Cover image for Electronic commerce relationships : trust by design
Title:
Electronic commerce relationships : trust by design
Personal Author:
Publication Information:
Upper saddle River : Prentice Hall, 2000
ISBN:
9780130170378

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000004407387 HF5548.32 E53 2000 Open Access Book Book
Searching...
Searching...
30000005038405 HF5548.32 E53 2000 Open Access Book Book
Searching...
Searching...
30000004407445 HF5548.32 E53 2000 Open Access Book Book
Searching...

On Order

Summary

Summary

"This is the first book to focus on the challenge at the heart of the e-business revolution: building long-term relationships of trust between buyers, sellers, and partners. In Electronic Commerce Relationships: Trust by Design, four expert authors present today's best practices for designing trust into any e-commerce system. Start by understanding the key elements of trust in e-commerce - certainty, confidentiality, and privacy - and then learn to build systems that deliver all three. Discover no-nonsense, proven techniques for e-commerce risk mitigation, trust, control, audit, and security - along with specific recommendations and processes you can implement now."--BOOK JACKET.Title Summary field provided by Blackwell North America, Inc. All Rights Reserved


Author Notes

The authors are all recognized leaders in E-commerce, with distinguished histories of writing, consulting, and developing electronic business solutions for major corporations.


Table of Contents

Acknowledgmentsp. xiii
Introductionp. xv
1 Electronic Commerce and the Concept of Trustp. 1
Definition of Trustp. 1
The Basics of Trustp. 4
Trust as a Foundation for ECp. 7
The Trusted Systemp. 9
Complexityp. 10
Interdependencyp. 10
The Trust Economyp. 11
Telecommunications Networksp. 12
Addressing New Risksp. 14
Action Items for it Managersp. 16
Understand the Business Environmentp. 16
Categorize and Respond to Specific Areas of Concernp. 17
Monitor the Relationshipp. 17
2 The Dark Side of the Force: The Risks of Electronic Commercep. 19
Risks Common to all Distributed Networksp. 19
Limitations of Traditional Risk Managementp. 21
New Awarenessp. 22
Technology-Induced Risks: What's Newp. 27
Process-Oriented Technical Risksp. 27
Public Communications Pathsp. 28
Automation Amplificationp. 31
Risk-Reduction Measures to Considerp. 33
Uneven Quality of Black Box Processesp. 35
What Control Professionals and Auditors Sayp. 37
Get the Big Picturep. 37
Put Risk in the Right Contextp. 38
The Role of the it Manager in Risk Managementp. 39
Beyond Technology Riskp. 39
3 Gaining Control of Electronic Commercep. 43
Control is More than Securityp. 43
Benefits and Importance of Controlp. 43
Control Objectives of a Trusted Commercial Systemp. 45
Criteria of Controlp. 46
EC Controls: The Macro Viewp. 47
Control Is an Evolutionary Processp. 48
Steps to Create a Safe EC Environmentp. 53
Identification of "Crown Jewels"p. 53
Management Controls: People and Processp. 53
Technology Dependent Controls (Tools)p. 55
Role of the IT Manager: Point--Counterpointp. 57
4 Maintaining the Trust Bond: Certainty, Confidentiality, and Privacyp. 61
Introductionp. 61
Definitions and Implications for ECp. 62
Protectionp. 63
EC Information Flowp. 69
Corporate Data Flow and Interactionsp. 69
Data Flows Between Trading Partnersp. 73
Data-in-Transitp. 75
Data with ISPp. 78
Data at Client Sites, Server Site, and Outsourced Vendorsp. 80
Trans-Border Information Flowp. 81
The Auditor's Perspectivep. 82
Confidentiality/Privacy Regulations: An International Samplep. 83
Total Quality in the EC Transaction Factoryp. 86
5 Security: What Are You Protecting ... and Why?p. 87
Look After the Information First: Linking Security With Data Protectionp. 89
Value and Approach for Public Key Versus Private Keyp. 90
Framework for Building Confidencep. 97
Understanding the Risks of Distributed Systemsp. 98
Cost of Risk Protectionp. 103
Risk Managementp. 104
Layers of Risk Protectionp. 106
Perimeterp. 106
User Authenticationp. 109
Public Key Infrastructure (PKI)p. 111
Other Authentication Techniquesp. 112
Access Control and Authorizationp. 112
Information Transformation Layers and Associated Security Schemesp. 114
Social Aspects of Securityp. 117
Social Engineeringp. 117
Removable Datap. 119
Legal Aspectsp. 119
Retaining Expertisep. 120
6 Looking After Business: The Core Components of Electronic Commercep. 123
EC as a Catalyst for Changep. 124
EC Definedp. 125
Person to Personp. 125
Person to Computerp. 126
Computer to Computerp. 126
Edi as the Primary Business-to-Business EC Componentp. 127
The EC Value Propositionp. 128
Salesp. 128
Customer Servicep. 129
Procurementp. 129
Procurement Cardsp. 130
Information Management and Dissemination to Internal Resourcesp. 130
Business Issuesp. 131
Technical Issuesp. 132
Communicationsp. 132
Data Storage and Retrievalp. 133
Message Conversionp. 136
Application Interfacep. 138
EC in the Payments Businessp. 140
Future Direction and Implications for it Managersp. 141
Extended Reachp. 142
Micropaymentsp. 142
Digital Cashp. 143
Smart Cardsp. 143
Mondexp. 143
Encrypted Credit Cardsp. 144
Electronic Checksp. 144
Electronic Bill Presentmentp. 145
Implications of New EC Delivery Channelsp. 145
Key EC Issues for the IT Managerp. 146
Factors for the IT Manager to Considerp. 147
Steps for EC Successp. 148
7 Business First and Safety First: Protecting Electronic Commerce Relationshipsp. 151
From Systems Defense to Business Enhancementp. 152
Putting Both Safety and Service Firstp. 154
Key Players in EC Developmentp. 155
Business Policy as Big Rulesp. 155
The Link Between Big Rules and Standardsp. 157
Determining Compelling Reasons for the Big Rulesp. 159
Questions for the Big Rulep. 160
Choosing the Big Rulesp. 161
Relationship Designp. 162
Reputation and Performance in an Online Relationshipp. 165
The Perfect EC Relationshipp. 166
Front-Endingp. 167
Business Enhancementp. 168
8 Auditing for a New Age, New Purpose, and New Commercep. 169
The Changing Role of the Internal Auditorp. 170
Internal Control: Trends and Recent Developmentsp. 171
Internal Control: Integrated Framework, 1994p. 171
Guidance on Assessing Control, 1999p. 172
Guidance on Control, 1995p. 173
Control Objectives for Information and Related Technology, 1998 (CobiT)p. 174
An Integrated Control Framework for ECp. 176
The EC Control Environmentp. 177
The Payoff Ideap. 183
9 External Audit Requirements and Regulatory Compliancep. 189
Overviewp. 189
The External Auditor's Rolep. 190
What External Auditors Look Forp. 190
The Question of Corporate Governance: The Regulator's Rolep. 193
FDIC Electronic Banking: Safety and Soundness Examination Procedures, 1998 (U.S.)p. 194
Independent Report on "Electronic Commerce and Canada's Tax Administration," 1998p. 195
CDIC Standards of Sound Business and Financial Practices: Internal Control 1994 (Canada)p. 196
Financial Aspects of Corporate Governance, 1992 (U.K.)p. 197
External Requirements Harmonizationp. 198
The Common Groundp. 198
Action Items for Control Designersp. 199
Apply Safety Toolsp. 199
Add New Control Self-Assessment Topicsp. 200
Promote Quality Documentationp. 200
Action Items for EC Professionalsp. 200
10 Trends to Follow and Opportunities to Takep. 205
How to Plan When You Can't Predictp. 206
The Near Termp. 210
Transforming the Nature of Security with Agentsp. 210
ANSI and Internet/Extranet Growthp. 212
The Medium Termp. 213
Safe Paymentsp. 214
The Unknown Time Framep. 216
Digital Cashp. 216
Changes in Payment Mechanismsp. 216
The Death of Copyrightp. 218
Recommendations to Managersp. 218
Appendix Electronic Commerce in Action: The Case for Secure Electronic Transaction (SET)p. 221
1. What is Set?p. 222
2. Why Set at All?p. 226
3. Risk Profile With Implementing a Set Payment Systemp. 226
Set Payment Cardholdersp. 226
Set Merchantsp. 227
Set Payment Gatewaysp. 227
4. The Trust Dimension: The Public Key Infrastructurep. 228
5. Set Implementation Issuesp. 228
Vendor Products May Not Be Fully Certified at Time of Implementation or Self-Auditp. 228
Merchant Sign-Up Process Changep. 230
Certificate Managementp. 230
Performancep. 231
Backup of Set-Sensitive Filesp. 231
Managing Vendors and Outsourcing Partnersp. 231
Self-Audits and Independent Auditsp. 232
6. What Set Does Not Coverp. 232
Indexp. 235
The Authorsp. 245