{"title":"Converting Manufacturing Companies into Data-Driven Enterprises: an Evaluation of the Transformation Model","authors":"V. Mezhuyev, Martin Tschandl, M. Mayr","doi":"10.1145/3477911.3477924","DOIUrl":"https://doi.org/10.1145/3477911.3477924","url":null,"abstract":"Several approaches can be found in the literature to describe the transformation of companies into data-driven enterprises. A comparative framework was set up to objectively evaluate such transformation models As an additional result, a new model was derived, in which six steps were finally included: Research and Preparation, Digital Maturity Level Assessment, Target Definition, Gap Analysis, Identifying Measures and Implementation. This paper concentrates on the validation of the proposed model by an expert panel. Through the responses of 20 experts, potential strengths and weaknesses were revealed and analyzed using statistical methods. In summary, the expert attitude towards the proposed model was supportive throughout all evaluation dimensions. Thus, this work provides executives of manufacturing companies with a roadmap to plan and to perform a transformation into a data-driven enterprise. A direction for further research would be an adaptation of the proposed general model to the specific needs of manufacturing companies.","PeriodicalId":174824,"journal":{"name":"Proceedings of the 2021 7th International Conference on Computer Technology Applications","volume":"216 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115468638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design Workflows and Algorithm Diagrams Interpretation Method in Software Development","authors":"N. Voit, S. Bochkov, Sergey Kirillov, M. Ukhanova","doi":"10.1145/3477911.3477916","DOIUrl":"https://doi.org/10.1145/3477911.3477916","url":null,"abstract":"One of the challenges of the modern business process management theory is that it lacks a formal method for analyzing the design workflows and algorithms presented based on the graphic languages, which could have linear computational complexity and take into account the concept of \"time\". The authors present an automated method for interpreting the design workflows in the software development field. The method is based on the temporal automaton RVTI-grammar, which takes into account the \"time\" and \"clock\" concepts. It differs from the existing methods in a linear design workflows interpretation time based on the visual language and allows for a finite time to perform step-by-step workflow analysis, represented in the form of algorithm diagrams. An example of such a diagram in the EPC language is given, its step-by-step interpretation is described.","PeriodicalId":174824,"journal":{"name":"Proceedings of the 2021 7th International Conference on Computer Technology Applications","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115882144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shatadru Shikta, Somania Nur Mahal, Kazi Bushra Al Jannat, Mahady Hasan, M. Rokonuzzaman
{"title":"Behavioral Economics Issues for Software Requirements Optimization for Personal Data Security and Privacy","authors":"Shatadru Shikta, Somania Nur Mahal, Kazi Bushra Al Jannat, Mahady Hasan, M. Rokonuzzaman","doi":"10.1145/3477911.3477918","DOIUrl":"https://doi.org/10.1145/3477911.3477918","url":null,"abstract":"The effects of psychological, cognitive, emotional, cultural and social factors on the decisions of users and service providers for online service delivery are important factors to take into consideration in designing software applications. Increasing preference of online service delivery is also raising concerns about personal data security and privacy. Hence, there is a need for optimally trading off ease of use and extra measures for ensuring data privacy and security issues. Within this context, behavioral economics is one of the major factors in determining outcomes and successes of underlying software applications. Although much research done on behavioral economics separately, however, behavioral economics is mostly unexplored in the field of software requirements engineering process. With the growing needs of personal data security and privacy concerns, the software community needs to adapt it to software requirements optimization to incorporate and prioritize requirements related to personal data security and privacy. In this study, our main objective is to explore the behavioral economics issues towards data security and privacy and adapt them into the software requirement process. We have proposed a score-based framework. The ultimate goal of this framework is to help companies maximize the benefit and minimize the cost of software products while adapting the data security and privacy requirements in the requirement engineering process.","PeriodicalId":174824,"journal":{"name":"Proceedings of the 2021 7th International Conference on Computer Technology Applications","volume":"3 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115903001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sergi Batalla Martinez, Daniela Wilfinger, Martin Tschandl
{"title":"Integrated Planning of Operating Expenditures (OPEX) - A model to apply best practices when running ERP and DWH systems","authors":"Sergi Batalla Martinez, Daniela Wilfinger, Martin Tschandl","doi":"10.1145/3477911.3477926","DOIUrl":"https://doi.org/10.1145/3477911.3477926","url":null,"abstract":"Controlling departments are confronted with complex and time-consuming OPEX (Operating expenses) planning processes several times a financial year. Medium-sized enterprises and (multinational) corporations usually use Enterprise Resource Planning (ERP) and Data Warehouse (DWH) systems to support, integrate and automate their business processes. ERP and DWH provide a wide range of functionality and features to support planning processes, however since OPEX planning processes are often complex and problematic, it can be challenging to decide which planning activities should be performed in the ERP and which in the DWH system. This paper proposes a model to identify for each one of the main planning activities, when they should be carried out into the ERP system or in DWH according to best practices. First, the OPEX planning process is analyzed in detail, identifying the main phases and activities and revealing inefficiencies. Then, the purposes and best practices related to ERP and DWH systems will be reviewed and outlined. Thereafter, we will formulate our model detailing the best practice for each concerned planning task. The model subsequently developed describes in detail the best practices for each planning task concerned. Finally, this model is applied to a real use case in the context of SAP S/4HANA as ERP system and BW/4HANA as DWH system. This paper is aimed at controllers and their finance and controlling departments, as well as IT-ERP and DWH consultants involved in business planning processes.","PeriodicalId":174824,"journal":{"name":"Proceedings of the 2021 7th International Conference on Computer Technology Applications","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115337631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
David Eneko Ruiz de Gauna, E. Irigoyen, Iñaki Cejudo, Harbil Arregui, P. Leskovský, O. Otaegui
{"title":"Video Analytics Architecture with Metadata Event-Engine for Urban Safe Cities","authors":"David Eneko Ruiz de Gauna, E. Irigoyen, Iñaki Cejudo, Harbil Arregui, P. Leskovský, O. Otaegui","doi":"10.1145/3477911.3477919","DOIUrl":"https://doi.org/10.1145/3477911.3477919","url":null,"abstract":"Intelligent video analysis from sources such as urban surveillance cameras is a prolific research area today. Multiple types of computer architectures offer a wide range of possibilities when addressing the needs of computer vision technologies. When it comes to real time processing for high level and complex event detections, however, some limitations may arise, such as the computing power in the edge or the cost of sending real time video to the cloud for running advanced algorithms. In this paper, we present a functional architecture of a complete video surveillance solution and we focus on the metadata-processing event engine which takes care of the high-level video processing that is decoupled from a low-level video analysis. The low-level video analysis running in the edge generates and publishes a flow of JSON messages structure containing the details of bounding boxes detected in each frame into an asynchronous messaging service. The metadata event engine is running in a remote cloud, far from the camera locations. We present the performance evaluation of this event engine under different circumstances simulating data coming simultaneously from multiple cameras, in order to study the best strategies when deploying and partitioning distributed processing tasks.","PeriodicalId":174824,"journal":{"name":"Proceedings of the 2021 7th International Conference on Computer Technology Applications","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115099384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Khalimov, Y. Kotukh, I. Didmanidze, Svitlana Khalimova
{"title":"Encryption scheme based on small Ree groups","authors":"G. Khalimov, Y. Kotukh, I. Didmanidze, Svitlana Khalimova","doi":"10.1145/3477911.3477917","DOIUrl":"https://doi.org/10.1145/3477911.3477917","url":null,"abstract":"The article describes an encryption scheme based on the small Ree groups. Our proposal is to use the small Ree group that improved security parameters of the encryption scheme in general. We extended the logarithmic signature to the entire group and got changed the encryption algorithm to protect against a sequential key recovery attack.","PeriodicalId":174824,"journal":{"name":"Proceedings of the 2021 7th International Conference on Computer Technology Applications","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130135438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How changing API terms changed Instagram's domain? A bibliometric analysis","authors":"R. Hartman, T. Šímová","doi":"10.1145/3477911.3477923","DOIUrl":"https://doi.org/10.1145/3477911.3477923","url":null,"abstract":"In 2018 Facebook blocked a public Application Programming Interfaces (API) that could be used to download data from Facebook and Instagram. Much uncertainty still exists about the effect on social media research due to changes in Instagram API conditions. The presented paper provides an overview of the Instagram domain in terms of a research area. The main focus of this research is on the comparison of the key topics before and after the change of the Instagram API terms (comparing Instagram's research domain before and after 2018). A partial goal was to find out how the change in the conditions of the Instagram API has changed the number of social media research itself. We used a bibliometric approach to map the domain of Instagram. The paper has identified key topics in the domain of Instagram. Between the years 2010 and 2018 the key topics were gender, behavior on social media, dissemination of information, and platform selection. After the change of Instagram API conditions, after 2018, the key topics were gratifications, body image, dissatisfaction, and basic Instagram topics. The paper has found that generally, there was no change in research topics, nor the number of papers published after the Instagram API condition. Further study should focus on establish the relationships between Instagram use and psychological well-being; investigate the motives for Instagram use a study the effect of Instagram API on research with the use of different methods; gaining a better understanding of social media consumer activity; establish whatever our key topics are relevant to other social media platforms (Facebook, Twitter or Tiktok); study Instagram domain on different citation databases (e.g., in Scopus). This paper has also raised important questions about whether the Instagram API should be or should not be open for research purposes.","PeriodicalId":174824,"journal":{"name":"Proceedings of the 2021 7th International Conference on Computer Technology Applications","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128096156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}