Difference Between E-commerce and E-Business

e business auditing n.w
1 / 15
Embed
Share

Learn about the distinctions between e-commerce and e-business, including their definitions, similarities, and unique aspects. Explore how e-business goes beyond online transactions to encompass various digital strategies for business optimization.

  • E-commerce
  • E-business
  • Online transactions
  • Digital strategies
  • Business optimization

Uploaded on | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. E-business Auditing Revised on 2014

  2. Introduction E-business vs E-commerce Are they similar? E -business and e-commerce are terms that are sometimes used interchangeably, but the terms are actually different E-business E-commerce

  3. What is Difference Between e-commerce and e-Business? e-commerce - buying and selling using an electronic medium. ICT is used in inter-business or inter-organizational transactions (transactions between and among firms/organizations) and in business-to-consumer transactions (transactions between firms/organizations and individuals). Eg: Accepting credit and payments over the net, doing banking transactions using the Internet, selling commodities or information using the World Wide Web and so on.

  4. What is Difference Between e-commerce and e-Business? e-Business - on top of e-commerce, it also includes both front and back-office applications that form the engine for modern E-commerce. e-business is not just about e-commerce transactions; it's about re-defining old business models, with the aid of technology to maximize customer value. ICT is used to enhance one s business. It includes any process that a business organization conducts over a computer-mediated network e-Business is the overall strategy and e- commerce is an extremely important facet of e- Business.

  5. What is Difference Between e-commerce and e-Business? Thus e-business involves not merely setting up the company website and being able to accept credit card payments or being able to sell products or services on time. It involves fundamental re-structuring and streamlining of the business using technology by implementing enterprise resource planning (ERP) systems, supply chain management, customer relationship management, data ware housing, data marts, data mining, etc. (Source: http://www.eresourceerp.com/What-is-the-difference-between-E-commerce-and-E-Business.html, http://en.wikibooks.org/wiki/E-Commerce_and_E-Business/Concepts_and_Definitions)

  6. e-commerce It involves three types of integration: o Vertical integration of front-end Web site applications to existing transaction systems; o Cross-business integration of a company with Web sites of customers, suppliers or intermediaries such as Web-based marketplaces; o Integration of technology with modestly redesigned processes for order handling, purchasing or customer service

  7. e-business Three primary processes are enhanced in e-business: 1. Production processes, which include procurement, ordering and replenishment of stocks; processing of payments; electronic links with suppliers; and production control processes, among others; 2. Customer-focused processes, which include promotional and marketing efforts, selling over the Internet, processing of customers purchase orders and payments, and customer support, among others; and 3. Internal management processes, which include employee services, training, internal information-sharing, video-conferencing, and recruiting. Electronic applications enhance information flow between production and sales forces to improve sales force productivity. Workgroup communications and electronic publishing of internal business information are likewise made more efficient

  8. e-business Involves four types of integration: o Vertical - between Web front- and back-end systems; o Cross-business integration - between a company and its customers, business partners, suppliers or intermediaries; o Horizontal - among e-commerce, enterprise resource planning (ERP), customer relationship management (CRM), knowledge management and supply-chain management systems; o Integration of technology with radically redesigned business processes

  9. Risks with e-business 1. Fraud A deception deliberately practiced in order to secure unfair or unlawful gain (Source: http://en.wikipedia.org/wiki/Fraud) http://www.nbcnews.com/id/4648378/ns/technology_and_science- security/t/foreign-fraud-hits-us-e-commerce-firms-hard/

  10. Risks with e-business 2. Loss of privacy/ confidentiality Losing the ability for an individual or group to seclude themselves, or information about themselves, and thereby express themselves selectively (Adapted from: http://en.wikipedia.org/wiki/Privacy) http://yourbusiness.azcentral.com/risks-ebusiness-1368.html

  11. Risks with e-business 3. Lack of authentication Absence in verifying whether someone or something is, in fact, who or what it is declared to be. (Adapted from: searchsecurity.techtarget.com/definition/authentication) 4. Corruption of data Errors in computer data that occur during writing, reading, storage, transmission, or processing, which introduce unintended changes to the original data (Source: http://en.wikipedia.org/wiki/Data_corruption) 5. Business interruption

  12. Controls in e-business applications 1. Authenticity mechanism User-id and password PIN 2. Non-repudiation mechanism The ability to ensure that a party to a contract or a communication cannot deny the authenticity of their signature on a document or the sending of a message that they originated Digital signature 3. Encryption 4. Policies

  13. e-Business Security Audit The most important controls for auditing e- business security are the following: Access control policy and procedures Account management Which manages system accounts, including establishing, activating, modifying, reviewing, disabling, and removing accounts. Separation of duties The system enforces separation of duties through assigned access authorizations. The organization establishes appropriate divisions of responsibility and separates duties as needed to eliminate conflicts of interest in the responsibilities and duties of individuals. Least privilege The system enforces the most restrictive set of rights/privileges or accesses needed by users (or processes acting on behalf of users) for the performance of specified tasks.

  14. e-Business Security Audit (cont.) Unsuccessful login attempts The system enforces a limit of consecutive invalid access attempts by a user during a time period. System use notification The system displays an approved, system use notification message before granting system access informing potential users: That the user is accessing the system That system usage may be monitored, recorded, and subject to audit That unauthorized use of the system is prohibited and subject to criminal and civil penalties That use of the system indicates consent to monitoring and recording. Previous logon notification The system notifies the user, upon successful logon, of the date and time of the last logon, and the number of unsuccessful logon at-tempts since the last successful logon.

  15. e-Business Security Audit Session lock The system prevents further access to the system by initiating a session lock that remains in effect until the user reestablishes access using appropriate identification and authentication procedures. Supervision and review access control Which supervises and reviews the activities of users with respect to the enforcement and usage of information system access controls. Remote access Which documents, monitors, and controls all methods of remote access (e.g., dial-up, broadband, Internet) to the information system Appropriate organization officials authorize each remote access method for the information system and authorize only the necessary users for each access method. (Source: N STASE, N STASE and OVA (2007): Information Security Audit in e-business applications )

Related


More Related Content