Issues and concerns in Internet based financial applications: an example from an auto finance system

The Internet is an important resource for both business-to-business and business-to-consumer commerce. Its advantages over private networks are often overshadowed by concerns about using public networks for commercial transactions. We present a case study that describes adoption of an Internet-based auto finance system by a financial institution and multiple auto dealerships. We discuss four issues that we needed to solve in order for the system to be accepted. These are: the implications of the open nature of the Internet on existing business-to-consumer relationships; security of enterprise data and systems; ensuring connectivity across enterprises; and the management of information assets generated by large volumes of electronic transactions.

[1]  T. Monk,et al.  What's next for Internet data analysis? Status and challenges facing the community , 1997 .

[2]  George Lawton Paving the Information Superhighway's Last Mile , 1998, Computer.

[3]  Eugene H. Spafford,et al.  Firewalls: An Expert Roundtable , 1997, IEEE Softw..

[4]  Joobin Choobineh,et al.  Trust in electronic commerce: definition and theoretical considerations , 1998, Proceedings of the Thirty-First Hawaii International Conference on System Sciences.

[5]  Chen Wang,et al.  Consumer privacy concerns about Internet marketing , 1998, CACM.

[6]  Stephen J. Boies,et al.  Avoiding the mistake of cloning: a case for user-centered design methods to reengineer documents , 1999, Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers.

[7]  Andrew B. Whinston,et al.  Marketing information on the I-Way: data junkyard or information gold mine? , 1998, CACM.

[8]  Stephen J. Boies,et al.  Extending User-Centered Methods beyond Interface Design to Functional Definition , 1996 .

[9]  Brian Thomas Digital Toolbox: Recipe for E-Commerce , 1997, IEEE Internet Comput..

[10]  Rolf Oppliger,et al.  Internet security: firewalls and beyond , 1997, CACM.

[11]  William N. Robinson,et al.  Creating a custom mass-production channel on the Internet , 1998, CACM.

[12]  R. Wilder,et al.  Wide-area Internet traffic patterns and characteristics , 1997, IEEE Netw..

[13]  Sixto Ortiz Virtual Private Networks: Leveraging the Internet , 1997, Computer.