Professional Documents
Culture Documents
Abstract
Introduction
commerce mostly consists of electronic business transactions related to the purchase and
delivery of goods and services. Some people define e-commerce as including only
check, phone, or some other means. E-commerce includes retail trade between business
and consumers (B2C) as well as business-to-business (B2B) trade. Businesses use the
companies, retail stores, and service firms. E-commerce has made business processes
more reliable and efficient. Consequently, e-commerce is now essential for businesses to
be able to compete in the global marketplace. The purpose of this paper is to review prior
research, examine the origins of e-commerce, identify e-risks, describe retail trade on the
Internet, define virtual business, identify aspects of website design, and describe types of
Prior Research
example, Runyan et al. (2008) examine the impact of Web assurance services on e-
commerce. They conclude that doing business online has become a necessity, not an
option. However, not all consumers are completely comfortable using the Internet for
1
these situations, consumer trust and confidence can be enhanced by a Web assurance
service such as AICPA Trust Services. Efendi et al. (2008) examine the financial
commerce systems. Their analysis reveals that early adopters outperform their non-
factors include decreases in trade barriers, globalization of capital markets, the movement
developing countries (Hunter and Smith 2008). IFRSs provide a global standard for
accounting and financial reporting (Smith 2008a, Smith et al. 2008). In the past several
years, the IFRSs went from use in few countries to what is now the world’s dominant set
of accounting standards.
alliances can facilitate both market-entry and market-development strategies, within the
Onofrei and Nedelea (2007) found that supply chain B2B e-commerce helps minimize
and corporate strategy within the pharmaceutical industry. After reviewing application of
e-commerce and its significance in the pharmaceutical industry, the conclusion reached
2
Pathak (2004) examines risk associated with e-commerce. His study concludes
that e-commerce requires auditors to identify risks and show their impact on the
information system. Pathak also describes the American Institute of CPAs and Canadian
agricultural markets, Thompson and Kunda (2000) conclude that e-commerce will have a
profound effect on these markets. As a result of lower transactions costs, more businesses
throughout the agricultural value chain will be able to participate in B2B e-commerce.
Thompson and Kunda also expect that products and services will be increasingly
The origins of e-commerce can be traced to the early computers of the 1950s.
However, not until development of the World Wide Web in the 1990s did e-commerce
gain widespread popularity. A historical timeline of events regarding the Internet and e-
network of computer networks. The Internet is linked together via a high-speed, long haul
"framework" initially paid for largely by the US National Science Foundation. A diverse
and complex structure makes it impossible to precisely determine the number of Internet
Only a few decades ago, using the Internet as a primary way to carry out business
transactions was considered too risky. That has dramatically changed. The young
3
generation cannot even remember a world without computers, email, and cell phones.
One of the most rapidly growing groups of computer-users is senior citizens, which
demonstrates how technology has permeated all age groups of society. E-commerce is
simply commerce; it’s the way commerce is done in the twenty-first century.
which e-commerce for B2B as well as B2C transactions are completed. Estimates are that
the B2B market is about five to seven times larger than B2C. The B2B market is
predicted to exceed $5 trillion in the early 21st century. At the same time, the B2C
market is fast expanding, but its average transaction size is much smaller than average
B2B transactions.
Originally the Internet was limited to researchers for sharing computing and
communication resources. The key event that profoundly changed the use of the Internet
was the creation of the user-friendly, graphical World Wide Web in the early 1990s.
Using the Web to carry out financial and other transactions made the Internet exceedingly
E-risk is the potential for financial and technology problems to result from doing
challenges for business. Cyberspace is open to villains who look for computer networks
to exploit. Some people try to hack into a business firm’s computer system just to see if
they can. If access to the system is acquired, hackers can potentially cause major
4
Rather than hacking into systems, some people create problems by writing
computer programs that replicate themselves and sometimes carry out malicious
programming instructions such as erasing files. These programs, computer viruses, can
cause major difficulties for computer systems. Information systems must be able to
defend against computer viruses and other threats. Some of the e-risks associated with e-
longer work.
interconnected parties.
Hackers never stop devising new techniques; thus, new tools mean new
vulnerabilities.
The Internet was not initially designed for business, and thus was not designed to
control and manage business risks. E-commerce websites generally include various types
systems.
The worldwide annual growth rate of e-commerce has been estimated as high as
28%, while some individual countries have much higher growth rates. For example, in
India, which has a younger market, the e-commerce growth rate has been projected as
high as 51%. Major e-commerce shopping sites in India include businesses such as
5
Fabmall, Rediff, Indiatimes and Sify (Bhardwaj 2006). E-commerce in India has been
heavily promoted via Internet advertising. Research indicates that when people read an
online ad they are more likely to buy online. Estimates from various sources indicate that
websites. An advertising banner on the Internet potentially levels the playing field
Virtual stores operate 24 hours a day, 7 days a week. Many, such as the e-
identifies itself as “the earth’s biggest bookstore.” The company lists over 2.5 million
titles including most of the 1.5 million books currently in print as well as many out-of-
print books. With the use of a powerful, efficient search engine, competitive pricing, and
online reviews of many of the books it carries, customers find Amazon to be an easy and
million prices from major computer cyberstores and updates over 100,000 prices a day on
average. Customers can purchase products over the Internet by credit card, using secure
An e-cash customer uses electronic cash by setting up an account with a bank that
sends electronic cash. The customer transfers money from his or her account to a
6
personal computer. In the personal computer this electronic cash is stored as virtual coins,
specially coded serial numbers known only to the bank. Paying for a purchase requires
the customer to send these coins to the merchant who checks their validity with the bank
before completing the transaction. The company subsequently redeems the coins at the
bank, which deposits the money in the company’s account. At this time, relatively few
companies accept e-cash, but its use is expected to grow (Smith et al. 2003).
Virtual Businesses
the virtual business are networked, which enables sharing of skills, costs, and access to
markets. Each participating individual business firm contributes only its core
competencies. The ability to regroup individual business firms into virtual a virtual
business enables the flexibility required to seize new opportunities and remain
competitive.
A virtual business has five key features. The first is an absence of borders. A
virtual business has no traditional corporate borders because the extent of cooperation
among competitors, suppliers, and customers overlaps normal borders. The second key
feature is technology. Electronic networks link distant companies, which may use
The third key feature of a virtual business is excellence. Each partner in the
virtual business provides its core competencies to the virtual business, thereby enabling
7
virtual business is relatively transitory, informal, and more opportunistic because an
individual business joins to meet a specific market opportunity and then leaves after
meeting it. The fifth and final key feature is trust. Relationships in a virtual business
require mutual trust because of their great interdependency. A virtual business has
information. Information systems link the individual business firms, providing current,
of specialized software, these companies are able to combine their resources to bid on
contracts that none of the individual members could win on their own. Agile Web was
able to acquire a contract to produce a forklift handle that required one of its member
companies to produce the plastic parts, another company to shape and mold metal parts,
and a third company to solder the handle together and test its circuits and switches (Smith
et al. 2003).
Creating and managing websites involves essentially the same steps as any other
type of business application. A crucial difference between Web applications and most
other applications is that the end user of a Web application is much more likely to be a
customer of the company rather than an employee. Creating Web applications follows
approximately the same life cycle, pathways, methodologies, and stages as most other
systems.
8
A company’s website presents a public view of the company that, like any other
supports the image that the company hopes to convey. Information, structure, design, and
relations department often, but not always, controls the website. Policies should be
established to ensure the protection of the company image. Exhibit 3 shows some of the
An e-commerce website can include all types of information. Some of the specific
information that can be included on a website is shown in Exhibit 4. Most websites will
contain at least a description of the company, a list of the company’s products and
place. Cybercrime is a criminal act that involves computers and networks. This means
that cybercrime includes criminal acts such as hacking, phishing, and denial of service
attacks that cause e-commerce websites to lose money. A basic knowledge of cybercrime
Each year, companies lose billions of dollars in stolen assets, lost business, and
damaged reputations as a result of cybercrime. Money is stolen, literally with the push of
9
a button. When a company website goes down, e-commerce stops. The company’s
customers often take their business to a different website. When a company becomes the
In nations around the world, cybercrime has become a major concern. Defending
major part of economic activity. In the US, for example, cybercrime is regarded as a
major national security issue. The newly elected president has been called upon to
Cybercrimes are new versions of age-old crime. An illustration of this is the con
artist. Before the new information technologies existed, a con artist would go from house-
to-house and use his communication skills to gain the confidence of his victims. In the
current day, a con artist makes use of the Internet and online communications to
The most prolific type of cybercrime is the computer virus, a program that may
attach itself to other programs. At a later time, the virus activates, often resulting in
considerable harm to computer systems or files. In one six-month study conducted by the
10
computers were reported. From five to 816 computers were infected at individual
The perpetrator of the computer virus generally does not know whose computers
will be affected. The perpetrator of this cybercrime does not steal assets but instead
creates havoc within the victim’s computer system. In this way, a computer virus is much
like the manual crime of vandalism, in which the perpetrator does not steal assets, but
rather harms the victim’s property. Key steps in the computer virus cybercrime are shown
in Exhibit 6.
more advanced anti-viral software and anti-viral procedures. Furthermore, computer virus
incidents may have decreased due to new laws against computer viruses and criminal
to people, which include links to fraudulent websites that appear official and cause the
causes people to question the legitimacy of genuine e-commerce websites. Key steps in
instructions to other computers in order to control them. The hacker who sends out the
11
“bot” program is designated as the “herder.” Numerous computers can be controlled in a
botnet. Computers controlled in a botnet can be used for nefarious activities such as spam
distribution or phishing. Actual owners of computers in the botnet typically are unaware
that their computer is part of a botnet. Key steps in the botnet cybercrime are shown in
Exhibit 8.
cause damage to online computer systems such as shutting down e-commerce websites or
destroying files. After the 9-11 terrorist attack on the World Trade Center in the US,
cyber terrorism became of greater concern in the US and worldwide. A cyber terrorist
carries out cybercrimes such as computer viruses and online denial of service. A major
cyber terrorism causes a loss of the company’s business; in the case of a government
entity, cyber terrorism causes the government entity to be unable to fulfill its
government-mandated mission.
Conclusions
This paper reviews the origins of e-commerce, defines e-risk, examines use of the
Internet for retail trade, describes virtual business, identifies aspects of website design,
and describes types of cybercrime. Origins of e-commerce can be traced to the early
computers of the 1950s, but creation of the World Wide Web in the 1990s was the key
for businesses to be able to market their products and services in the global marketplace.
12
E-commerce is Internet-based; the Internet is extensively used for both business-
is a threat to e-commerce. In nations around the world, cybercrime has become a major
concern. Examples of cybercrime include computer viruses, phishing, botnets, and cyber
13
References
Albanesius, Chloe. 2008. Report Calls for Major Cyber Security Overhaul. PCMag,
Website: http://www.pcmag.com (December 8).
Crumbley, D., L.M. Smith, and E. Battles. 1998. Computer Encryptions in Whispering
Caves, an information technology educational novel, Mason, Ohio, US: Thomson
Corporation.
Efendi, J., M. Kinney, and L.M. Smith. 2008. Profitability Analysis of B2B Buy-Side E-
Commerce Systems. Working Paper, Texas A&M University.
Hunter, Shirley and L.M. Smith. 2008. Impact of Internet Financial Reporting on
Emerging Markets. Journal of International Business Research, In press.
Available at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1017078.
Kratchman, Stan, J. Smith, and L.M. Smith. 2008. Perpetration and Prevention of Cyber
Crimes. Internal Auditing. Vol. 23, No. 2 (March-April): 3-12.
Onofrei, George and Alexandru Nedelea. 2007. The Impact of E-Commerce on the
Supply Chain B2B in Ireland. Amfiteatru Economic, Vol. 21 (February): 45-49.
Runyan, B., Katherine T. Smith, and L.M. Smith. 2008. Implications of Web Assurance
Services on ECommerce. Accounting Forum, Vol. 32: 46-61.
14
Smith, L.M., K.T. Smith, and D. Kerr. 2003. Accounting Information Systems, 4th Ed.,
Boston, Mass.: Houghton Mifflin.
Smith, L.M., T. Sagafi-Nejad, and Kun Wang. 2008. Going International: Accounting
and Auditing Standards. Internal Auditing, Vol. 23, No. 4 (July): 3-12.
Spekman, Robert E. and Christine Springer. 2008. Shaping the Future of Cash:
Cybercash, Inc. Working Paper, University of Virginia. Available at SSRN:
http://ssrn.com/abstract=910070.
15
Exhibit 1
1957 The Soviet Union launches Sputnik, the first artificial satellite.
1958 To counter Soviet technological advances, the U.S. forms the Advanced Research
Projects Agency (ARPA), with the Department of Defense, to develop U.S.
leadership in science and technology applicable to the military.
1969 ARPANET, the forerunner of the Internet, established with four nodes: UCLA,
Stanford, UC-Santa Barbara, and University of Utah.
1982 Transmission Control Protocol (TCP) and Internet Protocol (IP) established by
ARPA. This leads to a definition of an "internet" as a connected set of networks,
specifically those using TCP/IP, and "Internet" as connected TCP/IP internets.
1984 Science fiction author William Gibson coins the term "cyberspace" in his novel,
Neuromancer.
Internet host computers (computers with registered IP address) exceed 1,000.
1988 Internet worm disables 6,000 of 60,000 Internet hosts. The worm was created by a
Cornell University graduate student; infected computers were connected through
ARPAnet and other E-mail networks in the Internet loop. Some of the US's top
science and research centers were affected.
16
Exhibit 1 -- Continued
1991 Sir Tim Berners-Lee, working at CERN in Geneva, develops a hypertext system
to provide efficient information access. He posts the first computer code of the
World Wide Web in a relatively innocuous newsgroup, "alt.hypertext." Later,
people refer to the Internet itself as the Web.
1995 The Bottom Line is Betrayal authored by K.T. Smith, D.L. Crumbley, and L.M.
Smith: the first business educational novel focused on international trade, global
marketing, and emerging technologies (revised edition available in 2009).
2008 Internet hosts exceed 200 million. Users in over 150 countries are connected.
17
Exhibit 2
R&D Logistics
Management
Manufacturing
Finance
18
Exhibit 3
19
Exhibit 4
20
Exhibit 5
21
Exhibit 5 - Continued
22
Exhibit 6
The e-mail with the infected attachment file is sent to unwary recipients.
When the e-mail message is opened, the infected program runs on the user's
system and the virus replicates itself onto an operating system file.
In some cases, the virus spreads from the user's system to other user systems
through infected shared software. In other cases the virus gains access to the
user’s e-mail system address book and sends itself to all the addresses.
At a predetermined point (e.g., a specific date), the virus activates, often leaving
programs and data files unusable.
_____
23
Exhibit 7
Steps in Phishing
Step 1: The phishing perpetrator creates fraudulent email that appears to come from a
legitimate source. The phishing emails are then sent to numerous potential victims.
Step 2: The phishing email provides a link to the fraudulent website, which appears to be
a genuine website.
Step 3: The user/ victim connects to the fraudulent website and provides requested
information, on the assumption that it’s a genuine website.
Step 4: The phishing perpetrator accumulates data obtained in the fake website to
illegally obtain funds or sells the data to online clearinghouses.
24
Exhibit 8
25