Académique Documents
Professionnel Documents
Culture Documents
com
4. E-commerce only involves transactions between the business and its customers.
5. Packet switching is the method used to send data over a computer network.
9. The Internet (interconnected networks) serves as the backbone for the World
Wide Web (WWW).
11. Regional ISPs connect to the backbone through lines that have less speed and
capacity than the backbone.
12. Local ISPs connect to the backbone through lines that have less speed and
capacity than the backbone.
13. A web server is a computer and hard drive space that connects to the backbone
through lines that have less speed and capacity than the backbone.
14. A web server is a computer and hard drive space that stores web pages and
data.
To download more slides, ebook, solutions and test bank, visit http://downloadslide.blogspot.com
15. The standard form of encryption embedded in e-commerce sites and in web
browser software is “Safe Sending Language” (SSL).
16. Due to interstate trade events and taxation issues the U.S. Government has
standardized the definition of e-commerce.
17. The common term for business-to-consumer e-commerce is B2C. The common
term for business-to-business electronic sales is B2B.
18. E-commerce provides the potential for much richer marketing concepts that
include video, audio, product comparisons, and product testimonials or product
tests.
19. Because of computer interaction and the capability of almost instant verification
business across the World Wide Web has a lower probably of fraud, hackers, and
compromised customer privacy.
20. The AICPA Trust Services Principles do not protect the history of purchases since
these are classified as “public knowledge events.”
21. The AICPA Trust Services Principles state that the customer should be given the
choice regarding the collection and retention of data.
22. The AICPA Trust Services Principles state that the customer need not be
contacted if a business is going to release non-sensitive information about the
customer to a third party.
23. The supply chain is the linked processes from the raw material vendor through
the manufacturer ending at the stage of finished goods.
24. The supply chain may be larger at either or both ends as more than one vendor
may supply the same materials and more than one customer may purchase the
finished products.
25. A strength of the supply chain concept is that inconsistencies or poor quality
within the supply chain will be compensated by other strengths resulting in an
overall satisfactory product.
27. The differentiating factor between B2C and B2B is where B2C might purchase
two books; a B2B purchase might involve ten thousand books.
2
To download more slides, ebook, solutions and test bank, visit http://downloadslide.blogspot.com
28. One advantage in the B2B e-business environment is that operations costs can
be reduced through inventory reductions and efficiencies can be increased by
location of nearby assets when needed.
30. Because intranets do not transmit information through the Internet or WWW
they do not use protocols such as TCP/IP.
32. One characteristic that the Internet, intranets, and extranets have in common is
that they are all networks that are intended for the sharing of information and
the conducting of transactions.
33. The general public has general access to the intranet and extranet networks.
34. XML is a rich language that facilitates the exchange of data between
organizations via web pages.
35. In XBRL complex financial statements are presented only in a static mode.
36. Traditional EDI is a real-time processing system due to the 24 hour, 7 day a
week operation of computers and servers.
37. Management has an ethical obligation to create and enforce policies and
practices which ensure that private customer data are not misused.
38. Because of their sensitive nature, companies seldom sell or share customer lists
or customer data.
3
To download more slides, ebook, solutions and test bank, visit http://downloadslide.blogspot.com
4
To download more slides, ebook, solutions and test bank, visit http://downloadslide.blogspot.com
40. E-commerce:
A. is business-to-business electronic trading and process integration.
B. is electronically enabled transactions between a business and its vendors.
C. is electronic recording and control of internal processes.
D. is electronically enabled transactions between a business and its customers.
41. E-business:
1. is a narrower concept than e-commerce.
2. services the customers and the vendors.
3. is electronic recording and control of internal processes.
4. uses electronic means to enhance business processes.
A. 1 only.
B. 2 and 3 only.
C. 2, 3, and 4 only.
D. 1, 2, 3, and 4.
43. E-commerce:
A. sales will usually be large dollar amounts with only a few items are sold.
B. is the sale of goods or services from a business to retailers.
C. is the sale of goods or services to an end-user consumer.
D. Both A and B are correct answers.
44. E-business
1. includes the sale of raw materials between companies.
2. includes using the Internet as an electronic network.
3. sales will usually be smaller dollar amounts with many sales.
4. is a broader concept than e-commerce.
A. 1, 2, 3, and 4.
B. 2, 3, and 4 only.
C. 1, 3, 4 only.
D. 1, 2, and 4 only.
5
To download more slides, ebook, solutions and test bank, visit http://downloadslide.blogspot.com
6
To download more slides, ebook, solutions and test bank, visit http://downloadslide.blogspot.com
7
To download more slides, ebook, solutions and test bank, visit http://downloadslide.blogspot.com
8
To download more slides, ebook, solutions and test bank, visit http://downloadslide.blogspot.com
9
To download more slides, ebook, solutions and test bank, visit http://downloadslide.blogspot.com
10
To download more slides, ebook, solutions and test bank, visit http://downloadslide.blogspot.com
78. All of the following are true statements about e-commerce except:
A. e-commerce sites normally conduct sales 24 hours a day, 7 days a week, 12
months a year.
B. e-commerce sales are except from sales taxes due to the lack of a physical
site.
C. e-commerce consumers can search for better prices and more information
easily.
D. e-commerce consumers may incur shipping and handling charges not
incurred by retail customers.
11
To download more slides, ebook, solutions and test bank, visit http://downloadslide.blogspot.com
84. With the advent of technology, the Internet, and the WWW:
A. commerce is moving only from physical to electronic positioning.
B. commerce has maintained its stance of physical and electronic.
C. commerce is moving both from electronic to physical and from physical to
electronic.
D. No notable trends have been identified.
12
To download more slides, ebook, solutions and test bank, visit http://downloadslide.blogspot.com
86. The AICPA’s Trust Services Principles state that online privacy focuses on:
1. Name
2. Address
3. Social Security number
4. government ID numbers
5. employment history
6. personal health conditions
7. personal financial information
8. history of purchases
9. credit records
A. 1, 2, 3, 4, 5, 6, 7, 8, and 9.
B. 1, 2, 3, 4, 6, 7, 8, and 9 only.
C. 1, 2, 3, 4, 5, 6, 7, and 9 only.
D. 1, 2, 3, 4, 5, 6, 7, and 8 only.
87. The AICPA’s Trust Services Principles practice that states a specific person or
persons should be assigned the responsibility to insure that privacy
practices are followed by employees is under the title of:
A. monitoring and enforcement.
B. security for privacy.
C. management.
D. choice and consent.
88. The AICPA’s Trust Services Principles practice that states a company should have
policies and practices to maintain the privacy of customer data is under the
title of:
A. choice and consent.
B. collection.
C. use and retention.
D. notice.
13
To download more slides, ebook, solutions and test bank, visit http://downloadslide.blogspot.com
89. The AICPA’s Trust Services Principles practice that states the organization should
provide the choice to its customers regarding the collection of data is under
the title of:
A. choice and consent.
B. collection.
C. use and retention.
D. notice.
90. The AICPA’s Trust Services Principles practice that states the organization should
ask about the collection, retention, and of the use is under the title of:
A. use and retention.
B. access.
C. choice and consent.
D. disclosure to third parties.
91. The AICPA’s Trust Services Principles practice that states that only the data that
is necessary for the purpose of conducting the transaction should be
collected is under the title of:
A. use and retention.
B. collection.
C. choice and consent.
D. security for privacy.
92. The AICPA’s Trust Services Principles practice that states the organization should
use customers’ personal data only in the manner described in “notice” is
under the title of:
A. security for privacy.
B. monitoring and enforcement.
C. use and retention.
D. choice and consent.
93. The AICPA’s Trust Services Principles practice that states that customers should
have access to the data provided so that the customer can view, change,
delete, or block further use of the data provided is under the title of:.
A. access.
B. choice and consent.
C. security for privacy.
D. use and retention.
14
To download more slides, ebook, solutions and test bank, visit http://downloadslide.blogspot.com
94. The AICPA’s Trust Services Principles practice that states that organizations
should receive explicit or implicit consent of the customer before providing
information to third parties is under the title of:
A. choice and consent.
B. security for privacy.
C. monitoring and enforcement.
D. disclosure to third parties.
95. The AICPA’s Trust Services Principles practice that states that the organization
has the necessary protections to try to insure that customer data is not lost,
destroyed, altered, or subject to unauthorized access is under the title of:
A. choice and consent.
B. security for privacy.
C. monitoring and enforcement.
D. disclosure to third parties.
96. The AICPA’s Trust Services Principles practice that states that all customer data
collected remains “accurate, complete, current, relevant, and reliable” is
under the title of:
A. choice and consent.
B. quality.
C. monitoring and enforcement.
D. use and retention.
97. The AICPA’s Trust Services Principles practice that states that the organization
should have procedures to address privacy related inquiries or disputes is
under the title of:
A. choice and consent.
B. quality.
C. monitoring and enforcement.
D. use and retention.
98. Internal processes of the organization include all of the following except:
A. transactions involving suppliers.
B. movement of raw materials.
C. timekeeping and labor management.
D. sharing of data files among workers.
15
To download more slides, ebook, solutions and test bank, visit http://downloadslide.blogspot.com
102. The correct statement regarding the supply chain and B2C is the supply chain
extends from the:
A. secondary supplier and ends with the retailer while B2C is from the
manufacturer to the final consumer.
B. secondary supplier and ends with the retailer while B2C is from the
manufacturer to the final consumer.
C. secondary supplier and ends with the manufacturer while B2C is from the
retailer to the final consumer.
D. secondary supplier and ends with the final customer while B2C is from the
retailer to the final consumer.
103. The correct statement regarding the supply chain and B2B is the supply chain
extends from the:
A. secondary supplier and ends with the retailer while B2B is from the
manufacturer to the final consumer.
B. secondary supplier and ends with the final customer while B2B is from the
secondary supplier to the distributor.
C. secondary supplier and ends with the manufacturer while B2B is from the
supplier to the retailer.
D. secondary supplier and ends with the final customer while B2B is from the
retailer to the final consumer.
16
To download more slides, ebook, solutions and test bank, visit http://downloadslide.blogspot.com
17
To download more slides, ebook, solutions and test bank, visit http://downloadslide.blogspot.com
111. Firewalls:
A. prevent internal users from accessing unacceptable web sites through the
intranet.
B. permit internal users direct access to the Internet to accomplish B2B
transactions.
C. prevent vendors from viewing inventory levels via the intranet.
D. prevent external users from accessing the extranet or intranet.
113. XML:
A. allows dynamic financial statements to be published on websites.
B. provides standards for the automatic exchange of financial data.
C. facilitates the exchange of data between organizations via web pages.
D. is based on XBRL language for the construction of business web pages.
18
To download more slides, ebook, solutions and test bank, visit http://downloadslide.blogspot.com
116. Value added networks or VANs, features all of the following except:
A. transaction fees.
B. complicated.
C. industry standard.
D. limited access.
118. XBRL:
A. is a language that allows data extraction from financial statements.
B. is the base or core language for XML, also a metalanguage.
C. requires that financial statements be submitted in printed format.
D. Both answers B and C are correct.
19
To download more slides, ebook, solutions and test bank, visit http://downloadslide.blogspot.com
20
To download more slides, ebook, solutions and test bank, visit http://downloadslide.blogspot.com
121. An electronic hardware device that is located at the gateway between two or
more networks is a
A. packet switch.
B. URL.
C. router.
D. protocol.
122. The type of organization that serves as the main trunk line of the Internet is
called a
A. local ISP.
B. regional ISP.
C. global ISP.
D. backbone provider.
123. Which of the following is not a direct advantage for the consumer from -
commerce?
A. Access to a broader market
B. More shopping convenience
C. Reduced order-processing cost
D. Information sharing from the company
21
To download more slides, ebook, solutions and test bank, visit http://downloadslide.blogspot.com
127. Which of the following process within a supply chain can benefit from IT
enablement?
A. All process throughout the supply chain
B. Only internal process within the supply chain
C. Only external process within the supply chain
D. exchange process between a company and its suppliers
128. When a company has an e-business transaction with a supplier, it could be using
A. the Internet.
B. an intranet.
C. an extranet.
D. Either the Internet or an extranet.
130. When there is no necessity for a preexisting relationship between buyer and
seller, that transaction is more likely to b classified as
A. B2B.
B. B2C.
C. B2E.
D. Either B2B or B2C.
22
To download more slides, ebook, solutions and test bank, visit http://downloadslide.blogspot.com
132. A company’s computer network uses web servers, HTML, and XML to serve
various user groups. Which type of network best serves each of the following
users?
Employees Suppliers
A. Intranet Extranet
B. Intranet Internet
C. Internet Extranet
D. Internet Internet
23
To download more slides, ebook, solutions and test bank, visit http://downloadslide.blogspot.com
135. What was the original purpose of the network of computers that eventually
became the Internet?
Answer: The original purpose was to facilitate communication and sharing of work
between universities engaged in research for the Department of defense.
136. Why was ARPANET designed with many different alternative routes for network
traffic?
Answer: ARPANET was designed during the height of the Cold War with the USSR
and there were many fears of nuclear attack. A design with many alternative routes
could still operate if a nuclear attack destroyed one or more of those routes.
138. How quickly did Internet usage by the public grow after the Internet was opened
to business transactions in 1994?
Answer: The public use of the Internet exploded in growth after it was opened to
business transactions. This was especially true in the 1998 to 2001 period.
139. Describe the relationship between national backbone providers, regional ISPs,
and local ISPs?
Answer: Backbone providers make up the main trunk-lines of the Internet. They are
made up of high capacity , high speed lines. Regional Internet Service Providers
(ISP) connect to the backbone providers with lines with less speed and capacity than
backbone providers. The local ISPS then connect to the regional ISPs and these
local ISPs provide Internet connect to local customers.
24
To download more slides, ebook, solutions and test bank, visit http://downloadslide.blogspot.com
140. What is the importance of a standard formatting language for Web pages and a
standard addressing system?
Answer: The standard formatting language for web pages is HTML. A standard
formatting language is necessary to show a web page in the same form on the
many different kind of computers connected to the World Wide Web. There is a
similar reason to have a standard addressing system. Various types of computers
need a way to locate the desired web site If a standard method of accessing web
sites exists, the computer browsers can be built to use the standard addressing
system on the various kinds of computers.
141. Which types of costs can be reduced when a company decides to engage in B2B
e-commerce on the Internet?
Answer: Marketing costs, order processing costs, and distribution costs can be
reduced by engaging in B2C sales.
142. What are the differences between brick and mortar retailers and clicks and
mortar retailers?
Answer: Brick and mortar refers to retailers that sell in traditional forms in a building
that customers visit to make a purchase. Clicks and mortar refers to retailers who
have traditional sales in a building, but also sell to customers via the Internet.
143. According to the Online Privacy section of the AICPA Trust Services Principles,
what types of personal information should be protected?
Answer: All information collected from customers should remain private unless the
customer has given implicit or explicit permission to share such information with
third parties. In addition, companies should collect only data necessary to
conducting the transaction.
144. If you could condense the ten areas of Online Privacy in the AICPA Trust
Principles, into a shorter list (three, four, or five point list), how would you word
that list?
Answer: Collect only necessary data, keep that data private unless the customer
gives permission to share it, make sure you have enforced policies to store and use
the data as the customer intends you to use it, notify the customer of how you
intend to use the data.
25
To download more slides, ebook, solutions and test bank, visit http://downloadslide.blogspot.com
148. Which functions within the supply chain can be enhanced through the use of e-
business?
Answer: Virtually any process within the supply chain can be enhanced through e-
business.
150. In what ways are the characteristics of e-business different from e-commerce?
Answer: E-business is often business to business, while e-commerce is business to
consumer. In an e-business order, it is likely to be a large dollar order, with many
line items, and with a business that we have a pre-existing relationship. An e-
commerce order may be from an unknown customer and each order may be a small
dollar amount, but a large volume of orders. E-commerce transactions are likely to
be credit card transactions while e-business transactions are likely to involve
purchase orders and invoices.
151. What are the three levels of network platforms that are utilized in e-business and
which groups use each level?
Answer: The Internet is used by internal and external users, potentially including
anyone in the world. Extranets are used by trading partners and are not available to
the entire world. Intranets are used by employees within the company.
26
To download more slides, ebook, solutions and test bank, visit http://downloadslide.blogspot.com
154. What types of controls should be used to properly limit access in intranets and
extranets?
Answer: Authentication controls should be used, including controls such as user Ids,
passwords, access levels, computer logs, and authority tables. Also, hacking and
break-in controls should be used. These include controls such as firewalls,
encryption, security policies, VPN, vulnerability assessment, penetration testing, and
intrusion detection.
156. In what ways are XBRL financial statements advantageous when compared to
traditional paper financial statements?
Answer: XBRL statements can be viewed by a browser, or printed. In addition, the
viewing of an XBRL statement on a web browser could be much more interactive.
For example a reader of the statements could click on an item such as sales to see
more underlying detail of the sales total.
157. What are some of the ethical obligations of companies related to e-commerce?
Answer: Companies have an obligation to collect, store, and use customer data in a
ethical manner. These obligations are described in the ten privacy practices of the
AICPA Trust Services Principles.
158. Is there a difference between ethical obligations and legal obligations in regards
to online privacy?
Answer: Yes, for example, there is no legal obligation to have a privacy policy
displayed on the company web site. However, companies that wish to be very
ethical should display privacy practices.
27
To download more slides, ebook, solutions and test bank, visit http://downloadslide.blogspot.com
159. Much of the e-business and e-commerce conducted by companies uses the
Internet as the form of electronic communication. Describe other electronic
means to conduct e-business or e-commerce.
Answer: Electronic Data interchange (EDI) and Electronic Funds Transfer (EFT) are
other communication means.
160. How does the use of HTML, URLs, domain names, and SSL contribute to an
Internet that can be used world-wide?
Answer: There are many different types or brands of computers throughout the
world and these computers use different operating systems. There must be some
common standards within the Internet to allow these various types of computers to
read and interact with the Internet. HTML, URLs, domain names, and SSL are all
standards in use world-wide that facilitate a user-friendly Internet. Without such
common standards, it would not be as easy to connect to and use the Internet.
163. Describe the benefits to a company that engages in B2B transactions via the
Internet.
Answer: They are a wider potential market, reduced transaction cost, higher profits,
faster cycle times for product purchase or sale and cash flow, reduction in keying of
information and reduced data errors.
164. What are the ten areas of privacy practices described in the Online Privacy
section of the AICPA Trust Services Principles?
Answer: The ten areas are: management, notice, choice and consent, collection, use
and retention, access, disclosure to third parties, security for privacy, quality,
monitoring and enforcement.
28
To download more slides, ebook, solutions and test bank, visit http://downloadslide.blogspot.com
165. Describe the activities that take place in the supply chain of a manufacturing
firm.
Answer: Before a manufacturer can produce goods, it must buy raw materials from
suppliers. Often those suppliers also need to purchase raw materials, so there are
secondary suppliers in the supply chain. The internal processes of manufacturing are
also part of the supply chain. Upon completion, products must be distributed
through warehouses or distributors to retailers, who then sell these goods to
customers.
167. Explain the importance of user authentication and network break-in controls in
extranets.
Answer: Only trading partners such as suppliers, secondary suppliers, distributors, or
retailers should have access to an extranet. That is, it should not allow any user on
the web to log in. Thus, there must be extensive authentication controls. These
controls in include user Id, password, log in procedures, biometric devises or
security tokens, computer logs, and authorization tables. Since the extranet often
uses internet network facilities, it can be susceptible to hackers or other network
break-ins. Controls such as firewalls, encryption, SSL, vulnerability assessments,
penetration testing, and intrusion detection must be used.
168. What are the advantages of Internet EDI over traditional EDI?
Answer: The Internet allows cost-free exchanges of data. In traditional EDI, the
companies usually pay a VAN for network capabilities and communication. The
software and systems for Internet EDI are also simpler and cheaper than those for
traditional EDI. Even very small companies can afford hardware and software to
conduct Internet EDI.
29
To download more slides, ebook, solutions and test bank, visit http://downloadslide.blogspot.com
169. Explain the hardware or standards that were developed during the ARPANET that
were an important foundation for the Internet of today.
There were hardware items or standards developed during the ARPANET time
frame. These include packet switching, routers, and the TCP/IP protocol. Packet
switching is the method to send data over a computer network. Data is divided into
small packets and sent individually. Packets may travel different routes and as they
arrive, they are reassembled into the original data. A router is hardware that serves
as a gateway between two or more networks. TCP/IP is an acronym for transmission
control protocol/Internet protocol. It is the protocol used today.
170. The Pizza Pie Pit is a local chain of pizza restaurants in Dallas. The chain has 30
locations throughout the city and its suburbs. The management is considering
opening a Web site to conduct e-commerce with customers. Describe any
benefits that might be derived from this move.
A move to sales on the web site may not increase the geographic area from which
the Pizza Pie Pit draws customers. This is because the delivery area is not likely to
change. However, it may experience increased sales due to the convenience of
placing pizza orders online. It will also be likely to increase the accuracy of orders
and reduce the costs of filling pizza orders. Pizza Pie Pit may also see a benefit to
the marketing available on the web site, for examples, they could put pictures of
pizzas on “special” and perhaps increase the sales of promotional items. If these
benefits do occur, the company will experience increased profits.
171. Using your favorite search website, enter the term “privacy seal” and search.
Answer the following questions:
What is the purpose of a Web privacy seal?
The purpose of a privacy seal is to inform customers that the company web site
adheres to high standards of privacy of data. When a company displays a privacy
seal, they are alerting customers that the company can be trusted to maintain the
privacy of customer data.
Which organizations provide Web privacy seals to web-based companies?
Providers include the Better Business Bureau, TRUST-e, CPA WebTrust (AICPA),
PrivacyBot.com, ValidatedSite.com, and International Bureau of Certified Internet
Merchants.
What are the advantages to a company that maintains a Web privacy seal?
Those parties that provide privacy seals indicated that having a privacy seal leads to
increased customer confidence and higher revenue.
What are the benefits to a consumer of shopping a website that has a privacy seal?
The consumer should feel a greater sense of confidence that their data is private.
There should also be fewer concerns about negative consequences such as a
customer’s contact information being sold, or identity theft.
30
To download more slides, ebook, solutions and test bank, visit http://downloadslide.blogspot.com
172. Visit the website www.cpawebtrust.org and answer the following questions:
What is a WebTrust seal?
A WebTrust Seal is placed on a web site of a company that has been examined by a
CPA firm to determine that it has appropriate privacy practices and that it adheres to
those practices.
Which organization sanctions the WebTrust seal?
The American Institute of Certified Public Accountants (AICPA)
What kind of professional can provide a WebTrust seal to a company?
Licensed CPAs who have been trained in WebTrust service examinations.
What must this professional do before providing a WebTrust seal?
For a firm to become a licensed WebTrust Services provider, the firm must: be in
good standing with the AICPA; be a CPA majority owned firm; be part of a
recognized quality control system; and, sign a licensing agreement and remit an
annual licensing fee to the AICPA.
173. Enter the Web site of a popular retail company that sells a large volume of goods
or services on the Internet. Search for company “Privacy Policies” on that Web
site. If you do not find any privacy policies, continue visiting other company Web
sites until you do find privacy policies. Once you have found a company with
privacy policies, describe how the company policies do or do not meet the
privacy practices in the AICPA Trust Principles.
The solution will depend on which company the student uses in their answer. For
any company, the student answer should compare the privacy practices against
those in the AICPA Trust services Principles privacy practices. The following sample
answer is based on Target ®, the retail department store, www.target.com,
accessed on February 15, 2008.
Target identifies the information it collects such as name, address, e-mail address,
phone number, credit card number, and it discloses there may be other information
collected. This other information might include personal preferences or information
about other people such as gift recipients.
The site indicates there are several parties they may share information with. Those
uses include: use by Target to offer products or services, Amazon.com when goods
are purchased from Amazon on target’s site, carefully selected companies and
organizations, and service providers such as printing companies or web host
companies.
31
To download more slides, ebook, solutions and test bank, visit http://downloadslide.blogspot.com
The site also discloses how a customer can limit use of data provided. It appears
that when information is collected by Target, customers are giving implicit consent
to use information as outlined in the privacy practices. Within the privacy policy,
there are clickable links to allow a customer to limit use or sharing of information.
For example, one link allows customers to prevent sharing of information to
companies or organizations outside the Target family of companies.
Thus, the Target site does include some of the privacy practices in the AICPA Trust
Services Principles, but not all. It does seem to include adequate notice, consent,
and disclosure to third parties as described above. However, the site describes little,
if any, information about management, collection, access, security for privacy,
quality, or monitoring and enforcement. The site does briefly describe use of the
information, such as for offering special promotions. There is no information about
the retention of data. Therefore, the Target site partially describes use and
retention.
174. Using an Internet search engine, search for the terms “Internet EDI” and “Kate
and Ashley.” Explain how Coty applies Internet EDI.
This solution is based on an article at
http://www.computerworld.com.au/index.php/id;1618362747 accessed of February
15, 2008. the article indicates that Coty, the cosmetics manufacturer of Kate and
Ashley, is using a blend of old and new technology as it sells the fragrance to Wal-
Mart. The old part of the technology is EDI. It is using standard and traditional data
formats for EDI exchange with Wal-Mart. The article describes the new technology
as the “transport mechanism”. Coty is transmitting EDI information to Wal-Mart
using the Internet, rather than a Value Added Network (VAN). The technology costs
less and is simple to implement. It also eliminates the fees paid to VANs. The article
also describes that the increase in the use of internet EDI is driven by companies
such as Wal-Mart. Wal-Mart is requiring its vendors to use Internet EDI. Meijer is
another company that encouraged Coty to use Internet EDI for its information
exchanges.
32
To download more slides, ebook, solutions and test bank, visit http://downloadslide.blogspot.com
175. Visit the www.xbrl.org Web site. Click on the “Latest News” link, and then the
“articles” link. After reading three or four of the most recent articles about XBRL,
briefly describe what those articles say about XBRL.
The student solution to this problem will vary greatly and depend on when they view
the XBRL site and which articles they choose. As of the end of 2007, some items
about XBRL are:
The Shanghai stock exchange in China is asking companies to use XBRL to file
reports.
In Belgium, over 290,000 companies will be using XBRL to file accounts with the
National Bank of Belgium.
The majority of European Banking Supervisors are using XBRL as either a required
or optional format.
In the United States, the SEC is considering mandatory XBRL filing for the Fall of
2008.
33