Top Banner
Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Accounting Information Systems, 8e James A. Hall Chapter 12 Electronic Commerce Systems
55
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Pp 12-new

Hall, Accounting Information Systems, 8e

©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Accounting Information Systems, 8e

James A. Hall

Chapter 12

Electronic Commerce Systems

Page 2: Pp 12-new

Hall, Accounting Information Systems, 8e

©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Objectives for Chapter 12 Be acquainted with the topologies that are employed

to achieve connectivity across the Internet.

Possess a conceptual appreciation of the protocols

and understand the specific purposes several Internet

protocols serve.

Understand the business benefits associated with

Internet commerce and be aware of several Internet

business models.

Be familiar with risks associated with intranet and

Internet electronic commerce.

Understand issues of security, assurance, and trust

pertaining to electronic commerce.

Be familiar with electronic commerce implications for

the accounting profession.2

Page 3: Pp 12-new

Hall, Accounting Information Systems, 8e

©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

What is E-Commerce?

The electronic processing and transmission of business data

electronic buying and selling of goods and services

on-line delivery of digital products

electronic funds transfer (EFT)

electronic trading of stocks

direct consumer marketing

electronic data interchange (EDI)

the Internet revolution

3

Page 4: Pp 12-new

Hall, Accounting Information Systems, 8e

©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Internet Technologies Packet switching

messages are divided into small packets

each packet of the message takes a different routes

Virtual private network (VPN) a private network within a public network

Extranets a password controlled network for private users

World Wide Web an Internet facility that links users locally and globally

Internet addresses e-mail address

URL address

IP address

4

Page 5: Pp 12-new

Hall, Accounting Information Systems, 8e

©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Protocol Functions…

facilitate the physical connection between

the network devices.

synchronize the transfer of data between

physical devices.

provide a basis for error checking and

measuring network performance.

promote compatibility among network

devices.

promote network designs that are flexible,

expandable, and cost-effective.5

Page 6: Pp 12-new

Hall, Accounting Information Systems, 8e

©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Internet Protocols

Transfer Control Protocol/Internet Protocol (TCP/IP) - controls how individual packets of data are formatted, transmitted, and received

Hypertext Transfer Protocol (HTTP) - controls web browsers

File Transfer Protocol (FTP) - used to transfer files across the internet

Simple Network Mail Protocol (SNMP) - e-mail

Secure Sockets Layer (SSL) and Secure Electronic Transmission (SET) - encryption schemes

6

Page 7: Pp 12-new

Hall, Accounting Information Systems, 8e

©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Open System Interface (OSI)

The International Standards

Organization developed a layered set

of protocols called OSI.

The purpose of OSI is to provide

standards by which the products of

different manufacturers can interface

with one another in a seamless

interconnection at the user level.

7

Page 8: Pp 12-new

Hall, Accounting Information Systems, 8e

©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

The OSI Protocol

Layer 1 Physical

Layer 2 Data Link

Layer 3 Network

Layer 4 Transport

Layer 5 Session

Layer 6 Presentation

Layer 7 Application

HARD

WARELayer 1 Physical

Layer 2 Data Link

Layer 3 Network

Layer 4 Transport

Layer 5 Session

Layer 6 Presentation

Layer 7 Application

HARD-

WARE

Data

Manipulation

Tasks

Data

Communications

Tasks

Communications Channel

NODE 1 NODE 2

HARD-

WARE

8

Page 9: Pp 12-new

Hall, Accounting Information Systems, 8e

©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Benefits of Internet Commerce

Access to a worldwide customer and/or supplier base

Reductions in inventory investment and carrying costs

Rapid creation of business partnerships to fill emerging market niches

Reductions in retail prices through lower marketing costs

Reductions in procurement costs

Better customer service

9

Page 10: Pp 12-new

Hall, Accounting Information Systems, 8e

©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

The Internet Business Model

Information level

using the Internet to display and make accessible

information about the company, its products,

services, and business policies

Transaction level

using the Internet to accept orders from

customers and/or to place them with their

suppliers

Distribution level

using the Internet to sell and deliver digital

products to customers

10

Page 11: Pp 12-new

Hall, Accounting Information Systems, 8e

©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Cloud Computing

is a model for enabling convenient, on-

demand network access to a shared pool of

configurable computing resources that can be

rapidly provisioned and released with minimal

management effort or service provider

interaction.

11

Page 12: Pp 12-new

Hall, Accounting Information Systems, 8e

©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Cloud Computing: Key Features

Client firms can acquire IT resources from

vendors on demand and as needed.

Resources are provided over a network and

accessed through network terminals at the

client location.

Acquisition of resources is rapid and infinitely

scalable.

Computing resources are pooled to meet the

needs of multiple client firms.

12

Page 13: Pp 12-new

Hall, Accounting Information Systems, 8e

©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Cloud Computing: Primary Services

Software-as-a-Service (SaaS)

service providers host applications for client

organizations over a network.

Infrastructure-as-a-Service (IaaS)

the provision of computing power and disk space

to client firms who access it from desktop PCs.

Platform-as-a-Service (PaaS)

enables client firms to develop and deploy onto the

cloud infrastructure consumer-generated

applications using vendor-provided facilities.

13

Page 14: Pp 12-new

Hall, Accounting Information Systems, 8e

©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Virtualization

The technology that unleashed cloud

computing.

Virtualization multiplies the effectiveness of the

physical system by creating virtual versions of

the computer with separate operating systems

that reside in the same physical equipment.

Virtualization is the concept of running more than

one virtual computer on one physical computer.

Since each virtual system runs its own application,

total computing power is multiplied with no additional

hardware investment.14

Page 15: Pp 12-new

Hall, Accounting Information Systems, 8e

©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Cloud Computing: Issues

Cloud computing is not for all companies.

Large companies’ needs may conflict with the

cloud solution because these firms have

already incurred massive investments in

equipment, proprietary software, and human

resources.

mission-critical functions running on legacy

systems that are many decades old.

no interest in a one-size-fits-all mentality.

concerns about internal control and security issues

due to outsourcing IT to the cloud. 15

Page 16: Pp 12-new

Hall, Accounting Information Systems, 8e

©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Dynamic Virtual Organization

16

Perhaps the greatest

potential benefit to

be derived from

e-commerce is the

firm’s ability to forge

dynamic business

alliances with other

organizations to fill

unique market

niches as the

opportunities arise.

Page 17: Pp 12-new

Hall, Accounting Information Systems, 8e

©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Areas of General Concern

Data Security: are stored and transmitted data adequately protected?

Business Policies: are policies publicly stated and consistently followed?

Privacy: how confidential are customer and trading partner data?

Business Process Integrity: how accurately, completely, and consistently does the company process its transactions?

17

Page 18: Pp 12-new

Hall, Accounting Information Systems, 8e

©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Intranet Risks Intercepting network messages

sniffing: interception of user IDs, passwords,

confidential e-mails, and financial data files

Accessing corporate databases

connections to central databases increase the risk

that data will be accessible by employees

Privileged employees

override privileges may allow unauthorized access

to mission-critical data

Reluctance to prosecute

fear of negative publicity leads to such reluctance

but encourages criminal behavior18

Page 19: Pp 12-new

Hall, Accounting Information Systems, 8e

©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Internet Risks to Consumers

How serious is the risk?

National Consumer League: Internet fraud rose by

600% between 1997 and 1998

SEC: e-mail complaints alleging fraud rose from

12 per day in 1997 to 200-300 per day in 1999

Major areas of concern:

Theft of credit card numbers

Theft of passwords

Consumer privacy--cookies

19

Page 20: Pp 12-new

Hall, Accounting Information Systems, 8e

©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Internet Risks to Businesses

IP spoofing: masquerading to gain access to a Web server and/or to perpetrate an unlawful act without revealing one’s identity

Denial of service (DOS) attacks: assaulting a Web server to prevent it from servicing users particularly devastating to business entities that

cannot receive and process business transactions

Other malicious programs: viruses, worms, logic bombs, and Trojan horses pose a threat to both Internet and Intranet users

20

Page 21: Pp 12-new

Hall, Accounting Information Systems, 8e

©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

SYN Flood DOS Attack

21

Sender Receiver

Step 1: SYN messages

Step 2: SYN/ACK

Step 3: ACK packet code

In a DOS Attack, the sender sends hundreds of messages, receives the

SYN/ACK packet, but does not response with an ACK packet. This

leaves the receiver with clogged transmission ports, and legitimate

messages cannot be received.

Page 22: Pp 12-new

Hall, Accounting Information Systems, 8e

©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Three Common Types of DOS Attacks

SYN Flood – when the three-way handshake

needed to establish an Internet connection occurs,

the final acknowledgement is not sent by the DOS

attacker, thereby tying-up the receiving server while it

waits.

Smurf – the DOS attacker uses numerous

intermediary computer to flood the target computer

with test messages, “pings”.

Distributed DOS (DDOS) – can take the form of

Smurf or SYN attacks, but distinguished by the vast

number of “zombie” computers hi-jacked to launch

the attacks.

22

Page 23: Pp 12-new

Hall, Accounting Information Systems, 8e

©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

23

SMURF Attack

Figure 12-3

Page 24: Pp 12-new

Hall, Accounting Information Systems, 8e

©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

24

Distributed Denial of Service Attack

Figure 12-4

Page 25: Pp 12-new

Hall, Accounting Information Systems, 8e

©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

E-Commerce Security:

Data Encryption

Encryption - A computer program

transforms a clear message into a coded

(ciphertext) form using an algorithm.

25

Page 26: Pp 12-new

Hall, Accounting Information Systems, 8e

©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

26

Public Key Encryption

Figure 12-5

Page 27: Pp 12-new

Hall, Accounting Information Systems, 8e

©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

E-Commerce Security:

Digital Authentication

Digital signature: electronic authentication

technique that ensures that the transmitted

message originated with the authorized sender

and that it was not tampered with after the

signature was applied

Digital certificate: like an electronic

identification card that is used in conjunction

with a public key encryption system to verify

the authenticity of the message sender

27

Page 28: Pp 12-new

Hall, Accounting Information Systems, 8e

©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

E-Commerce Security: Firewalls

Firewalls: software and hardware that provide security by channeling all network connections through a control gateway

Network level firewalls

low cost/low security access control

uses a screening router to its destination

does not explicitly authenticate outside users

penetrate the system using an IP spoofing technique

Application level firewalls

high level/high cost customizable network security

allows routine services and e-mail to pass through

performs sophisticated functions such as logging or user authentication for specific tasks

28

Page 29: Pp 12-new

Hall, Accounting Information Systems, 8e

©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Seals of Assurance

“Trusted” third-party organizations offer seals

of assurance that businesses can display on

their Web site home pages:

BBB

TRUSTe

Veri-Sign, Inc

ICSA

AICPA/CICA WebTrust

AICPA/CICA SysTrust

29

Page 30: Pp 12-new

Hall, Accounting Information Systems, 8e

©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Implications for Accounting

Privacy violation

major issues:

• a stated privacy policy

• consistent application of stated privacy policies

• what information is the company capturing

• sharing or selling of information

• ability of individuals and businesses to verify

and update information captured about them

1995 Safe Harbor Agreement

• establishes standards for information transmittal

between US and European companies

30

Page 31: Pp 12-new

Hall, Accounting Information Systems, 8e

©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Implications for Accounting

Continuous auditing

auditors review transactions at frequent

intervals or as they occur

intelligent control agents: heuristics that

search electronic transactions for anomalies

Electronic audit trails

electronic transactions generated without

human intervention

no paper audit trail

31

Page 32: Pp 12-new

Hall, Accounting Information Systems, 8e

©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Implications for Accounting

Confidentiality of data

open system designs allow mission-critical

information to be at the risk to intruders

Authentication

in e-commerce systems, determining the

identity of the customer is not a simple task

Nonrepudiation

repudiation can lead to uncollected revenues or

legal action

use digital signatures and digital certificates32

Page 33: Pp 12-new

Hall, Accounting Information Systems, 8e

©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Implications for Accounting

Data integrity

determine whether data has been intercepted

and altered

Access controls

prevent unauthorized access to data

Changing legal environment

provide client with estimate of legal exposure

33

Page 34: Pp 12-new

Hall, Accounting Information Systems, 8e

©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Appendix

34

Intra-Organizational

Electronic Commerce

Page 35: Pp 12-new

Hall, Accounting Information Systems, 8e

©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Local Area Networks (LAN)

A federation of computers located close

together (on the same floor or in the same

building) linked together to share data and

hardware

The physical connection of workstations to the

LAN is achieved through a network interface

card (NIC) which fits into a PC’s expansion slot

and contains the circuitry necessary for inter-node

communications.

A server is used to store the network operating

system, application programs, and data to be

shared. 35

Page 36: Pp 12-new

Hall, Accounting Information Systems, 8e

©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

File Server

LAN

LAN

Node

Node

Node

Node

Printer Server

Files

Printer

36

Page 37: Pp 12-new

Hall, Accounting Information Systems, 8e

©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Wide Area Network (WAN)

A WAN is a network that is dispersed over a wider geographic area than a LAN. It typically requires the use of:

gateways to connect different types of LANs

bridges to connect same-type LANs

WANs may use common carrier facilities, such as telephone lines, or they may use a Value Added Network (VAN).

37

Page 38: Pp 12-new

Hall, Accounting Information Systems, 8e

©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

LANLAN

Bridge

Gateway

Gateway

LAN

WAN

WAN

38

Page 39: Pp 12-new

Hall, Accounting Information Systems, 8e

©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Star Topology

A network of IPUs with a large central

computer (the host)

The host computer has direct connections

to smaller computers, typically desktop or

laptop PCs.

This topology is popular for mainframe

computing.

All communications must go through the

host computer, except for local computing.39

Page 40: Pp 12-new

Hall, Accounting Information Systems, 8e

©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Local Data Local Data

Local Data

Local Data

Central Data

POS

POS

POS

POS

POS

Topeka St. Louis

Kansas

City

DallasTulsa

Star Network

40

Page 41: Pp 12-new

Hall, Accounting Information Systems, 8e

©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Hierarchical Topology A host computer is connected to several

levels of subordinate smaller computers in

a master-slave relationship.

41

Production

Planning System

Production

Scheduling

System

Regional

Sales System

Warehouse

System

Warehouse

System

Production

System

Production

System

Sales

Processing

System

Sales

Processing

System

Sales

Processing

System

Corporate

Level

Regional

Level

Local

Level

Page 42: Pp 12-new

Hall, Accounting Information Systems, 8e

©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Ring Topology

This configuration eliminates the central

site. All nodes in this configuration are

of equal status (peers).

Responsibility for managing

communications is distributed among

the nodes.

Common resources that are shared by

all nodes can be centralized and

managed by a file server that is also a

node.

42

Page 43: Pp 12-new

Hall, Accounting Information Systems, 8e

©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

43

Ring Topology

Figure 12-10

Page 44: Pp 12-new

Hall, Accounting Information Systems, 8e

©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Bus Topology

The nodes are all connected to a

common cable - the bus.

Communications and file transfers

between workstations are controlled by

a server.

It is generally less costly to install than a

ring topology.

44

Page 45: Pp 12-new

Hall, Accounting Information Systems, 8e

©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

45

Bus Topology

Figure 12-11

Page 46: Pp 12-new

Hall, Accounting Information Systems, 8e

©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Client-Server Topology

This configuration distributes the

processing between the user’s (client’s)

computer and the central file server.

Both types of computers are part of the

network, but each is assigned functions

that it best performs.

This approach reduces data

communications traffic, thus reducing

queues and increasing response time.

46

Page 47: Pp 12-new

Hall, Accounting Information Systems, 8e

©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

47

Client-Server Topology

Figure 12-12

Page 48: Pp 12-new

Hall, Accounting Information Systems, 8e

©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Network Control Objectives

establish a communications session

between the sender and the receiver

manage the flow of data across the network

detect errors in data caused by line failure or

signal degeneration

detect and resolve data collisions between

competing nodes

48

Page 49: Pp 12-new

Hall, Accounting Information Systems, 8e

©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

49

Figure 12-13

Polling Method

of Controlling Data Collisions

Page 50: Pp 12-new

Hall, Accounting Information Systems, 8e

©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

50

Figure 12-14

Token-Passing Approach to Controlling Data Collision

Page 51: Pp 12-new

Hall, Accounting Information Systems, 8e

©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Carrier Sensing A random access technique that detects

collisions when they occur

This technique is widely used--found on Ethernets.

The node wishing to transmit listens to the line to

determine if in use. If it is, it waits a pre-specified

time to transmit.

Collisions occur when nodes listen, hear no

transmissions, and then simultaneously transmit.

Data collides and the nodes are instructed to hang

up and try again.

Disadvantage: The line may not be used optimally

when multiple nodes are trying to transmit

simultaneously.51

Page 52: Pp 12-new

Hall, Accounting Information Systems, 8e

©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

What is Electronic Data

Interchange (EDI)?

The exchange of business

transaction information:

between companies

in a standard format (ANSI X.12 or

EDIFACT)

via a computerized information system

In “pure” EDI systems, human

involvements is not necessary to

approve transactions.52

Page 53: Pp 12-new

Hall, Accounting Information Systems, 8e

©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Communications Links

Companies may have internal EDI

translation/communication software and

hardware.

OR

They may subscribe to VANs to perform

this function without having to invest in

personnel, software, and hardware.

53

Page 54: Pp 12-new

Hall, Accounting Information Systems, 8e

©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

54

Overview of EDI

Figure 12-15

Page 55: Pp 12-new

Hall, Accounting Information Systems, 8e

©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Advantages of EDI

Reduction or elimination of data entry

Reduction of errors

Reduction of paper

Reduction of paper processing and

postage

Reduction of inventories (via JIT

systems)

55