Leslie Turner CH 14
Leslie Turner CH 14
14
Introduction to E-Commerce
STUDY OBJECTIVES
and E-Business
This chapter will help you
gain an understanding of the (Study Objective 1)
following concepts:
The Real World example on the next page will help you
1. An introduction to e-commerce
understand the context of many concepts covered in this
and e-business
chapter. Please read the Real World example to begin effec-
2. The history of the Internet tive reading and studying of this chapter.
3. The physical structure and Organizations use information technology (IT) to improve
standards of the Internet efficiency and effectiveness of their operations. As presented
4. E-commerce and its benefits in the Real World example on the next page, Walmart transi-
tioned to Internet EDI to save costs and to take advantage of
5. Privacy expectations in
the new EDI technology. For Walmart and in many other
e-commerce
cases, this transition resulted in major changes, not only for
6. E-business and IT enablement the newly IT-enabled organizations, but also for their trading
7. E-business enablement partners, the entire business world, and other aspects of the
examples economy. The Walmart decision caused 10,000 Walmart sup-
8. Intranets and extranets to pliers to invest in new IT systems and resulted in major
enable e-business changes in the demand for EDIINT.
Walmart’s EDIINT transition is an example of e-business.
9. Internal controls for the Internet,
E-business is the use of electronic means to enhance business
intranets, and extranets
processes. E-business encompasses all forms of online elec-
10. XML and XBRL as e-business tronic trading, consumer-based e-commerce, and business-to-
tools business electronic trading and process integration, as well as
11. Ethical issues related to the use of IT and related technologies for process integration
e-business and e-commerce inside organizations.
“E-business” is a term used widely in business and in the
mass media. However, there are sometimes misunderstandings
about e-business and e-commerce, and any differences between
the two. In addition, the sheer number of acronyms in use in e-business and the tech-
nological nature of some of the acronyms can make it difficult to understand
e-business. The first purpose of this chapter is to define and clarify many of the terms
and concepts related to e-business and e-commerce. In addition, this chapter describes
the advantages, disadvantages, security issues, and controls related to e-business.
502
Introduction to E-Commerce and E-Business (Study Objective 1) 503
There is some overlap between e-commerce and e-business, and this leads some
to confuse the two concepts. E-commerce is electronically enabled transactions
between a business and its customers. E-business is a broader concept that includes
not only electronic trading with customers, but also servicing customers and ven-
dors, trading information with customers and vendors, and electronic recording
and control of internal processes. These internal processes include electronic
employee services such as access to personnel records and fringe benefits informa-
tion, travel and expense reporting, and purchases of office supplies and other items.
Exhibit 14-1 shows the differences and the overlap between the two concepts.
E-commerce is the sale of goods or services from a business to an end-user or
consumer. Since e-commerce involves selling to consumers, the usual sale will be a
relatively small dollar amount when only a few items are sold. The company making
the sale will strive for high-volume sales to many consumers to generate a profit. Its
customers will use a user-friendly interface, such as a Web browser, to place the
order and pay with a credit card. Amazon.com, Inc., is a well-known example of an
e-commerce enterprise. The sales between Amazon.com and its customers are sales
between a company and end-user customers.
E-Business
Systems
Technology E-Commerce
Suppliers THE INTERNET Customers
Infrastructure Systems
EXHIBIT 14-1
E-Business and E-Commerce
504 Chapter 14 E-Commerce and E-Business
On the other hand, e-business is a broader concept that encompasses many busi-
ness processes, using IT systems to enhance or streamline these processes. A part of
e-business includes company-to-company sales, including the sale of goods, services,
or raw materials between companies in a supply chain, as well as internal processes
like product design and production. An example of a supply chain sale is a manu-
facturer that buys raw materials from a vendor, using the Internet as the electronic
network. These e-business sales tend to be large in dollar value and each order is
likely to include many items. The buyer and seller will use common business docu-
ments such as purchase orders and invoices, but in electronic form. The software
interface between buyer and seller will usually involve more than just a Web browser.
The vendor’s and buyer’s computer systems may be linked, and the vendor may
actually be able to access and monitor the buyer’s inventory systems.
For a majority of e-business enabled companies, the infrastructure that supports
e-business and e-commerce includes software systems such as ERP, CRM, and SCM.
The details of this infrastructure was described in Chapter 6.
The most common method of conducting e-commerce and e-business is to use
the Internet to electronically exchange data. The next section presents the histori-
cal development of the Internet, which provides insight into its widespread applica-
tion in the business world.
The ARPANET was developed during the height of the Cold War and nuclear
weapon proliferation. Thus, the network was designed so that if any of the sites were
destroyed by a nuclear attack, the other sites could still function and share the mili-
tary research data. Therefore, routers were designed to direct the network traffic via
many possible alternative routes.
E-mail, which is simply another form of data that can be transmitted over a net-
work, was adapted to ARPANET in 1972. Ray Tomlinson of BBN Technologies devel-
oped the idea of using the @ symbol to separate the user name from the address.
BBN Technologies has been involved in much of the development of the Internet.
BBN Technologies also developed a communication protocol for ARPANET that is
still used today. Since there were several different brands and types of computers in
the network ARPANET, a common communication protocol was necessary to allow
different types of computers to communicate. A protocol is a standard data com-
munication format that allows computers to exchange data. Computers must have
a common communication method to be linked together in a network. As an anal-
ogy, consider what might happen if a foreign exchange student from Japan met a
foreign exchange student from Spain in the hallway of the business building at your
college. They would be completely unable to communicate in their native lan-
guages. However, if both were accompanied by an English translator, their native
languages could be translated into English, communicated between the translators
(the network), and then translated into the language of either student. Likewise, a
common and standard communication protocol allows computers with different
operating systems to communicate on a network. Thus, a UNIX computer, or Digital
Equipment Company’s (DEC) OpenVMS, can communicate with a Windows or
Apple computer.
In the 1970s, BBN Technologies helped develop the TCP/IP protocol that con-
tinues to be used in the Internet today. TCP/IP is an abbreviation for transmission
control protocol/Internet protocol.
Through the 1970s and 1980s, the ARPANET continued to grow, adding universi-
ties, research organizations, and libraries to its network. However, other than uni-
versities, libraries, and research organizations, there were no other users of
ARPANET. In 1986, the National Science Foundation (NSF) funded and began
developing a backbone set of servers, gateways, and networks that eventually became
what we now call the Internet. The NSF also set rules for the use of the Internet by
government, university, and research users. Throughout its history of development
and until the early 1990s, the Internet was not user friendly and was not used by the
general public. The Internet is the global computer network, or “information super-
highway.” The term “Internet” comes from the concept of interconnected networks.
Thus, the Internet evolved from a variety of university- and government-sponsored
computer networks built largely for research. That network became the Internet
and now consists of millions upon millions of computers and subnetworks through-
out the world. The Internet serves as the backbone for the World Wide Web (WWW).
In 1993, Marc Andreessen developed the first graphical user interface (GUI)
browser, which he named Mosaic. Using the ideas and concepts in the Mosaic
browser, Andreessen developed the Netscape® Navigator Web browser. Netscape
became a phenomenon and fueled the use of the Internet by the general public.
A GUI browser made the Internet user-friendly so that it could be used by the gen-
eral public. During this period, more commercial enterprises became involved in
adding to the network backbone of servers, routers, and gateways. In 1992, com-
mercial enterprises such as Delphi Corporation and America Online (AOL) began
offering Internet access to subscribers. This was the first time that the general public
506 Chapter 14 E-Commerce and E-Business
10,000
1,000
5 6 7 9 0 1 2 3 4 6 7 8 9 0 1 3 4 5
99 99 99 99 00 00 00 00 00 00 00 00 00 01 01 01 01 01
u g 1 ct 1 ec 1 eb 1 pr 2 un 2 ug 2 ct 2 ec 2 eb 2 pr 2 un 2 ug 2 ct 2 ec 2 eb 2 pr 2 un 2
A O D F A J A O D F A J A O D F A J
EXHIBIT 14-2 Chart of the Number of Websites (Source of data: news.netcraft.com/archives/2016/)
could access the Internet by buying a monthly subscription account with an Internet
service provider. In 1994, the first business transaction occurred on the Internet.
In 1995, the NSF relinquished control of the Internet backbone to commercial
enterprises, and the NSF funded backbone was separated from the Internet and
returned to a research network. Since that time, all Internet traffic has been routed
through commercial networks. The latter half of the decade of the 1990s saw explo-
sive growth of the Internet. Retailers and other organizations began conducting
business via the Internet, and many new Internet-based companies were formed.
Companies such as Amazon.com, eBay, Webvan, and Pets.com were started during
this time. These are only a few examples of the so-called dot-com firms of the 1990s,
some of which did not survive beyond the beginning of the next decade.
As the Internet grew, the backbone was continually updated and improved to add
servers, routers, and networks that transmit data much faster. The speed and amount
of network traffic grew very rapidly as new technologies fueled improvements. The
exponential growth of the Internet throughout its life can be seen in Exhibit 14-2.
As you will note by looking at Exhibit 14-2, there have been a few periods of
decline in the number of websites, such as during economic downturns in 2002 and
2009. However, Exhibit 14-2 shows that the number of websites has continued to
grow rapidly, and the overall trend shows exponential growth since the Internet was
commercialized.
Local ISP
Regional ISP
NAP NAP
Regional ISP
For domains outside the United States, the suffix indicates the country. For example,
.ca is Canada and .au is Australia.
The Physical Structure and Standards of the Internet (Study Objective 3) 509
<html>
<head>
<title>A Simple Web Page</title>
</head>
<body>
<h1><center>A Simple Web Page</center></h1>
This is a simple Web page to demonstrate the following concepts:
<ol>
<li>The view of a Web page in a browser.</li>
<li>The underlying <b>HTML code</b>.</li>
<li>The <i>linking</i> of one Web page to another.</li>
</ol>
<center>To return to the home page, <a href=“www.simplesite.com/index.htm”>click
here</a>.</center>
</body>
</html>
EXHIBIT 14-4 A Simple Web Page and the HTML Source Code
510 Chapter 14 E-Commerce and E-Business
The URL addressing system actually uses IP addresses rather than domain names
that are spelled out. An IP address is an Internet protocol address. A given domain
name is associated with a single IP address. In the same way that your postal address
allows your mail carrier to locate your exact home, an IP address contains the
unique information that allows a specific website or server to be located.
There are specialized servers on the Internet called domain name servers (DNS),
which function to store, index, and provide IP addresses for each domain name.
When a domain name such as coke.com is typed into a Web browser, a request is
sent to a DNS to find the IP address of the domain, and the website is located on the
basis of the IP address.
Since the Internet is an open network system that anyone can access, there are
those who misuse the Internet for illegal and fraudulent activity. Examples of such
risks are hackers, identity thieves, password sniffers, and denial of service attacks.
Without an extra layer of protection, any data exchange between a user and a Web
server is open for anyone to read. This means if you enter your credit card number
on an e-commerce website, your credit card number and other data can possibly be
intercepted. Therefore, the majority of e-commerce sites use common forms of
encryption and data protection.
The standard form of encryption embedded in e-commerce sites and in Web
browser software is secure sockets layering (SSL), an encryption system in which the
Web server and the user’s browser exchange data in encrypted form. The Web
server uses a public encryption key, and only the browser interacting with that Web
server can decode the data. Web browsers in use today use 128-bit encryption.
Persons using a Web browser will know they are connected to a secure encrypted
site that uses SSL by seeing two things in their Web browser. First, a website using
SSL will have a URL address that begins with https://. The extra “s” at the end of
the http denotes a secure site. Also, most browsers show a picture of a locked pad-
lock in the lower bar of the Web browser. SSL and encryption allow the general
public to conduct e-commerce over websites with less risk of exposing credit card or
other private information.
The Internet network, the World Wide Web, and the common standards used
allow the general public to browse the Web, share data, send e-mail, and conduct
e-commerce. The next section describes e-commerce.
may have to opt out of providing information. Also, customers should have
access to descriptions about the choices available and the organization’s pri-
vacy policies. As in “Notice” in Point 2, these descriptions usually are in the
form of a link to the applicable areas of the organization’s website where the
information is provided.
4. Collection. The organization should collect only the data that is necessary for
the purpose of conducting the transaction. In addition, the customer should
have provided implicit or explicit consent before data is collected. Explicit
consent might be in the form of placing a check mark by a box indicating
consent. Implicit consent occurs when the customer provides data that is
clearly marked as voluntary, or when the customer has provided data and has
not clearly stated that it cannot be used.
5. Use and retention. The organization uses customers’ personal data only in
the manner described in “Notice” in Point 2. The use of this data occurs only
after the customer has given implicit or explicit consent to use the data. Such
personal data is retained only as long as necessary.
6. Access. Every customer should have access to the data provided so that the
customer can view, change, delete, or block further use of the data.
7. Disclosure to third parties. In some cases, e-commerce organizations forward
customer information to third parties. Before this forwarding of data occurs,
the organization should receive explicit or implicit consent from the cus-
tomer. Personal data should only be forwarded to third parties that have
equivalent privacy protections.
8. Security for privacy. The organization has necessary protections to try to
insure that customer data is not lost, destroyed, altered, or subject to unau-
thorized access. The organization should put internal controls in place to
prevent hackers and unauthorized employees from accessing customer data.
9. Quality. The organization should institute procedures to insure that all cus-
tomer data collected retains quality. Data quality means that the data remains
“accurate, complete, current, relevant, and reliable.”
10. Monitoring and enforcement. The organization should continually monitor
to insure that its privacy practices are followed. The organization should have
procedures to address privacy related inquiries or disputes.
In summary, these practices require that a company establish, enforce, monitor, and
update policies and practices that protect the privacy and security of customer infor-
mation. The company should consider not only its own privacy practices and poli-
cies, but also the practices and policies of any third parties who will share information.
Companies that fail to establish good policies or that fail to enforce their policies
have violated the ethical standards that customers expect when conducting
e-commerce. The ethics-related aspects of privacy are addressed at the end of
this chapter.
Retailers Customers
Distributors
Secondary Warehouses
Suppliers
Suppliers
Manufacturer
Logistics
EXHIBIT 14-5 The Supply Chain for a Manufacturing Company
Some companies choose to be involved in many parts of their supply chain. For
example, a vertically integrated company may have its own related subsidiaries so
that each of the interactions within the supply chain is conducted with an organiza-
tion that is owned or controlled by the larger corporate entity. Vertical integration
occurs when a single company owns all of the entities that make up its supply chain,
from the movement of raw materials to the delivery of finished products to customers.
518 Chapter 14 E-Commerce and E-Business
Other companies may choose to focus on only a small part of the supply chain.
For example, a company could choose to conduct only the manufacturing portion
of the supply chain, while all other entities within the supply chain—suppliers, dis-
tributors, wholesalers, and retailers— are separate, unrelated companies. These dif-
fering levels of integration within the supply chain mean that the processes which
occur within a supply chain may be internal to a company or may involve exchanges
with external entities. In either case, internal or external, those processes and
exchanges can be streamlined or enhanced through e-business.
The “Logistics” label in Exhibit 14-5 illustrates that there are entities within the
supply chain whose function is to provide the physical support that moves materials
and goods from one part of the supply chain to the next. For example, a manufac-
turer must have a means of moving raw materials from the supplier to the manufac-
turing plant and of moving finished goods from the plant to the warehouse and
distributor. Logistics are the types of services provided by entities such as trucking
companies, air and rail freight companies, and freight expediting companies.
Any of the interactions between the entities within the supply chain may be a
point at which e-business can be applied to streamline or reduce costs. The next
section describes a smaller subset of e-business interactions within the supply chain:
B2B, or business-to-business electronic transactions.
EXHIBIT 14-6
E-commerce B2C vs. E-Business B2B3
Differences between E-Commerce and E-Business
E-COMMERCE, or B2C E-BUSINESS, or B2B
• Business-to-consumer • Business-to-business
• Few line items per order • Many line items per order
• Large order volume • Very specific shipping data
• Geared to consumer’s ease of use • User-selected information content and
interaction tools, deeper functionality
• Use of credit card purchasing • Use of purchase orders
• Sophisticated transaction protocols
• No necessity of a preexisting • Buyer and seller usually have a pre-existing
relationship between buyer relationship and negotiated prices and
and seller delivery details
When conducted via the Internet, B2B transactions between supplier and buyer
offer many advantages to both parties. Many of the advantages are similar to those
described in the e-commerce section of this chapter. Internet-based transactions
offer a wider potential market, reduced transaction cost, and higher profits. B2B
will also result in faster cycle times for the purchases from suppliers. The cycle time
is the time from the placement of an order for goods to the receipt of, and payment
for, the goods. The faster cycle time results from the increased efficiency of process-
ing transactions via the Internet. In B2B transactions between suppliers and buyers,
the two IT systems exchange data through the Internet network. The Internet allows
companies to reduce or eliminate manually keying the order into the computer
system, mailing documents to initiate the order, entering receipt of goods, and key-
ing in documents to initiate payment. The fact that the two IT systems communicate
eliminates data errors, since data may no longer be manually keyed into the system.
3
Adapted from Janet Gould, “What’s the Difference between E-Commerce and E-Business? And Why
Should You Care?” ID Systems, vol. 19, issue II, November 1999.
520 Chapter 14 E-Commerce and E-Business
4
“GE and the Internet: An Executive Speech Reprint” http://callcentres.com.au/GE2_Jack_Welch.htm
5
“GM Launches E-com Drive,” Ecommerce, August 10, 1999, http://www.internetnews.com/ec-news/arti-
cle.php/179701
6
“eGM head pursues broad e-commerce plan,” Infoworld, March 6, 2000, p. 18.
7
Ibid.
Intranets and Extranets to Enable E-Business (Study Objective 8) 521
levels of the Internet network structure that enable e-business are the Internet,
extranets, and intranets. These levels of the network serve as the platform to con-
nect parties throughout the supply chain.
INTERNET
EXTRANET
Virtual Company
Suppliers Buyers Virtual
Environment INTRANET
uses TCP/IP protocol and the same type of HTML Web pages as the Internet. However,
the computer servers of the intranet are accessible only from internal computers
within the company. The purposes of an intranet are to distribute data or information
to employees, to make shared data or files available, and to manage projects within the
company. For example, GM engineers located in several different offices across the
United States may collaborate on the design of a new car. Those engineers can share
project files and information by the use of the internal network, the intranet.
To engage in B2C e-commerce, a company must access the Internet, since it is the
network platform that gives a wide range of customers access to B2C sales. For exam-
ple, Amazon.com could not exist as it currently does if it were not able to reach
customers anywhere and anytime over the Internet. However, when an organization
engages in B2B e-business and e-business throughout the supply chain, it is not inter-
ested in reaching the general public. Instead, e-business activities require network
access to entities such as suppliers, distributors, logistics providers, and wholesalers.
When communicating with these entities, the company in fact needs to exclude
access by the general public. For example, if Dell, Inc., is buying computer hard
drives from a supplier, Western Digital Corporation, it would be more appropriate
for these two businesses to use a network that does not allow the general public to
have access. Rather than using the Internet, this type of exchange may use an extranet.
An extranet is similar to an intranet except that it offers access to selected outsid-
ers—buyers, suppliers, distributors, or wholesalers in the supply chain. Extranets are
the networks that allow business partners to exchange information through limited
access to company servers and data. The external parties have access only to the data
necessary to conduct supply chain exchanges with the company. For example, sup-
pliers would need access to raw material inventory levels of the company they sell to,
but they would not need access to finished product inventory levels. Conversely, a
wholesaler within the value chain may need access to the manufacturer’s finished
product inventory, but would not need access to raw material inventory levels.
EXHIBIT 14-8
(continued )
524 Chapter 14 E-Commerce and E-Business
their supply chain. For example, if a small company were a supplier to Ford Motor
Company, it would have no choice but to implement an EDI system, since Ford con-
ducts purchases only via EDI. The second limiting factor is that traditional EDI in
the United States is based on an old document standard (ANSI X.12) that limits the
kind of data that can be exchanged via EDI. The ANSI X.12 standard for EDI defines
standards for common business documents such as purchase orders and invoices.
However, the standard was never intended to cover the more extensive and complex
exchange of information, such as shared files or databases, that occurs when com-
panies collaborate on a project. Given these limitations, traditional EDI was never
widely adopted by small to medium-sized businesses.
The growth of the Internet over the last two decades has provided a powerful and
inexpensive alternative to traditional EDI. Internet EDI uses the Internet to trans-
mit business information between companies. Internet EDI is also referred to as
EDIINT. There are several advantages to using the Internet or extranets to transmit
EDI, compared with private leased lines or VANs. By far the biggest advantage is that
the Internet or extranets allow cost-free exchange of data. The companies using the
Internet or extranets avoid the cost of leasing private lines and paying fees to VANs.
This allows any business, including small and medium-sized businesses, to employ
EDI at a relatively low cost.
The Internet EDI method of transmission is a relatively new development, but
some companies have implemented it throughout their supply chain. A partial list
of companies using Internet EDI extensively includes General Electric, Procter &
Gamble, Walmart, Kohl’s, and Meijer. Exhibit 14-9 summarizes the advantages of
Internet EDI in comparison with traditional EDI employing value added networks.
A value-added network is expensive because a company must pay monthly fees or
transaction fees to use the VAN. Internet EDI is much less costly because the Internet
network can be used without fees. In addition, the hardware and IT systems neces-
sary to support traditional EDI via a VAN are very complex and expensive. Much
computer hardware and software must be dedicated to providing traditional EDI.
Internet EDI is much less complex and requires only minimal computer hardware
and software. Internet EDI can be operated with only a PC or network of PCs that
are Internet connected. This allows the easy adoption of Internet EDI by small and
medium-sized businesses.
EXHIBIT 14-9
Traditional EDI Using VAN versus Internet EDI
VAN Internet EDI
Expensive Low-cost
Transaction fees Zero transaction fees
Complicated Easy to use
Heavy infrastructure Minimal infrastructure
Proprietary Industry standard
Batch-related store and forward Real-time
Limited usage Entire supply chain
Limited data transport All data transport
Limited access Web browser
526 Chapter 14 E-Commerce and E-Business
Since 2014, every public company that is required to file financial reports with the
SEC must provide the reports in XBRL format. The idea behind XBRL is that finan-
cial data is tagged in a computer readable format that allows the users to readily
obtain, analyze, exchange, and display the information.
XBRL financial statements have two major advantages over paper-based finan-
cial statements. Financial statements that are coded in XBRL can easily be used in
several formats. They can be printed in paper format, displayed as an HTML Web
page, sent electronically to the SEC, and transmitted to banks or regulatory agen-
cies as an XML file. When a financial statement is prepared in XBRL, a computer
program such as a Web browser can extract pieces of information from the XBRL
file. The underlying financial data can be loaded into spreadsheets or other finan-
cial analysis software. This is not possible with an HTML file. For example, while a
financial statement in HTML format can be viewed on a website, the computer
cannot extract sales. However, a XBRL financial statement would tag the dollar
amount of sales with the tag that names that number sales. The computer can then
extract specific pieces of data. This capability allows investors and creditors to more
easily analyze financial statements, which should result in better investment and
credit decisions.
For XBRL to be implemented widely, common standards regarding the tags that
identify data must be developed and accounting software vendors must use these
tags within the software.
Parry Aftab, “Hooked on Phonics Gets Hooked,” Information Week, August 2, 2004.
8
Summary of Study Objectives 529
1996 (HIPAA) includes a section on the security of health care information. The
Act requires health care providers, health plans, hospitals, health insurers, and
health clearinghouses to follow regulations that protect the privacy of medical-
related information.
As the issue of consumer privacy continues to become more important, there
may be new regulations and requirements affecting companies. Even if there were
no new regulations, ethical obligations would dictate that companies take adequate
care to guard the security and privacy of data collected through e-commerce.
The history of the Internet. The Internet of today evolved from an early govern-
ment research network called ARPANET. Many of the network standards were
developed in the period of ARPANET. Routers, TCP/IP, and e-mail all came about
during this time. ARPANET gradually evolved into a fully commercial network
called the Internet. After the Internet became available for commercial transactions
in 1994, it experienced tremendous and rapid growth.
The physical structure and standards of the Internet. Backbone providers, regional
Internet service providers, and local Internet service providers make up the physical
structure of the Internet that connects global users. The common standards that
allow computers to communicate with each other over the Internet are TCP/IP,
HTML, domain names, addresses based on uniform resource locater (URL), and
SSL encryption.
E-commerce and its benefits. The most well-known form of e-commerce is business-
to-consumer (B2C) transactions using the World Wide Web. B2C sales transactions
offer many benefits to both the consumer and the business.
many benefits to the IT enablement of processes within the supply chain. E-business
includes business-to-business (B2B) electronic transactions.
E-business enablement examples. There are many forms of e-business. This section
provides examples of ways that businesses streamline business processes, reduce
operational costs, and enhance efficiency through e-business.
Internal controls for the Internet, intranets, and extranets. The Internet, intranets,
and extranets are all networks that are intended to share information and conduct
transactions. In all three networks, controls must be in place to allow the intended
users access, but also limit access to unauthorized users. Therefore, proper user
authentication and hacking controls must be implemented in these networks.
XML and XBRL as e-business tools. XML and XBRL are markup languages that
allow designers to create customized tags for data that enable the definition,
transmission, validation, and interpretation of data between applications and
between organizations. XML is a rich language that facilitates the exchange of
data between organizations via Web pages. XML is used in Internet EDI. XBRL is a
business reporting language that allows businesses to provide dynamic financial
statements to users over the World Wide Web.
Ethical issues related to e-business and e-commerce. The online privacy policies of
the AICPA Trust Services Principles represent ethical obligations to customers.
These are ethical, but not necessarily legal, obligations. However, if a company does
choose to disclose privacy practices on its website, it is then legally obligated to
follow those practices.
KEY TERMS
B2B Domain name Internet EDI Secure sockets layering
B2C E-business Intranet Supply chain
Backbone E-commerce Local ISP TCP/IP
Backbone provider E-tailer Packet switching URL
Bricks and clicks Extranet Protocol Web server
Bricks and mortar HTML Regional ISP XBRL
Clicks and mortar Internet Router XML
End of Chapter Material 531
13 A company’s computer network uses Web servers, 30 (SO 6) Which functions within the supply chain can
HTML, and XML to serve various user groups. Which be enhanced through the use of e-business?
type of network best serves each of the following users? 31 (SO 6) How are activities in the supply chain
Employees Suppliers interdependent?
a. Intranet Extranet 32 (SO 6) In what ways are the characteristics of
b. Intranet Internet e-business different from those of e-commerce?
c. Internet Extranet 33 (SO 8) What are the three levels of network platforms
that are utilized in e-business, and which groups use
d. Internet Internet
each level?
14 An extensible markup language designed specifically
34 (SO 8) Which type of users should have access to
for financial reporting is
an intranet?
a. Internet EDI
35 (SO 8) Which type of users should have access to
b. XML an extranet?
c. XBRL 36 (SO 9) What types of controls should be used to
d. XFRL properly limit access in intranets and extranets?
37 (SO 10) Why is the use of XML advantageous in
Discussion Questions Internet EDI?
15 (SO 1) How do e-commerce and e-business differ? 38 (SO 10) In what ways are XBRL financial statements
16 (SO 2) What was the original purpose of the network advantageous compared with traditional paper
of computers that eventually became the Internet? financial statements?
17 (SO 2) Why was ARPANET designed with many 39 (SO 11) What are some of the ethical obligations of
different alternative routes for network traffic? companies related to e-commerce?
18 (SO 2) Why is a standard protocol necessary in 40 (SO 11) Is there a difference between ethical
computer networks? obligations and legal obligations with regard to
19 (SO 2) How quickly did Internet usage by the public online privacy?
grow after the Internet was opened to business
transactions in 1994? Brief Exercises
20 (SO 3) Describe the relationship between national 41 (SO 1) Much of the e-business and e-commerce
backbone providers, regional ISPs, and local ISPs. conducted by companies uses the Internet as the form
21 (SO 3) What is the importance of a standard format- of electronic communication. Describe other elec-
ting language for Web pages and a standard address- tronic means to conduct e-business or e-commerce.
ing system? 42 (SO 3) How does the use of HTML, URLs, domain
22 (SO 4) Which types of costs can be reduced when a names, and SSL contribute to an Internet that can be
company decides to engage in B2C e-commerce on used worldwide?
the Internet? 43 (SO 4) Describe the benefits to the consumer of
23 (SO 4) What are the differences between bricks-and- B2C sales.
mortar retailers and clicks-and-mortar retailers? 44 (SO 4) Describe the benefits to the company of
24 (SO 5) According to the Online Privacy section of the B2C sales.
AICPA Trust Services Principles, what types of 45 (SO 6) Describe the benefits to a company that
personal information should be protected? engages in B2B transactions via the Internet.
25 (SO 5) If you could condense the ten areas of Online 46 (SO 5) What are the ten areas of privacy practices
Privacy in the AICPA Trust Services Principles, into a described in the Online Privacy section of the AICPA
shorter list (three-, four-, or five-point list), how Trust Services Principles?
would you word that list? 47 (SO 6) Describe the activities that take place in the
26 (SO 5) What is meant by “monitoring and enforce- supply chain of a manufacturing firm.
ment” regarding online privacy practices? 48 (SO 6) Describe the differences between B2C
27 (SO 6) How is e-business a broader concept than and B2B.
e-commerce? 49 (SO 9) Explain the importance of user authentica-
28 (SO 6) Describe the concept of a supply chain. tion and network break-in controls in extranets.
29 (SO 6) Why is it important to ensure an efficient flow 50 (SO 10) What are the advantages of Internet EDI
of goods throughout the supply chain? over traditional EDI?
Cases 533
Problems
51 (SO 2) Explain the hardware and technology 55 (SO 5) Enter the website of a popular retail
standards that were developed during the ARPANET company that sells a large volume of goods or
that were an important foundation for the services on the Internet. Search for the company’s
Internet of today. “Privacy Policies” on that website. If you do not find any
52 (SO 4) Sweet Susanna’s is a local chain of bakeries in privacy policies, continue visiting other company
Austin, Texas. The chain has 18 locations throughout websites until you do find privacy policies. Once you
the city and its suburbs. The management is consider- have found a company with privacy policies, describe
ing opening a website to conduct e-commerce with how the company policies do or do not meet the
customers. Describe any benefits that might be privacy practices in the AICPA Trust Services Principles.
derived from this move. 56 (SO 8) EDIPipeline is an Internet EDI solution for
53 (SO 5) Using a search website, enter the term small to mid-size companies. View the Web page at
“privacy seal” and search. Answer the following http://www.edipipeline.com. Click on the link called
questions: “Trading Partners.” Examine two or three company
names you recognize. Describe how this EDI system
a. What is the purpose of a Web privacy seal?
might be advantageous for a small or mid-size
b. Which organizations provide Web privacy seals to company seeking to be a vendor to a large corpora-
Web-based companies? tion such as Coca-Cola.
c. What are the advantages to a company that 57 (SO 10) Read the article at https://xbrl.us/wp-
maintains a Web privacy seal? content/uploads/2013/12/20131023-RobertHurt.
d. What are the benefits to a consumer of shopping pdf. Briefly describe what this article says about how
from a website that has a privacy seal? XBRL has affected financial reporting.
54 (SO 5) Visit the website www.cpawebtrust.org and 58 (SO 5) List and describe the privacy practices
answer the following questions: recommended by the AICPA Trust Services Principles
a. What is a WebTrust seal? Privacy Framework. If you have ever made a purchase
online, you have likely seen these practices in use.
b. Which organization sanctions the WebTrust seal?
Provide any examples from your own personal
c. What kind of professional can provide a WebTrust experience.
seal to a company?
59 (SO 5) Describe the ethical obligations of
d. What must this professional do before providing a companies to their online customers.
WebTrust seal?
Cases
60 Trudy’s Trendy Threads (TTT) is a regional whole- maintain files consisting of each customer’s e-mail
saler of women’s casual attire. The company is orders, accompanied by a printout of the sales orders
located in Jacksonville, Florida, and it sells to retail entered in the computer. All deliveries are sent via
stores in resort communities in Florida, Georgia, and common carrier from the Jacksonville headquarters to
the Carolinas. TTT employs six salespeople, with each of the customer locations.
each one having responsibility for collecting sales Recently, TTT has experienced delivery problems.
orders from one of the following territories: Southern Namely, a few retail stores located on the eastern
Florida, Florida Gulf Coast, Eastern Florida, Georgia, Georgia seaboard have claimed that they never
South Carolina, and North Carolina. received their deliveries. Helen Bain, TTT’s control-
Each sale representative mails seasonal catalogs to ler, has been investigating these problems along with
the customers in his or her territory. Online catalogs Aaron Shulz, the Georgia sales representative.
are also provided via the company’s website. Sales Through her review of the shipping records, Helen
orders are obtained directly by the sales representatives discovered that each of the problem scenarios
via e-mail. On a daily basis, the sales representatives involved shipment to a warehouse rather than to the
submit orders to the corporate office via the Internet; a customer’s retail store. Interestingly, the sales order
Web browser client is used to enter the e-mail orders files maintained by Aaron indicate that shipment
into a dedicated Web server. The sales representatives should have been set up for delivery to the respective
retail store locations.
534 Chapter 14 E-Commerce and E-Business
Upon further investigation, Helen reviewed the firm’s clients. Direct queries are prepared by Clouse’s
company’s access log and verified that Aaron’s and staff accountants, and the resulting presentation
the other sales representatives’ authorized passwords reports are prepared by the staff and reviewed by
were the only ones used to access the company’s Clouse. This is a time-consuming process, and many
Web server. of Clouse’s clients have demanded more current
Required: information. This problem recently led Clouse to
investigate the possibility of developing a software
a. Speculate as to potential causes of this problem.
package that could produce the financial analyses
b. What additional information would be needed to and reports automatically.
determine the actual cause of this problem?
As Clouse considers the significant investment
c. What controls could be implemented to avoid that would be required to program a new system,
repeated instances of this problem? he is concerned about the loss of control that
61 Clouse Analytics is a financial services consulting firm may be inherent in an automated system. For
that assists its clients with financial analyses surround- instance, he worries about the accuracy and
ing proposed business ventures. John Y. Clouse is the completeness of analyses and reports prepared
firm’s founder and project director. As such, he is automatically.
responsible for preparing most of each client firm’s
Required:
financial analyses and reports, as well as presenting the
results to each client’s management. Due to the varying Perform an online research of XBRL at www.xbrl.org
numbers of managers who may make up a client’s top and determine whether or not XBRL would be
management, Clouse always prepares at least a dozen appropriate for Clouse’s business. Would XBRL be
report copies so that there are plenty to distribute to all more effective and reliable? Why, or why not? Your
persons in attendance at the presentation. response should focus on the existence of any
enhancements or concerns that are likely to result in
Data for financial analyses is obtained directly from
terms of the timeliness of information, internal
the accounting and production databases of the
controls, and security.
11 (SO 4) When there is no necessity for a preexisting various user groups. The following type of network
relationship between the buyer and the seller, that best serves the following user:
transaction is more likely to be classified as b. B2C.
This is a characteristic of business to consumer. Employees Suppliers
Business-to-business transactions presume a preexist- a. Intranet Extranet
ing relationship. An intranet and extranet are similar; however, an
12 (SO 8) Of the given IT controls in an extranet, e. all intranet aids in internal communication, whereas an
are important IT controls. Each option is either a extranet facilitates communication (and trading)
user authentication or hacking IT control that should externally with the company’s business partners.
be implemented to protect an extranet. 14 (SO 10) An extensible markup language designed
13 (CIA Adapted) (SO 8) A company’s computer specifically for financial reporting is c. XBRL. XBRL
network uses Web servers, HTML, and XML to serve stands for eXtensible Business Reporting Language.