SlidePub
Home
Categories
Login
Register
Home
Finance
Accounting Information System Accounting Information System Accounting Information System
Accounting Information System Accounting Information System Accounting Information System
NaveedRaza31
9 views
59 slides
Feb 26, 2025
Slide
1
of 59
Previous
Next
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
About This Presentation
Accounting
Size:
729.21 KB
Language:
en
Added:
Feb 26, 2025
Slides:
59 pages
Slide Content
Slide 1
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-1
Accounting
Information
Systems
9
th
Edition
Marshall B. Romney
Paul John Steinbart
Slide 2
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-2
Introduction to
e-Business
Chapter 3
Slide 3
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-3
Chapter 3: Learning
Objectives
1.Explain what e-business is and how
it affects organizations.
2.Discuss methods for increasing the
likelihood of success and for
minimizing the potential risks
associated with e-business.
3.Describe the networking and
communications technologies that
enable e-business.
Slide 4
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-4
Learning Objective 1
Explain what e-business is and
how it affects organizations.
Slide 5
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-5
Introduction: E-Business
E-business refers to all uses of
advances in information technology
(IT), particularly networking and
communications technology, to
improve the ways in which an
organization performs all of its
business processes.
Slide 6
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-6
Introduction: E-Business
E-business encompasses an
organization’s external
interactions with its:
Suppliers
Customers
Investors
Creditors
The government
Media
Slide 7
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-7
Introduction: E-Business
E-business includes the use of IT to
redesign its internal processes.
For organizations in many industries,
engaging in e-business is a necessity.
Engaging in e-business in and of itself does
not provide a competitive advantage.
However, e-business can be used to more
effectively implement its basic strategy and
enhance the effectiveness and efficiency of
its value-chain activities.
Slide 8
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-8
E-Business Models
Business to Consumers (B2C):
Interactions between individuals and
organizations.
Business to Business (B2B):
Interorganizational e-business.
Slide 9
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-9
E-Business Effects on
Business Processes
Electronic Data Interchange (EDI):
Standard protocol, available since the
1970s, for electronically transferring
information between organizations
and across business processes.
EDI:
Improves accuracy
Cuts costs
Slide 10
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-10
Recent EDI Facilitators
Traditional EDI was expensive. New
developments that have removed this
cost barrier are:
The Internet: Eliminates the need for
special proprietary third-party
networks.
XML: Extensible Markup Language –
Set of standards for defining the
content of data on Web pages.
Slide 11
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-11
Recent EDI Facilitators
ebXML:
Defines standards for coding common
business documents.
Eliminates need for complex software
to translate documents created by
different companies.
Slide 12
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-12
Integrated Electronic Data
Interchange (EDI)
Reaping the full benefits of EDI
requires that it be fully integrated with
the company’s AIS.
Suppliers
Customers
AIS
Company
EDI
Purchase orders
Customer orders
EDI
Slide 13
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-13
E-Business Effects on Value
Chain Activities
Value Chain –
Primary Activities
E-Business Opportunity
Inbound logistics
Acquisition of digitizable products
Reduced inventory “buffers”
Operations
Faster, more accurate production
Outbound logistics
Distribution of digitizable products
Continuous status tracking
Sales and Marketing
Improved customer support
Reduced advertising costs
More effective advertising
Post-sale Support and Service
Reduced costs
24/7 Service availability
Slide 14
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-14
E-Business Effects on Value
Chain Activities
Value Chain –
Support Activities
E-Business Opportunity
Purchasing
Human Resources
Infrastructure
Source identification and reverse
auctions
Employee self-service
EFT, FEDI, other electronic payments
Slide 15
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-15
Purchasing and Inbound
Logistics
The Internet improves the purchasing activity
by making it easier for a business to identify
potential suppliers and to compare prices.
Purchase data from different organizational
subunits can be centralized.
•This information can be used to negotiate better
prices.
•Number of suppliers can be reduced.
•Reverse auctions can be held
For products that can be entirely digitized, the
entire inbound logistics function can be
performed electronically.
Slide 16
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-16
Internal Operations, Human
Resources, and Infrastructure
Advanced communications
technology can significantly improve:
The efficiency of internal operations.
Planning.
The efficiency and effectiveness of the
human resource support activity.
The efficiency and effectiveness of
customer payments.
Slide 17
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-17
Information Flows in
Electronic Commerce
Buyer
Seller
1. Inquiries
2. Responses
3. Orders
4. Acknowledgment
5. Billing
6. Remittance data
7. Payments
Explanations:
EDI = Steps 1-6
EFT = Step 7
FEDI = Steps 1-7
Slide 18
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-18
Financial Electronic Data
Interchange (FEDI)
The use of EDI to exchange information
is only part of the buyer-seller
relationship in business-to-business
electronic commerce.
Electronic funds transfer (EFT) refers to
making cash payments electronically,
rather than by check.
EFT is usually accomplished through the
banking system’s Automated Clearing
House (ACH) network.
Slide 19
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-19
Financial Electronic Data
Interchange (FEDI)
An ACH credit is an instruction to your
bank to transfer funds from your
account to another account.
An ACH debit is an instruction to your
bank to transfer funds from another
account into yours.
Slide 20
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-20
Financial Electronic Data
Interchange (FEDI)
Company A’s
bank
Company B’s
bank
Company A Company B
Remittance data
and payment
instruction
Remittance data and funds
Slide 21
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-21
ASPs
An Application Service Provider (ASP)
is a company that provides access to
and use of application programs via
the Internet.
The ASP owns and hosts the
software; the contracting organization
accesses the software via the
Internet.
Slide 22
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-22
Factors to Consider When
Evaluating ASPs
Advantages
Lower costs
Automatic upgrading to
current version of
software
Need fewer in-house IT
staff
Reduced hardware needs
Flexibility
Knowledge support
Security and privacy of
data
Disadvantages
Viability of ASP
Security and privacy of
data
Availability and
reliability of service
Inadequate support or
poor responsiveness to
problems
Standard software that
may not meet all
customized needs
Slide 23
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-23
Factors to Include in Service
Level Agreements
Detailed specification of expected ASP
performance
Frequency of backups
Use of encryption
Data access controls
Remedies for failure of ASP to meet
contracted service levels
Ownership of data stored at ASP
Slide 24
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-24
Outbound Logistics
E-Business can improve the efficiency and
effectiveness of sellers’ outbound logistical
activities.
Timely and accurate access to detailed
shipment information.
Inventory optimization.
For goods and services that can be digitized,
the outbound logistics function can be
performed entirely electronically.
Slide 25
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-25
Sales and Marketing
Companies can create electronic
catalogs to automate sales order
entry.
Significantly reduce staffing needs.
Customization of advertisements
Slide 26
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-26
Post-Sale Support
and Service
Consistent information to customers.
Provide answers to frequently asked
questions (FAQs).
Slide 27
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-27
Learning Objective 2
Discuss methods for increasing the
likelihood of success and for
minimizing the potential risks
associated with E-Business.
Slide 28
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-28
E-Business Success Factors
The degree to which e-business activities fit
and support the organization’s overall
business strategy.
The ability to guarantee that e-business
processes satisfy the three key
characteristics of any business transaction
Validity
Integrity
Privacy
Slide 29
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-29
Encryption
There are two principal types of encryption
systems:
Single-key systems: Same key is used to
encrypt and decrypt the message
•Simple, fast, and efficient
•Example: the Data Encryption Standard (DES)
algorithm
Public Key Infrastructure (PKI): Uses two keys:
•Public key is publicly available and usually used to
encode message
•Private key is kept secret and known only by the owner
of that pair of keys. Usually used to decode message
Slide 30
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-30
Advantages &
Disadvantages of PKI
Advantages
No sharing of key
necessary
More secure than
single-key systems
Disadvantages
Much slower than
single-key systems
Slide 31
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-31
Digital Signatures and Digests
Digital signature: An electronic message
that uniquely identifies the sender of that
message.
Digest: The message that is used to create
a digital signature or digital summary.
If any individual character in the original
document changes, the value of the digest
also changes. This ensures that the
contents of a business document have not
been altered or garbled during transmission
Slide 32
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-32
Digital Certificates & Certificate
Authorities
Digital Certificate: Used to verify the identity of the
public key’s owner.
A digital certificate identifies the owner of a particular
private key and the corresponding public key, and the
time period during which the certificate is valid.
Digital certificates are issued by a reliable third party,
called a Certificate Authority, such as:
Verisign
Entrust
Digital Signature Trust
The certificate authority’s digital signature is also
included on the digital certificate so that the validity of
the certificate can also be verified.
Slide 33
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-33
Learning Objective 3
Describe the networking and
communications technologies that
enable e-business.
Slide 34
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-34
Types of Networks
The global networks used by many
companies to conduct electronic
commerce and to manage internal
operations consist of two components:
1Private portion owned or leased by
the company
2The Internet
Slide 35
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-35
Types of Networks
The private portion can be further
divided into two subsets:
1Local area network (LAN) — a system
of computers and other devices, such
as printers, that are located in close
proximity to each other.
2Wide area network (WAN) — covers a
wide geographic area.
Slide 36
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-36
Types of Networks
Companies typically own all the equipment
that makes up their local area network
(LAN).
They usually do not own the long-distance
data communications connections of their
wide area network (WAN).
They either contract to use a value-added
network (VAN) or use the Internet.
Slide 37
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-37
Types of Networks
The Internet is an international network of
computers (and smaller networks) all linked
together.
What is the Internet’s backbone?
–the connections that link those computers
together
Portions of the backbone are owned by the
major Internet service providers (ISPs).
Slide 38
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-38
Types of Networks
What is an Intranet?
The term Intranet refers to internal
networks that connect to the main
Internet.
They can be navigated with the same
browser software, but are closed off
from the general public.
What are Extranets?
Slide 39
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-39
Types of Networks
Extranets link the intranets of two or
more companies.
Either the Internet or a VAN can be
used to connect the companies
forming the extranet.
Value-added networks (VAN) are
more reliable and secure than the
Internet, but they are also expensive.
Slide 40
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-40
Company A
AIS
VPN
equipment
ISP
Internet
Types of Networks
Companies build a virtual private
network (VPN) to improve reliability
and security, while still taking
advantage of the Internet.
Slide 41
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-41
Data Communications
System Components
There are five basic components in any
data communication network (whether it is
the Internet, a LAN, a WAN, or a VAN):
1The sending device
2The communications interface device
3The communications channel
4The receiving device
5Communication software
Slide 42
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-42
Data Communications
System Components
The following are components of the
data communications model:
–interface devices
–communications software
–communications channel
Slide 43
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-43
Interface Devices
There are six basic communication interface
devices that are used in most networks:
1Network interface cards
2Modems
3Remote access devices
4Hubs
5Switches
6Routers
Slide 44
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-44
Interface Devices
Company A
PC-1
NIC
PC-2 PC-3
NIC NIC
Switch
Router
Hub 1
Hub 1
Other
LANs
Internet service
provider
Remote access
device
Frame relay
switch
Router
Slide 45
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-45
Interface Devices
Home PC
Modem
Remote access
device
Frame relay
switch
Router
Home PC
Modem
Internet service
provider
Slide 46
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-46
Communications Software
Communications software manages
the flow of data across a network.
It performs the following functions:
–access control
–network management
–data and file transmission
–error detection and control
–data security
Slide 47
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-47
Communications Channels
A communications channel is the medium
that connects the sender and the receiver.
–standard telephone lines
–coaxial cables
–fiber optics
–microwave systems
–communications satellites
–cellular radios and telephones
Slide 48
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-48
Communications Channels
Satellite
Microwave stations
Slide 49
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-49
Network Configuration
Options
Local area networks (LANs) can be
configured in one of three basic ways:
1Star configuration
2Ring configuration
3Bus configuration
Slide 50
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-50
Network Configuration
Options
A star configuration is a LAN
configured as a star; each device is
directly connected to the central
server.
All communications between devices
are controlled by and routed through
the central server.
Typically, the server polls each device
to see if it wants to send a message.
Slide 51
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-51
Network Configuration
Options
The star configuration is the most expensive
way to set up a LAN, because it requires the
greatest amount of wiring.
Host computer
or server
A B C
G F E
DH
Slide 52
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-52
Network Configuration
Options
In a LAN configured as a ring, each node
is directly linked to two other nodes
A
H
B
D
C
EG
F
Slide 53
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-53
Network Configuration
Options
In a LAN configured as a bus, each device is
connected to the main channel, or bus.
Communication control is decentralized on
bus networks.
ABC
GFE
D
H
Host computer
or server
Bus channel
Slide 54
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-54
Network Configuration
Options
Wide area networks (WANs) can be
configured in one of three basic ways:
1Centralized system
2Decentralized system
3Distributed data processing
Slide 55
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-55
Network Configuration
Options
In a centralized WAN, all terminals
and other devices are connected to a
central corporate computer.
Slide 56
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-56
Network Configuration
Options
In a decentralized WAN, each departmental unit
has its own computer and LAN.
Decentralized systems usually are better able
to meet individual department and user needs
than are centralized systems.
Slide 57
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-57
Network Configuration
Options
A distributed data processing system WAN is
essentially a hybrid of the centralized and
decentralized approaches
Slide 58
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-58
Network Configuration
Options
Many WANs, and most LANs, are set up as
client/server systems.
Each desktop computer is referred to as a
client.
The client sends requests for data to the
servers.
The servers perform preprocessing on the
database and send only the relevant subset
of data to the client for local processing.
Slide 59
©2003 Prentice Hall Business Publishing,
Accounting Information Systems, 9/e, Romney/Steinbart
3-59
End of Chapter 3
Tags
Categories
Finance
Download
Download Slideshow
Get the original presentation file
Quick Actions
Embed
Share
Save
Print
Full
Report
Statistics
Views
9
Slides
59
Age
280 days
Related Slideshows
22
FM I Chapter 3: Time Value of Money .ppt
belaywube
24 views
40
Financial Management I Chapter Three.pdf
belaywube
23 views
9
Md. Sirajuddwla Vs. The State and Ors. [2016] 1LNJ(HCD)177.
SMAlamgirHossain3
23 views
26
business finance-2nd quarter week 1.pptx
DianaPingol2
22 views
37
bank-reconciliation-2-240226133520-7f66bb8a.pptx
NaizeJann
20 views
25
Create_a_Portfolio_Website_Showcasing_Projects_Skills_and_Contact_Info_Presentation.pdf.pdf
AluminicompSRESCoeKo
19 views
View More in This Category
Embed Slideshow
Dimensions
Width (px)
Height (px)
Start Page
Which slide to start from (1-59)
Options
Auto-play slides
Show controls
Embed Code
Copy Code
Share Slideshow
Share on Social Media
Share on Facebook
Share on Twitter
Share on LinkedIn
Share via Email
Or copy link
Copy
Report Content
Reason for reporting
*
Select a reason...
Inappropriate content
Copyright violation
Spam or misleading
Offensive or hateful
Privacy violation
Other
Slide number
Leave blank if it applies to the entire slideshow
Additional details
*
Help us understand the problem better