11.07.2015 Views

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

authentication 31auctions, onlineBy the late 1990s, millions <strong>of</strong> computer users had discovereda new way to buy <strong>and</strong> sell an immense variety <strong>of</strong> itemsranging from traditional collectibles to the exotic (such as aworking German Enigma encoding machine).Since its founding in 1995, leading auction site eBay hasgrown to 78 million users in mid-2006, with revenue <strong>of</strong>about $7.6 billion in 2007 (see eBay). (Two other e-commercegiants, Amazon.com <strong>and</strong> Yahoo!, also entered theonline auction market, but with much more modest results.)ProceduresOnline auctions differ from traditional auctions in severalways. Traditional auction firms generally charge the seller<strong>and</strong> buyer a commission <strong>of</strong> around 10 percent <strong>of</strong> the sale or“hammer” price. Online auctions charge the buyer nothing,<strong>and</strong> the seller typically pays a fee <strong>of</strong> about 3–5 percent <strong>of</strong> theamount realized. Online auctions can charge much lowerfees because unlike traditional auctions, there is no liveauctioneer, no catalogs to produce, <strong>and</strong> little administration,since all payments pass from buyer to seller directly.An online auction is like a mail bid auction in that bidscan be posted at any time during the several days a typicalauction runs. A buyer specifies a maximum bid <strong>and</strong> ifhe or she becomes the current high bidder, the high bid isadjusted to a small increment over the next highest bid. Aswith a “live” auction, however, bidders can revise their bidsas many times as they wish until the close <strong>of</strong> the auction.An important difference between online <strong>and</strong> traditional liveauctions is that a traditional auction ends as soon as noone is willing to top the current high bid. With an onlineauction, the bidding ends at the posted ending time. Thishas led to a tactic known as “sniping,” where some bidderssubmit a bid just over the current high bid just before theauction ends, such that the previous high bidder has notime to respond.Future <strong>and</strong> ImplicationsOnline auctions have become very popular, <strong>and</strong> an increasingnumber <strong>of</strong> people run small businesses by selling itemsthrough auctions. The markets for traditional collectiblessuch as coins <strong>and</strong> stamps have been considerably affectedby online auctions. Knowledgeable buyers can <strong>of</strong>ten obtainitems for considerably less than a dealer would charge, orsell items for more than a dealer would pay. However, manyitems are overpriced compared to the normal market, <strong>and</strong>faked or ill-described items can be a significant problem.Attempts to hold the auction service legally responsiblefor such items are met with the response that the auctionservice is simply a facilitator for the seller <strong>and</strong> buyer <strong>and</strong>does not play the role <strong>of</strong> traditional auctioneers who catalogitems <strong>and</strong> provide some assurance <strong>of</strong> authenticity. If courtsor regulators should decide that online auctions must bearthis responsibility, the cost <strong>of</strong> using the service may rise orthe variety <strong>of</strong> items that can be <strong>of</strong>fered may be restricted.Further ReadingCohen, Adam. The Perfect Store: Inside eBay. Boston: Little, Brown,2002.Encell, Steve, <strong>and</strong> Si Dunn. The Everything Online Auctions Book:All You Need to Buy <strong>and</strong> Sell with Success—on eBay <strong>and</strong> Beyond.Avon, Mass.: Adams Publishing Group, 2006.Kovel, Ralph M., <strong>and</strong> Terry H. Kovel. Kovels’ Bid, Buy, <strong>and</strong> SellOnline: Basic Auction Information <strong>and</strong> Tricks <strong>of</strong> the Trade. NewYork: Three Rivers Press, 2001.auditing in data processingThe tremendous increase in the importance <strong>and</strong> extent <strong>of</strong>information systems for all aspects <strong>of</strong> commerce <strong>and</strong> industryhas made it imperative that businesses be able to ensurethe accuracy <strong>and</strong> integrity <strong>of</strong> their accounting systems <strong>and</strong>corporate databases. Errors can result in loss <strong>of</strong> revenue<strong>and</strong> even exposure to legal liability.Auditing involves the analysis <strong>of</strong> the security <strong>and</strong> accuracy<strong>of</strong> s<strong>of</strong>tware <strong>and</strong> the procedures for using it. For example,sample data can be extracted using automated scriptsor other s<strong>of</strong>tware tools <strong>and</strong> examined to determine whethercorrect <strong>and</strong> complete information is being entered into thesystem, <strong>and</strong> whether the reports on which managementrelies for decision making are accurate. Auditing is alsoneeded to confirm that data reported to regulatory agenciesmeets legal requirements.In addition to confirming the reliability <strong>of</strong> s<strong>of</strong>tware <strong>and</strong>procedures, auditors must necessarily also be concernedwith issues <strong>of</strong> security, since attacks or fraud involvingcomputer systems can threaten their integrity or reliability(see computer crime <strong>and</strong> security). The safeguarding <strong>of</strong>customer privacy has also become a sensitive concern (seeprivacy in the digital age). To address such issues, theauditor must have a working knowledge <strong>of</strong> basic psychology<strong>and</strong> human relations, particularly as they affect largeorganizations.Auditors recommend changes to procedures <strong>and</strong> practicesto minimize the vulnerability <strong>of</strong> the system to bothhuman <strong>and</strong> natural threats. The issues <strong>of</strong> backup <strong>and</strong>archiving <strong>and</strong> disaster recovery must also be addressed(see backup <strong>and</strong> archive systems). As part accountant<strong>and</strong> part systems analyst, the information systems auditorrepresents a bridging <strong>of</strong> traditional practices <strong>and</strong> rapidlychanging technology.Further ReadingCannon, David L., Timothy S. Bergmann, <strong>and</strong> Brady Pamplin.CISA: Certified Information Systems Auditor Study Guide. Indianapolis:Wiley Publishing, 2006.Champlain, Jack. Auditing Information Systems. Hoboken, N.J.:Wiley, 2003.Information Systems Audit <strong>and</strong> Control Association. Availableonline. URL: http://www.isaca.org/. Accessed May 22, 2007.Pathak, Jagdish. Information Systems Auditing: An Evolving Agenda.New York: Springer-Verlag, 2005.authenticationThis process by which two parties in a communicationor transaction can assure each other <strong>of</strong> their identity is afundamental requirement for any transaction not involvingcash, such as the use <strong>of</strong> checks or credit or debit cards.(In practice, for many transactions, authentication is “one

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!