Professional Documents
Culture Documents
Session 13 Ch 12 Electronic Commerce Systems
Session 13 Ch 12 Electronic Commerce Systems
based on
Chapter 12
Electronic
Commerce
Systems
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 2
Businesses deliver value at a profit to
customers, creating value for employees,
owners, suppliers and other stakeholders.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Creative Destruction is the Norm
(Schumpeter [1939] 2017)
“Most new firms are founded with an idea and for a definite
purpose. The life goes out of them when that idea or purpose
has been fulfilled or has become obsolete or even if, without
having become obsolete, it has ceased to be new. That is the
fundamental reason why firms do not exist forever. Many of
them are, of course, failures from the start. Like human beings,
firms are constantly being born that cannot live. Others may
meet…death from accident or illness. Still others die a "natural"
death, as men die of old age. And the "natural" cause, in the case
of firms, is precisely their inability to keep up the pace in
innovating which they themselves had been instrumental in
setting in the time of their vigor.”
Schumpeter, Joseph A. (1939), Business Cycles: A Theoretical, Historical, and
Statistical Analysis of the Capitalist Process (New York: McGraw-Hill), 94–95.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Internet Commerce
• Internet commerce has enabled thousands of business
enterprises of all sizes, as well as millions of consumers,
to congregate and interact in a worldwide virtual shopping
mall.
• A significant part of all B2C commerce is now transacted
electronically, digitally.
• A very large part (80%++) of all B2B trading is digital.
• Ryanair’s Boeing 737 MAX order
• Ryanair is expecting to take delivery of 210 firm aircraft
orders. Following the type’s ungrounding,
the airline placed its latest order for MAX jets in early D
ecember
2020. This boosted the firm number by 75, increasing
the order’s total value to over $22 billion.
• Boeing will not
James A. Hall, Accounting accept
Information a10th
Systems, cheque for
Edition. © 2019 thatAll Rights
Cengage. amount!Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 5
E-business opportunities
• Reach:
• Over 2 billion users globally, pre-Covid
• Connect to millions of products
• Richness
• Detailed product information on 20 billion + pages indexed by Google.
Blogs, videos, feeds…
• Personalised messages for users
• Huge new businesses: Amazon, Alibaba, Asos…
• Affiliation
• Partnerships are key in the networked economy
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Figure 1.1 The distinction between buy-side and sell-side e-commerce. (Chaffey,
Edmundson-Bird, and Hemphill 2019)
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Business is easy!
• Just
• Increase revenue (profitably)
• Or reduce costs
• Voila!
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved. 8
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Reducing Transaction Costs
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Business Models - 1
Source: Turban, E. et al., Electronic Commerce 2006: A Managerial Perspective, Prentice Hall, 2006, p.21
Now: (Turban et al. 2015)
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
A Classification of Business Models
• Brokerage Model • Infomediary Model
• Net marketplace
• Auction broker • Merchant Model
• Transaction broker
• ... • Manufacturer
• Advertising Model (Direct) Model
• Portal • Affiliate Model
• Search-based advertising
• … • Community Model
• Subscription Model
• Utility Model
(Rappa 2000)
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Things to bear in mind about e-business
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
What is e-business management?
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
What is e-commerce ?
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
B2B and B2C characteristics
Characteristic B2C B2B
Proportion of adopters Low to medium High to very high
with access
Complexity of buying Relatively simple – More complex – buying
decisions individual and influencers process involves users,
specifiers, buyers, etc.
Channel Relatively simple – direct More complex, direct or
or from retailer via wholesaler, agent or
distributor
Purchasing characteristics Low value, high volume or Similar volume/value. May
high value, low volume. be high Involvement.
May be high involvement Repeat orders (rebuys)
more common
Product characteristic Often standardised items Standardised items or
bespoke for sale
Build-to-order
Suppliers (e.g. Ryanair) or
(e.g. computer Ship-to-order Consumers
components, book
(e.g. Amazon)
publishers)
(B2B) (B2C)
SCM world Enterprise CRM world
ERP, EAI, …
Internal Integration
(does Marketing talk to Operations?)
External Integration
(does the firm talk to the outside world?)
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Types of Companies in the “New Economy”
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Potential Advantages of B2C E-Commerce
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Cost/efficiency and competitiveness
drivers
• Cost/efficiency drivers
• Increasing speed with which supplies can be obtained
• Increasing speed with which goods can be dispatched
• Reduced sales and purchasing costs
• Reduced operating costs
• Competitiveness drivers
• Customer demand
• Improving the range and quality of services offered
• Avoid losing market share to businesses already using e-
commerce
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Where does technology fit into all
this?
THAT’S THE BUSINESS-
TECHNOLOGY CHALLENGE
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Technology is not a Business Strategy
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Business & ICT Must Work Together to Integrate
Technology with Processes
Key Business Translating Business Creating and
Describing
Processes Requirements into Operating the
the Process
Computer Logic Application
Business Unified
• Order to Cash Process Modeling • Process online payment
• Procure to Pay • Verify credit history
• Plan to Produce Modelling Language* • Check hotel availability
• Design to Release • Find local weather
• Financial close to Reports
• Claims to Settlement
• Recruit to Hire
* Note that Unified Modeling Language (IBM) is only one tool used
by businesses – many others exist and work successfully.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Speed, speed, speed: Cycle Time Reduction
Customer Satisfaction
Cycle Time
Cost
• Lower (zero) inventory
• Eliminate 'bullwhip' effects
• Only positive cashflow (produce after being paid, cf. Dell)
• “You can have your cake and eat it, too”
Speed, quality and customer satisfaction are only
achieved by relentless concentration and continuous
improvement of how your company serves its
customers. In other words, by improving your business
processes.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Drivers of business Internet adoption
The two main ways in which increased
profitability can be achieved are:
1. Potential for increased revenue arising from
increased reach and richness to a larger
customer base and encouraging loyalty and
repeat purchases among existing
customers.
2. Cost reduction achieved through delivering
services electronically. Reductions include
staff costs, transport costs and costs of
material such as paper.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Overview of EDI for B2B
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 27
Traditional B2B Technologies: EDI
– Electronic Data Interchange (EDI):
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
B2B Technologies: EDI
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Value-added network and EDI
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 30
B2B and B2C Interactions
after (Chaffey, Edmundson-Bird, and Hemphill 2019)
Supplier Consumer
customers
Organisation
Business
customers
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Disintermediation
• Disintermediation: removal of intermediary steps in a
value chain, e.g., selling directly to consumers
lower purchase transaction costs
potential price advantages
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Channel Conflict
• Channel conflict: tension among different distribution
chains for the same product or service
• Channel member perceives another channel to be engaged in
behaviour that prevents or impedes it from achieving its own
goals
• Web-based direct sales channel
Risk of alienating traditional sales reps (internal conflicts),
distributors (external conflicts), …
Threats may include lockouts or even lawsuits by
distributors
• Disintermediation is usually not instantaneous: how to placate
partners in the distribution channel while taking steps toward
the eventual demise of these relationships?
• Channel cooperation
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Internet Technologies - 1
• World Wide Web
• A web page is a fundamental format for the World Wide Web.
• Text documents called web pages have embedded Hypertext
Markup Language (HTML) codes that provide the formatting
for the page as well as hypertext links to other pages.
• The embedded HyperText Markup Language (HTML)
provides the formatting for a web page as well as hypertext
links to other web pages. The linked pages may be stored on
the same server or anywhere in the world.
• Websites are computer servers that support Hypertext–
Transfer Protocol (HTTP). The pages are accessed and read
via a web browser such as Internet Explorer.
• HyperText Transfer Protocol (HTTP) is the communications
protocol used to transfer or convey information on the World
Wide Web.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 35
Internet Technologies - 2
• World Wide Web (continued)
• A Uniform Resource Locator (URL) is a human-readable
address of the target site in the web browser to access the
website. It’s translated into an IP address – 32-bit or 64-bit.
• An IP broadcast address is a 32-bit number that identifies
each sender or receiver of information sent in packets across
the Internet.
• A home page is a typical point of entry for an Internet website.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 36
Internet Technologies - 3
• Internet Addresses
• E-MAIL ADDRESS
• URL ADDRESS: Protocol prefix is the general format for a
URL; e.g., http:// is a protocol prefix. A domain name is an
organisation’s unique name combined with a top-level domain
(TLD) name. A subdirectory name is the general format for a
URL. A document name is a component of the URL that
indicates the name of the file/document.
• IP ADDRESS
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 37
Internet Technologies - 4
• Packet Switching
• Packet switching is the division of messages into small
packets for transmission.
• Virtual Private Networks
• A virtual private network (VPN) is a private network within a
public network.
• Extranets
• An extranet is a password-controlled network for private users
rather than the general public.
• A ping is an Internet maintenance tool used to test the
state of network congestion and determine whether a
particular host computer is connected and available on the
network.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 38
Cloud Computing
• Software-as-a-Service (SaaS) is a software distribution
model in which service providers host applications for
client organisations over a private network or the Internet.
• Infrastructure-as-a-Service (IaaS) is the provision of
computing power and disk space to client firms who
access it from desktop PCs. The client firm can configure
the infrastructure for storage, networks, and other
computing needs, including running operating systems
and data processing applications.
• Platform-as-a-Service (PaaS) enables client firms to
develop and deploy onto the cloud infrastructure
consumer-generated applications using facilities provided
by the PaaS vendor.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 39
Cloud Computing (continued)
• Virtualisation
• Virtualisation is a technology that multiplies the effectiveness of
the physical system by creating virtual (software) versions of the
computer with separate operating systems that reside in the same
physical equipment. In other words, virtualisation is the concept of
running more than one “virtual computer” on a single physical
computer.
• Network virtualisation increases effective network bandwidth by
dividing it into independent channels, which are then assigned to
separate virtual computers. It optimises network speed, flexibility,
and reliability; most importantly, it improves network scalability. It
is especially effective in networks that experience sudden, large,
and unforeseen surges in usage.
• Storage virtualisation is the pooling of physical storage from
multiple network storage devices into what appears to be a single
virtual storage device. This pool is then managed from a central
server.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 40
Challenge
• You may also prepare to undertake a Self-
Development Challenge. You should describe and
perhaps model this Challenge in an essay of about
150-300 words.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 42
Risks Associated with Electronic Commerce
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 43
Intranet risks
• Interception of Network Messages
• Privileged Employees with Access to Corporate
Databases
• Reluctance to Prosecute
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 44
Internet risks: consumers
• Risks to Consumers
• THEFT OF CREDIT CARD NUMBERS
• THEFT OF PASSWORDS
• CONSUMER PRIVACY: Cookies are files containing user
information that are created by the web server of the site being
visited and are then stored on the visitor’s own computer hard
drive.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 45
Internet risks: businesses
• Risks to Businesses
• IP spoofing is a form of masquerading to gain unauthorised
access to a web server and/or to perpetrate an unlawful act
without revealing one’s identity.
• A denial of service attack (DoS) is an assault on a web
server to prevent it from servicing its legitimate users.
• A SYNchronise-ACKnowledge (SYN-ACK) is what is
returned when a receiving server acknowledges the request.
SYN flood attack is a server that keeps signalling for
acknowledgement until the server times out.
• A smurf attack is a DoS attack that involves three parties: the
perpetrator, the intermediary, and the victim.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 46
Internet Risks (continued)
• Risks to Businesses (continued)
• A distributed denial of service (DDoS) attack may take the
form of a SYN flood or smurf attack. The distinguishing feature
of the DDoS is the sheer scope of the event.
• MOTIVATION BEHIND DOoS ATTACKS
• OTHER MALICIOUS PROGRAMS
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 47
Distributed denial of service attack
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 48
Security, Assurance, and Trust
• Trust is the catalyst for sustaining electronic commerce.
• Both consumers and businesses are drawn to
organisations that are perceived to have integrity.
• Organisations must convey a sense that they are
competent and conduct business fairly with their
customers, trading partners, and employees.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 49
Encryption
• Caesar cipher was the earliest encryption method; Julius
Caesar is said to have used it to send coded messages to
his generals in the field.
• WW2 Enigma machine and Bletchley.
• The key is a mathematical value that the sender selects
for the purpose of encrypting or decoding data.
• The algorithm here is the procedure of shifting each letter
in the cleartext message by the number of positions that
the key value indicates.
• Advanced encryption standard (AES), also known as
Rijndael, is a private key encryption technique.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 50
Encryption (continued)
• Private key, also called symmetric key, is a single key
used in an encryption algorithm to both code and decode
a message.
• Public key encryption is a technique that uses two
encryption keys: one for encoding the message, the other
for decoding it.
• Rivest-Shamir-Adleman (RSA) is one of the most
trusted public key encryption methods. This method,
however, is computationally intensive and much slower
than private key encryption.
• A digital envelope is an encryption method in which both
DES and RSA are used together.
• All encryption is ultimately “crackable”…
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 51
Digital authentication
• A digital signature is an electronic authentication
technique that ensures the transmitted message
originated with the authorised sender and that it was not
tampered with after the signature was applied.
• A digital certificate is a sender’s public key that has been
digitally signed by trusted third parties.
• Certification authorities (CAs) are trusted third parties
that issue digital certificates.
• Public key infrastructure (PKI) constitutes the policies
and procedures for administering public key management
for digital authentication.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 52
Firewalls
• A firewall is software and hardware that provide a focal
point for security by channelling all network connections
through a control gateway.
• The network-level firewall is the system that provides
basic screening of low-security messages (for example, e-
mail) and routes them to their destinations based on the
source and destination addresses attached.
• An application-level firewall provides high-level network
security.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 53
Seals of assurance
• Better Business Bureau
• TRUSTe
• Verisign, Inc.
• International Computer Security Association
• AICPA/CICA WebTrust
• AICPA/CICA SysTrust
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 54
Implications for the Accounting Profession
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 55
Privacy violation
• Privacy is full control of what and how much information
about an individual is available to others and to whom it is
available.
• The Safe Harbor Agreement implemented in 1995 is a
two-way agreement between the United States and the
European Union establishing standards for information
transmittal.
• NOTICE
• CHOICE
• ONWARD TRANSFER
• SECURITY AND DATA INTEGRITY
• ACCESS
• ENFORCEMENT
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 56
Continuous auditing
• Continuous auditing techniques need to be developed that
will enable the auditor to review transactions at frequent
intervals or as they occur.
• Intelligent control agents are computer programs that
embody auditor-defined heuristics that search electronic
transactions for anomalies.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 57
Confidentiality of data
• Accountants need to assess the quality of encryption tools
used and the effectiveness of key management
procedures that CAs use.
• The term mission-critical defines a set of information that
extends beyond the traditional financial concerns of
accountants.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 58
Authentication
• In electronic commerce systems, determining the identity
of the customer is not a simple task.
• Accountants must develop the skill set needed to
understand digital signatures and digital certificates to
perform the assurance function.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 59
Nonrepudiation
• Accountants are responsible for assessing the accuracy,
completeness, and validity of transactions that constitute
client sales, accounts receivable, purchases, and
liabilities.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 60
Data integrity
• To assess data integrity, accountants must become
familiar with the concept of computing a digest of a
document and the role of digital signatures in data
transmissions.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 61
Access controls
• Controls need to be in place that prevent or detect
unauthorised access to an organisation’s information
system.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 62
A changing legal environment
• Legal issues relating to taxes, privacy, security, intellectual
property rights, and libel create new challenges for the
accounting profession, which must provide its clients with
rapid and accurate advice on a wide range of legal
questions.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 63
Summary - 1
• Explosion of ways of doing business
• Made possible by innovative use of web-based
business information systems
• Likechopping down a tree: no visible effects for
quite a while, then the tree crashes to the
ground…
• Topshop
• Dorothy Perkins
• Miss Selfridge
• Debenhams has moved online
• John Lewis has closed 16 stores – including its
flagship Birmingham Bullring outlet.
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Summary - 2
Accountants need to know about:
• Technology
• Systems
• Models of systems
• Business models (which are not models!)
• Regulatory frameworks
• Cybercriminality
They need to give value!
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 65
Structuring your reports and essays
• You really must do this! My way is a bit complex, but works well.
• Both Microsoft Word and PowerPoint have a very powerful built-in
hierarchical approach based on marking text as Header 1 (for
chapters), Header 2 (for sections) and Header 3 (for sub-headings).
• Look at the helpful article by Shauna Kelly at
https://shaunakelly.com/word/numbering/numbering20072010.html for
more information concerning Word.
• I have a favourite template for reports, which I have uploaded to
Canvas. It’s a bit fiddly to use, so I’ll show it to you in class. I’ve
uploaded the template to Canvas as MGYSTD.dotx in Canvas at
https://canvas.hull.ac.uk/files/3382286/
• A long explanatory document is at
https://canvas.hull.ac.uk/files/3382287/ as How to use Microsoft Word
to improve your personal information management.docx
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 66
Zotero: storing references
• You can set up Zotero to work in conjunction with browser
• Let’s look:
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 67
References
• Chaffey, Dave, David Edmundson-Bird, and Tanya Hemphill. 2019.
Digital Business and E-Commerce Management. Pearson UK.
• Hall, James A. 2019. Accounting Information Systems. Cengage
Learning.
• Laudon, Kenneth C., and Jane P. Laudon. 2017. Essentials of MIS.
12th ed. Pearson Education.
• Schumpeter, Joseph A. (1939) 2017. Business Cycles [Volume One]:
A Theoretical, Historical, and Statistical Analysis of the Capitalist
Process. Martino Fine Books.
• Turban, Efraim, David King, Jae Kyu Lee, Ting-Peng Liang, and
Deborrah C. Turban. 2015. Electronic Commerce: A Managerial and
Social Networks Perspective. 8th ed. Springer Texts in Business and
Economics. Springer International Publishing.
https://doi.org/10.1007/978-3-319-10091-3
James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 68