ICE-B 2020 Abstracts


Area 1 - Business Intelligence

Full Papers
Paper Nr: 8
Title:

Business to System Requirements Agile Mapping

Authors:

Malgorzata Pankowska

Abstract: Business and Information Technology (IT) alignment methods and models have been developed for the last few years. Mainly, they focus on strategic alignment, however, the misunderstanding and lack of alignment are hidden in requirement mapping methods, tools, and approaches. Therefore, the paper aim is to present a model of business to system requirements mapping, based on the application of SysML and ArchiMate diagrams. The proposed approach is assumed to be considered as agile, because of its features. Finally, the approach is supported by online store case study. Beyond that, systematic literature review was done on SysML requirements engineering.
Download

Paper Nr: 19
Title:

Government Digital Service Co-design: Concepts to Collaboration Tools

Authors:

Muneer Nusir

Abstract: The inception of digital services is succeeded with the myriad advancements in ICT that aim to support the growing needs of users and internet-enabled devices. The diversities of these functionalities and digital services are motivated by the presence of dynamic technologies, delivery channels, and diverse user needs in an internet-enabled environment. What appropriate instruments could help to support the collaborative design and create an environment characterized by active knowledge between providers of service and end-users of the service? The co-design is a well-known approach within the design community that utilizes advanced ideas and varied instruments of co-design. This study aimed is how to identify unmet requirements for Government to Citizen (G2C) e-service design and significant ways of achieving the requisite design needs using a suitable design process? Detailed interviews were undertaken with three groups of stakeholders in regards to the service design. This study analyses the data collected using an inductive thematic analysis to analyze qualitative data collected from study participants. This study also explores the patterns resulting from the G2C e-service design process and further establishes the interconnection between the processes in regards to fostering the effectiveness and efficiency of the services.
Download

Short Papers
Paper Nr: 2
Title:

The Economic Impact of Intellectual Property Management: Towards Model of Intellectual Property Management

Authors:

Tomasz Sierotowicz

Abstract: Subject literature indicates the International Business Machines (IBM) as the uninterrupted leader in the number of patents obtained from United States Patents and Trademarks Office (USPTO), out of all enterprises and industries for over 25 years. Since 1998, the IBM has conducted an internal business segment called Intellectual Property Management (IPM). This article presents results of two research goals of this study. The result of the first goal was to create an original design of the IPM model based on the IBM business experience. Given the interdependent environment of IBM, the complexity theory approach was used to achieve this goal. The second goal was to evaluate the economic profitability of activities included in the IPM segment, and their impact on the total income of the whole IBM enterprise, over the entire research period 1998-2018. The created design of IPM segment is a new and significant help for managers dealing with the complex issues of intellectual property, which allows to achieve economic profitability of IPM in the large enterprises. The final conclusion of results of the second goal indicated that out of all IPM activities only custom development of intellectual property was the only driver of profit increase in the IBM.
Download

Paper Nr: 7
Title:

Evaluating Self-Service BI and Analytics Tools for SMEs

Authors:

Antonio Oliveira and Jorge Bernardino

Abstract: In the vast Data Science domain, Business Intelligence (BI) and Data Analytics are two of the most relevant topics nowadays. Regardless of the data type an end-user needs to work on, data visualization and/or analytics can be a valuable support for a successful decision-making process in management. For that, free and open-source business intelligence and analytics solutions are on the market as an indispensable opportunity for companies to start benefiting from data analytics at no cost. In addition, that task has been currently eased by a group of BI and Analytics tools named as “Self-service”, which is an Advanced Analytics topic and designed to enable users with no IT background to perform analyses of data and find business opportunities themselves with minimal or no assistance from IT technicians. Considering that, to help Small and Medium-sized Enterprises (SMEs) decide on a free self-service data tool according to their needs, we compare in this paper, on a functionality basis, 5 popular Self-Service BI and Analytics tools: Metabase, Pentaho Community, Power BI Free, QlikView, and Tableau Public.
Download

Paper Nr: 15
Title:

Robotic Process Automation and Business Rules: A Perfect Match

Authors:

Abderrahmane Leshob, Maxime Bédard and Hafedh Mili

Abstract: Robotic Process Automation (RPA) is a new technology that uses software robots to perform certain tasks in business processes. These robots mimic how humans use software systems when performing repetitive tasks with “robotic” precision, thereby limiting errors and improving efficiency. RPA provides many benefits including increased productivity, better service quality, and decreased delivery time while automating business processes. However, there are several challenges in adopting RPA, the first and foremost of which is to identify the kinds of tasks that lend themselves to RPA. In this paper, we present a novel easy-to-use method that identifies the most suitable processes for RPA; as such, our method will help organizations to effectively adopt RPA. More precisely, this research proposes to compute an RPA score to assess if a process is suitable for RPA. Moreover, this paper aims to provide guidelines for RPA implementation. The novelty of this work is threefold: i) it uses an extensible classification of business rules to weight the RPA score, ii) It is usable and flexible (e.g., we can extend it to support Intelligent Digital Robots -RPA 2-), and iii) it automatically computes the RPA score using the Goal-Oriented Requirements Language (GRL) model evaluation.
Download

Paper Nr: 21
Title:

Data Lakes for Insurance Industry: Exploring Challenges and Opportunities for Customer Behaviour Analytics, Risk Assessment, and Industry Adoption

Authors:

Bálint Molnár, Galena Pisoni and Ádám Tarcsi

Abstract: The proliferation of the big data movement has led to volumes of data. The data explosion has surpassed enterprises’ ability to consume the various data types that may exist. This paper discusses the opportunities and challenges associated with implementing data lakes, a potential strategy for leveraging data as a strategic asset for enterprise decision-making. The paper analyzes an information ecosystem of an Insurance Company environment. There are two types of data sources, information systems based on a transactional databases for recording claims, as the basis of financial administration and systems policies. There exists neither Data Warehouse solutions nor any other data collection solutions dedicated to utilizing by Data Science methods and tools. The emerging technologies provide opportunities for synergy between the traditional Data Warehouse and the most recent Data Lake approaches. Therefore, it seems feasible and reasonable to integrate these two architecture approaches to support data analytics on several aspects of insurance, financial activities, risk analysis, prediction and forecasting.
Download

Paper Nr: 14
Title:

Correlation of Mission-critical System’s Goals and Activity Process Effectiveness with ‘Aeroflot Group’ Case

Authors:

A. Gromoff, K. Kedrolivanskaia and I. Kislyakov

Abstract: Today there is a certain problem of goal-articulation correctness and strategic management of big and mission-critical socio-technical systems (STS). The concept of “goal-setting vertical” is defined in the work. Semantic analysis of goal-setting vertical in the case of ‘Aeroflot Group’ with statistical study of practical dependence of regulatory mechanisms is provided. On that basis, the number of management conclusions and recommendations for mission-critical companies are formulated.

Area 2 - Collaboration and Interoperability

Short Papers
Paper Nr: 3
Title:

Approach to Cover the Interoperability Criterion in EIS: Application to Storage Bid-requests in the Big Data of the BPIS

Authors:

Khaoula Fatnassi, Sahbi Zahaf and Faïez Gargouri

Abstract: Enterprise Information System (EIS) must cover the interoperability criterion between its business and technical infrastructures. Nevertheless, the “vertical fit” problems, which has deduced from the business infrastructure handicap the exploitation of this criterion. To overcome this failure, we propose in this paper our solutions to reduce the gap between business and technical infrastructures of an EIS. Particularly, we describe our approach in three main phases: Business, Middle and Technical views, in order to cover the interoperability criterion between these infrastructures. We apply our contributions to storage bid-requests in the Big Data of the Bid Process Information System (BPIS).
Download

Area 3 - Technologies and Applications

Full Papers
Paper Nr: 9
Title:

Fair Exchange E-Commerce Protocol for Multi-Chained Complex Transactions

Authors:

Cătălin V. Bîrjoveanu and Mirela Bîrjoveanu

Abstract: In this paper, we introduce the concept of chained transaction as a transaction in which the customer obtains a physical product from a provider using one or more active intermediaries (brokers). Even if there are many multi-party fair exchange protocols with applications in buying digital or physical goods, digital signature of contracts and certified e-mail, no one can be used to solve our problem: complex transactions in which a customer wants to buy several physical products, where each product is acquired in a chained transaction, providing fair exchange. In this paper, we propose the first solution to the problem mentioned above. Our protocol is optimistic and provides fairness, timeliness, non-repudiation and confidentiality.
Download

Paper Nr: 16
Title:

Amalgamation of Fog Computing and Software Defined Networking in Healthcare 4.0: The Challenges, and a Way Forward

Authors:

Khushi Shah, Mohammad S. Obaidat, Preet Modi, Jitendra Bhatia, Sudeep Tanwar and Balqies Sadoun

Abstract: Rapid recent advances in automated data collection routines have led to a tsunami of health care oriented data stored in the distributed, heterogeneous, and a large databases. Healthcare is one of the pioneering fields that has started using Machine Learning (ML) and IoT (Internet of Things) for increasing life expectancies and decreasing death risks. Since then, major improvements are being witnessed for achieving real-time results and decreasing latency. This work attempts to provide an extensive and objective walkthrough in the direction of adoption of fog computing and software defined networking (SDN) framework for a huge data processing in healthcare domain. Both of these technologies, holds a great promise for the healthcare industry. In this paper, first of all, we survey various communication technologies involved in heathcare and also discuss the need of data processing and its security. Finally, we conclude with future research issues and challenges in this domain.
Download

Short Papers
Paper Nr: 12
Title:

A Content Protection Method That Allows Commissioning of Editing Control Processing to a Third Party using a Proxy Signature

Authors:

Tomohiro Kobayashi, Keiichi Iwamura and Masaki Inamura

Abstract: In consumer-generated media (CGM), it is important to promote secure content circulation. Content circulation includes the editing of content, and it is desirable for content to become more abundant and varied. For copyright protection suitable for CGM, a technology (K. Koga et al., 2015, T. Fujimoto et al., 2016) has been proposed that controls editing using digital signatures. We propose a method in which the author can securely provide individual editing permissions for content that has been editing-prohibited. this method offers a way to securely buy and sell the right to edit content in exchange for money. Therefore, this method is applicable to commercial content circulation. It is possible to promote content circulation while protecting the rights of the author by using the proposed method, even in scenarios where content circulation is stagnant with conventional methods.
Download