Chap 14 Flashcards
E-commerce
electronically enabled transactions between a business and its customers. – Selling on line
E-business
– E commerce + online supply chain communication and Internal controls
servicing customers and vendors,
trading information with customers and vendors, and
electronic recording and control of internal processes
history of the internist
In 1965, a computer at MIT (Massachusetts) was connected to a computer in California, using dial-up telephone lines.
In 1969, computers at four major universities were connected via leased telephone lines.
Purpose was to share military research
Overtime Universities started to use them.
An electronic hardware device that is located at the gateway between two or more networks is a
packet switch.
URL.
router.
protocol.
router.
The Common Standards of the Internet
URL - uniform resource locater address.
Domain Name - http://www.google.com.
Common suffix portions of domain names: .com - commercial .edu - educational .org - nonprofit .gov - governmental .mil - military .net - network
URL system actually uses IP addresses.
Benefits of E-commerce for the Customer
Access to broader market for goods and services.
More convenient times for shopping.
More choices to the customer.
Lower prices.
Exchange information with businesses before, during, and after the purchase.
Quicker delivery of the product.
Receive targeted marketing from businesses.
Disadvantages of E-commerce for the Customer
Opportunity for fraud.
Theft of assets.
Theft of data.
Inability to handle or try out the product.
E-commerce and Traditional Commerce
Brick and mortar.
E-tailers.
Clicks and mortar (bricks and clicks).
Personal information to be protected:
Name, address, Social Security number, or other government ID numbers
Employment history.
Personal or family health conditions.
Personal or family financial information.
History of purchases or other transactions.
Credit records.
The supply chain is the set of linked processes that take place from the,
acquisition and delivery of raw materials, through the manufacturing, distribution, wholesale, and delivery of the product to the customer.
Which of the following processes within a supply chain can benefit from IT enablement?
a. All processes throughout the supply chain
b. Only internal processes within the supply chain
c. Only external processes within the supply chain
d. Exchange processes between a company and its suppliers
a. All processes throughout the supply chain
three levels of network platforms
company intranet
extranet, suppliers and buyers
internet, virtual environment
authentication of users controls
user id password security token or smart card biometric devices login procedures access levels computer logs authority tables
controls to limit access to intranets and extranets
authentication of users
hacking and other break ins
hacking and other break ins controls
firewall encryption security policies security breach resolution secure socket layers virtual private networks wired equivalency privacy service set identifier (SSID) vulnerability assessment penetration testing intrusion detection