{"title":"Measuring the modeling complexity of microservice choreography and orchestration: The case of e-commerce applications","authors":"M. Ali, Razibul Hasan, M. Benyoucef","doi":"10.20381/RUOR-26658","DOIUrl":"https://doi.org/10.20381/RUOR-26658","url":null,"abstract":"With the increasing popularity of microservices for software application development, businesses are migrating from monolithic approaches towards more scalable and independently deployable applications using microservice architectures. Each microservice is designed to perform one single task. However, these microservices need to be composed together to communicate and deliver complex system functionalities. There are two major approaches to compose microservices, namely choreography and orchestration. Microservice compositions are mainly built around business functionalities, therefore businesses need to choose the right composition style that best serves their business needs. In this research, we follow a five-step process for conducting a Design Science Research (DSR) methodology to define, develop and evaluate BPMN-based models for microservice compositions. We design a series of BPMN workflows as the artifacts to investigate choreography and orchestration of microservices. The objective of this research is to compare the complexity of the two leading composition techniques on small, mid-sized, and end-to-end e-commerce scenarios, using complexity metrics from the software engineering and business process literature. More specifically, we use the metrics to assess the complexity of BPMN-based models representing the abovementioned e-commerce scenarios. An rely Zeebe Finally, we use the results of our to uncover insights on modeling microservice choreography and orchestration and discuss the impacts of complexity on the modifiability and understandability of the proposed models.","PeriodicalId":162341,"journal":{"name":"International Conference on Electronic Business","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124578626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Status Quo and Ethical Governance in Biometric in Mainland China","authors":"Xiaomei Zhai, Q. Renzong","doi":"10.1007/978-3-642-12595-9_17","DOIUrl":"https://doi.org/10.1007/978-3-642-12595-9_17","url":null,"abstract":"","PeriodicalId":162341,"journal":{"name":"International Conference on Electronic Business","volume":"18 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120913304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Creating Safe and Trusted Social Networks with Biometric User Authentication","authors":"Ho B. Chang, Klaus G. Schröter","doi":"10.1007/978-3-642-12595-9_12","DOIUrl":"https://doi.org/10.1007/978-3-642-12595-9_12","url":null,"abstract":"","PeriodicalId":162341,"journal":{"name":"International Conference on Electronic Business","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124114476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Unique ID Project in India: A Skeptical Note","authors":"R. Ramakumar","doi":"10.1007/978-3-642-12595-9_20","DOIUrl":"https://doi.org/10.1007/978-3-642-12595-9_20","url":null,"abstract":"","PeriodicalId":162341,"journal":{"name":"International Conference on Electronic Business","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126159030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Have a Safe Trip Global Mobility and Machine Readable Travel Documents: Experiences from Latin America and the Caribbean","authors":"Mia Harbitz, Dana King","doi":"10.1007/978-3-642-12595-9_7","DOIUrl":"https://doi.org/10.1007/978-3-642-12595-9_7","url":null,"abstract":"","PeriodicalId":162341,"journal":{"name":"International Conference on Electronic Business","volume":"214 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132270593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Dangers of Electronic Traces: Data Protection Challenges Presented by New Information Communication Technologies","authors":"Natasa Pirc Musar, Jelena Burnik","doi":"10.1007/978-3-642-12595-9_2","DOIUrl":"https://doi.org/10.1007/978-3-642-12595-9_2","url":null,"abstract":"","PeriodicalId":162341,"journal":{"name":"International Conference on Electronic Business","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126504367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Haricharan Rengamani, P. Kumaraguru, Rajarshi Chakraborty, H. Rao
{"title":"The Unique Identification Number Project: Challenges and Recommendations","authors":"Haricharan Rengamani, P. Kumaraguru, Rajarshi Chakraborty, H. Rao","doi":"10.1007/978-3-642-12595-9_19","DOIUrl":"https://doi.org/10.1007/978-3-642-12595-9_19","url":null,"abstract":"","PeriodicalId":162341,"journal":{"name":"International Conference on Electronic Business","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114811531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"From the Economics to the Behavioral Economics of Privacy: A Note","authors":"A. Acquisti","doi":"10.1007/978-3-642-12595-9_4","DOIUrl":"https://doi.org/10.1007/978-3-642-12595-9_4","url":null,"abstract":"","PeriodicalId":162341,"journal":{"name":"International Conference on Electronic Business","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123107835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Medical Safety Issues Concerning the Use of Incoherent Infrared Light in Biometrics","authors":"N. Kourkoumelis, M. Tzaphlidou","doi":"10.1007/978-3-642-12595-9_16","DOIUrl":"https://doi.org/10.1007/978-3-642-12595-9_16","url":null,"abstract":"","PeriodicalId":162341,"journal":{"name":"International Conference on Electronic Business","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129815507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}