
E commerce 5_units_notes
 
202160902-Internet-Intranet-Extranet.ppt
202160902-Internet-Intranet-Extranet.ppt202160902-Internet-Intranet-Extranet.ppt
202160902-Internet-Intranet-Extranet.ppt
 
Knowing where the safe zone is ovum october 22 2013
Knowing where the safe zone is  ovum october 22 2013 Knowing where the safe zone is  ovum october 22 2013
Knowing where the safe zone is ovum october 22 2013
 
Overview
OverviewOverview
Overview
 
IS-Crypttools.pptx
IS-Crypttools.pptxIS-Crypttools.pptx
IS-Crypttools.pptx
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber law
 
basic it presentation........
basic it presentation........basic it presentation........
basic it presentation........
 
CTO-CybersecurityForum-2010-RonWilliams
CTO-CybersecurityForum-2010-RonWilliamsCTO-CybersecurityForum-2010-RonWilliams
CTO-CybersecurityForum-2010-RonWilliams
 
Unit4 ppt1 introduction to internet
Unit4 ppt1 introduction to internetUnit4 ppt1 introduction to internet
Unit4 ppt1 introduction to internet
 
Securing Digital_Adams
Securing Digital_AdamsSecuring Digital_Adams
Securing Digital_Adams
 
1, prevalent network threats and telecommunication security challenges and co...
1, prevalent network threats and telecommunication security challenges and co...1, prevalent network threats and telecommunication security challenges and co...
1, prevalent network threats and telecommunication security challenges and co...
 
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
 

Dernier

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 

Dernier (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

Ch12(revised 20071226)

  • 1. Chapter 12 Electronic Commerce Systems Accounting Information Systems, 5 th edition James A. Hall (Revised by Jiin-Feng Chen, National Chengchi University for classroom use) COPYRIGHT © 2007 Thomson South-Western, a part of The Thomson Corporation. Thomson, the Star logo, and South-Western are trademarks used herein under license
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. SSL Architecture Two layers of protocols
  • 9. Secure Electronic Transaction (SET) 憑證中心
  • 10.
  • 11. The OSI Protocol Data Manipulation Tasks Data Communications Tasks Communications Channel NODE 1 NODE 2 HARD WARE HARD WARE Layer 1 Physical Layer 2 Data Link Layer 3 Network Layer 4 Transport Layer 5 Session Layer 6 Presentation Layer 7 Application SOFT WARE HARD WARE Layer 1 Physical Layer 2 Data Link Layer 3 Network Layer 4 Transport Layer 5 Session Layer 6 Presentation Layer 7 Application SOFT WARE HARD WARE
  • 12.
  • 13.
  • 15.
  • 16.
  • 17.
  • 18. Dynamic Virtual Organization Perhaps the greatest potential benefit to be derived from e-commerce is the firm’s ability to forge dynamic business alliances with other organizations to fill unique market niches as the opportunities arise.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23. DOS Attack Sender Receiver Step 1: SYN messages Step 2: SYN/ACK Step 3: ACK packet code In a DOS Attack, the sender sends hundreds of messages, receives the SYN/ACK packet, but does not response with an ACK packet. This leaves the receiver with clogged transmission ports, and legitimate messages cannot be received.
  • 24.
  • 25. Public and Private Key Encryption 公開及秘密金鑰加密 Public Key is used for encoding messages. Message B Message C Message D Multiple people may have the public key (e.g., subordinates). Private Key is used for decoding messages. Typically one person or a small number of people have the private key (e.g., a supervisor). Message A Ciphertext Ciphertext Ciphertext Ciphertext Message A Message D Message C Message B
  • 26.
  • 27. Text Message Compute Digest of Message Digest Encrypt Using Sender’s Private Key Digital Signature Digital Signature Encrypt Using Receiver’s Public Key Encrypted Message with Digital Signature Attached Decrypt Using Receiver’s Private Key Digital Signature Text Message Decrypt Using Sender’s Public Key Compute Digest of Message Digest Digest Compare Digital Signature 數位簽章 Sender’s Location Receiver's Location
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38. LAN LAN Bridge Gateway Gateway LAN WAN WAN 環狀網路 星狀網路 匯流排網路
  • 39.
  • 40. POS POS POS POS POS Topeka St. Louis Kansas City Dallas Tulsa Star Network 主電腦 Local Data Local Data Local Data Local Data Central Data
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49. POLLING METHOD OF CONTROLLING DATA COLLISIONS MASTER Locked Locked Locked Polling Signal Data Transmission One Site, the “master,” polls the other “slave” sites to determine if they have data to transmit. If a slave responds in the affirmative, the master site locks the network while the data are transmitted. Allows priorities to be set for data communications across the network SLAVE SLAVE SLAVE SLAVE WAN
  • 50.
  • 51.
  • 52.
  • 53.
  • 54. EDI System Purchases System Company A’s mailbox Company B’s mailbox Sales Order System Application Software Application Software Direct Connection VAN Company A Company B EDI Translation Software EDI Translation Software Communications Software Communications Software Other Mailbox Other Mailbox
  • 55.

Notes de l'éditeur

  1. 31
  2. SSL probably most widely used Web security mechanism. Its implemented at the Transport layer; cf IPSec at Network layer; or various Application layer mechanisms eg. S/MIME & SET (later).
  3. Stallings Fig 17-2.
  4. 6
  5. 7
  6. 8
  7. 16
  8. 23
  9. 25
  10. 27
  11. 42
  12. 31
  13. 33
  14. 14
  15. 34