1.OVERVIEW OF ELECTRONIC COMMERCE Introduction Definition of Electronic Commerce Electronic Business Potential Benefits of Electronic Commerce The Internet and WWW as Enablers of Electronic Commerce Impact of Electronic Commerce on Business Models Overall Business and E-Commerce Goal Congruence The Impact of Electronic Commerce on the Value Chain The ICDT Business Strategy Model Three Pillars of Electronic Commerce Electronic Commerce Security Organization of Topics Implications for the Accounting Profession Summary Key Words Review Questions Discussion Questions Cases 2.ELECTRONIC COMMERCE AND THE ROLE OF INDEPENDENT THIRDPARTIES Introduction Consulting Practices and Accountants’Independence CPA Vision Project New Assurance Services Identified by the AICPA The Elliott Committee and the Cohen Committee Three Waves of Electronic Commerce Electronic Commerce Integrity and Security Assurance Electronic Commerce Systems Reliability Assurance Internal Control Framework Competition Risk Assessment Assurance Impact of Electronic Commerce on the Traditional Assurance Function Continuous Auditing Third-Party Assurance of Web-Based Electronic Commerce Security of Data Business Policies Transaction Processing Integrity Privacy of Data Web Site Seal Options Better Business Bureau Truste Veri-Sign ICSA AICPA/CICA Webtrust Business Practices Transaction Integrity Information Protection Report Issuance Comparison of Seals Implications for the Accounting Profession Skill Sets Expansion of Assurance Services Consulting and International Services Summary Key Words Review Questions Discussion Questions Cases 3.THE REGULATORY ENVIRONMENT Introduction Cryptography Issues Key Length Key Escrow and key Recovery International Cryptography Issues Privacy Issues FTC Privacy Online Report Adults’Privacy Rights and The EU’s Directive Web Linking Inappropriately Referencing a Linked Site Displaying Information without Proper Referencing Linking Using Framing Linking Using Trademark in Keyword Meta Tags Unauthorized Display of a Registered Trademark Linking to Illegal Files Domain Name Disputes Similarly Named companies or Products Registering and Using a Competitor’s Name Domain Names Registered and Held Hostage Domain Name Dispute Resolution Internet Sales Tax International Tax Issues Electronic Agreements and Digital Signatures Internet Service Prodivers and International Libel Laws Implications for the Accounting Profession Liability Exposure and Risk Assessment Expansion of Legal Resources and Services Digital Signatures and Certificate Authorities Summary Key Words Review Questions Discussion Questions Cases 4.EDI,ELECTRONIC COMMERCE,AND THE INTERNET Introduction Traditional EDI Systems The Origin of EDI Non-EDI Systems Value-Added Networks(VANs)and Preestablished Trading Partners Partially Integrated EDI Systems Fully Integrated EDI Systems Benefits of EDI Systems Data Transfer and Standards Department of Defense Transaction Example Financial EDI EDI Systems and the Internet Security concerns Security of Data during Transmission Audit Trails and Acknowledgements Authentication Internet Trading Relationships Consumer to Business Business to Business Governmnet to citizen Benefits EDI Web Browser Translation Software Insight’s EDI and Internet Systems Real-time EDI Inventory Links with Suppliers Entegrated Delivery Links with Federal Express Web-Based Sates Impact of EDI-Internet Applications on the Accounting Profession Increased Complexity of Auditing through the computer Integrity of and Reliance in the VANs Extension of Audit to Trading Partners’s Systems Increased Technological Skills of Smaller Accounting Firms Summary Key Words Review Questions Discussion Questions Cases 5.RISKS OF INSECURE SYSTEMS Introduction Overview of Risks Associated with Internet Transactions Internet Associated Risks Risks to Customers False or Malicious Web Sites Stealing Visitors’Ids and Passwords Stealing Visitors’Credit Card Information Spying on a Visitors’Hard Drive Theft of Customer Data from Selling Agents and ISPs Privacy&the Use of Cookies Risks to Selling Agents Customer Impersonation Denial of Service Attacks Data Theft Intranet Associated Risks Sabotage by Former Employees Threats from Current Employees Sniffers Financial Fraud Downloading of Data E-Mail Spoofing Social Engineering Risks Associated with Business Transaction Data Transferred between Trading Partners Intranets,Extranets and Internet Relationships Data Interception Message Origin Authentrication Proof of Delivery Message Integrity&Unauthorized Viewing of Messages Timely delivery of Messages Risks Associated with Confidentially-Maintained Archival,Master File and Reference Data Risks Associated with Viruses and Malicious Code Overflows Viruses Trojan Horses Hoaxes Buffer Overflows Implications for the Accounting Profession Intranets and Internal Controls Intranet and Internal Controls Web Site Assurance Summary Key Words Review Questions Discussion Questions Cases 6.RISK MANAGENENT Introduction Control Weakness vs.Control Risk Security Gaps Culture Management Excessively Tight Controls Risk Management Paradigm Disaster Recovery Plans Disaster Recovery Plan Objectives Second Site Back-up alternatives Mutual Aid Pact Cold Site/Crate and Ship Hot Site Conducting a Dress Rehearsal Implications for the Accounting Profession Evolution of Internal control Framework The Control Environment Risk Assessment Control Activities Information and Communication Monitoring The Role of Internal Controls in Risk Management Summary Key Words Review Questions Discussion Questions Cases 7.INTENET SECURITY STANDARDS Introduction Standard Setting Issues and Committees ANSI UN/EDIFACT ANSI’s ASC X12 Alignment Task Group Leading the Migrations to UN/EDIFACT Major Standard Setting Structures and Interfaces U.S.and International Standard Setting Bodies Internet and WWW Committees Internet committees WWW Committees W3C OBI Global Information Infrastructure Commission Security Committees and Organizations Security Protocols and Languages OSI TCP/IP IP Addresses Class A Class B Class C Class D and Class E Domain Names IPv6 FTP and TELNET NNTP HTTP and HTTP-NG S-HTTP,SSL,and PCT SGML,HTML,and XML DOM ang DHTML JAVA STEP Messaging Protocols Basic Mail Protocols Security-Enhanced Mail Protocols Secure Electronic Payment Protocols The Role of Accountants in Internet-related Standard Setting Process Summary Key Words Review Questions Discussion Questions Cases 8.CRYPTOGAPHY AND AUTHENTICATION Introduction Messaging Security Issues Confidentiality Integrity Authentication Non-Repudiation Access controls Encryption Techniques Symmetric Encryption Keys Data Encryption Standard Triple Encryption Advanced Encryptions Standard Skipjack RC2,RC4,and RC5 Asymmetric cryptography Public-Private Key Pairs Elliptic Curve Cryptography Integrity check Values and Digital Signatures Integrity check Value(Hashes) Digital Signatures One Time Pads Good Encryption Practices Passwork Maintenance Key Length Key Management Policies Compressed Files Message contents Key Manangement Public Certification Authorities Private or Enterprise Certification Authorities Hybrid Public and Private certification Authorities Key Management Tasks Identification and Verification of Users Key Generation Key Registration Key Escrow and Recovery Key Updates and Replacement Key Revocation and Destruction Additional Authentication Methods Additional Non-Repudiation Techniques Implications for the Accounting Profession Confidentiality Message Integrity Authentication Non-repudiation Access Controls Internal Control and Risk Analysis Summary Appendix A-The RSA Algorithm Appendix B-XOR Function Key Words Review Questions Discussion Questions Cases 9.FIREWALLS Introduction Firewall Defined TCP/IP Open Systems Interconnect(OSI) Components of a Firewall typical functionality of Firewalls Packet Filtering IP Spoofing Network Address Translation Application-Level Proxies Stateful-Inspection Virtual Private Networks Real-Time Monitoring Network Topology Demilitarized Zone Securing The Firewall Policy Network Security Access Policy Firewall Design Policy Administration Services Telnet and FTP Security Issues Finger Service Security Issues Internal Firewalls Authentication Operating System Controls Factors to Consider in Firewall Design In-House Solutions vs.Commercial Firewall Software Limitations of the Security Prevention Provided by Firewalls Implications for the Accounting Profession Penetration Testing and Risk Exposure Provider of Network Solutions Forensic Accounting and Intrusion Investigation Summary Key Words Review Questions Discussion Questions Cases 10.ELECTRONIC COMMERCE PAYMENT MECHANISMS Introduction The SET Protocol SET vs.SSL Version 1.0 Payment Gateway Certificate Issuance Certificate Trust Chain Cryptography Methods Dual Signatures The SET Logo Compliance Testing Status of Software Implementations Version 2.0 and Intermediate Releases Magnetic Strip Cards Smart Cards Electronic Checks The FSTC’s Electronic Check The FSTC’s BIPS Specification BIPS and EDI Electronic Cash Implications for the Accounting Profession Audit Implications Electronic Bill Presentment and Payment systems Summary Key Words Review Questions Discussion Questions Cases 11.INTELLIGENT AGENTS Introduction Definition of Intelligent Agents Capabilities of Intelligent Agents Level of Agent Sophistication Agent Societies Intelligent Agents&Electronic commerce The Online Information Chain Push Technology and Marketing Pull Technology and Demands of Information and Services New Geographical Markets Business-to-Business Transaction Negotiation Limitations of Agents Implications for the Accounting Profession Continuous Reliability Assurance Agents and Security Summary Key Words Review Questions Discussion Questions Cases 12.WEB-BASED MARKETING Introduction The Scope of Marketing Business,Marketing,and Information Trchnology Strategy Congruence The Four Ps Applied to Internet Marketing Product Pricing Place(Distribution) Promotion The Fifth“P”.Personalization toffler’s Powershift Marketing Implications of the consumer Power Shift Building Relationships through Database Marketing Personalized Transaction Domain The Relentless Search for Value Internet Marketing Techniques Passive Providers of Information Search Engine and Directory Registration Solicited,Taargeted E-mail Interactive Sites Banner Advertising Off-Line Advertising Unsolicited,Targeted E-Mail Spam Mail E-mail Chain Letters On-Line Advertising Mechanisms Directories Search Engines Keywords and Meta Tags,and Frequency of Words Location of Words Link Popularity Reviewed Sites Case Sensitive Banners Sponsorships Portals On-line Coupons Web Site Design Issues Page Loading Efficiency Simplicity Use the Space Wisely Create a Reason to Return Framing Tables and Fonts Graphics Interlaced Graphics GIF vs.JPEG Files Colors and Contrast Purchasing Information Tracking Data Intelligent Agents and Their Impact on Marketing Techniques Implications for the Accounting Profession Summary Key Words Review Questions Discussion Questions Cases INDEXES