{"title":"The Impact of Blockchain on the Auditor's Audit Approach","authors":"Eric Mantelaers, M. Zoet, K. Smit","doi":"10.1145/3374549.3374551","DOIUrl":"https://doi.org/10.1145/3374549.3374551","url":null,"abstract":"The current standard in accounting practice is the double-entry approach. Basis of the double-entry approach is that every financial event brings two equal and offsetting entries. Since these financial events are not automatically confirmed by both parties, the accounting quality can be improved. The blockchain mechanism possibly offers a different take on accounting. Based on an experimentation approach, data was collected to compare the double-entry method with the blockchain-based triple-entry method. The results show that the main difference concerns determining the completeness of the financial statement items. In the situation of double-entry accounting, segregation of duties is applied to do so. In the blockchain situation, the underlying mechanism of the blockchain already ensures this.","PeriodicalId":187087,"journal":{"name":"Proceedings of the 2019 3rd International Conference on Software and e-Business","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133810665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yao Song, Y. Luximon, Benny D. Leong, Zhenzhen Qin
{"title":"The E-Commerce Performance of Internet of Things (IoT) in Disruptive Innovation: Case of XiaoMi","authors":"Yao Song, Y. Luximon, Benny D. Leong, Zhenzhen Qin","doi":"10.1145/3374549.3374557","DOIUrl":"https://doi.org/10.1145/3374549.3374557","url":null,"abstract":"Disruptive innovation theory is a technological innovation and strategic management theory. After achieving mobile market success through e-commerce, XiaoMi, one of the largest e-commerce companies in China, also began to adopt disruptive innovation technologies into IoT (\"Internet of Things\") platform and IoT hardware, also achieving huge success in the IoT hardware industry. This paper aims to discuss the value of IoT strategy in XiaoMi e-commerce performance from the disruptive innovation perspective and to empirically show the effect of IoT strategy on XiaoMi's e-commerce performance from a disruptive innovation perspective. Results showed, compared with XiaoMi's internet service business, XiaoMi IoT related business contributes significantly to XiaoMi's business performance although the XiaoMi smartphone business still played a dominant role in XiaoMi's overall e-commerce performance.","PeriodicalId":187087,"journal":{"name":"Proceedings of the 2019 3rd International Conference on Software and e-Business","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121375514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study of Data Mining Methods for Identification Undernutrition and Overnutrition in Obesity","authors":"Tamara Michelle Mulyono, F. Natalia, S. Sudirman","doi":"10.1145/3374549.3374565","DOIUrl":"https://doi.org/10.1145/3374549.3374565","url":null,"abstract":"Indonesia is currently experiencing the Double Burden Nutrition problem. This is a problem when a significant proportion of the population is endangerd with the problem of malnutrition, but a significant other suffer from obesity or over-nutrition. People who are underweight, overweight, and obesity are included in the ten risks in terms of the global disease burden. In 2015 showing that the adult population in the world is overweight, with 38% of men and 40% of women. This study aims to detect over nutrition, undernutrition in obese sufferers to determine their nutritional status with 24 hours food recall method for assessing their consumption and using data mining algorithms, namely: K-Nearest Neighbor, Naïve Bayesian Classification, and Decision Tree for data mining calculations. From the results obtained with the help of RapidMiner tools, it can be concluded that not all obese sufferers are over nutritioned, they can also experience undernutrition or normal nutrition. From the results of this study, the best accuracy for calculating nutritional status is using the Naïve Bayesian Classification algorithm with an accuracy rate of 100 %, then the Decision Tree with an accuracy rate of 86.67% and the last is K-Nearest Neighbor with an accuracy rate of 73.33%.","PeriodicalId":187087,"journal":{"name":"Proceedings of the 2019 3rd International Conference on Software and e-Business","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116415272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Test Case Generation from BPMN with DMN","authors":"Boodsarin Boonmepipit, T. Suwannasart","doi":"10.1145/3374549.3374582","DOIUrl":"https://doi.org/10.1145/3374549.3374582","url":null,"abstract":"Business Process Model and Notation (BPMN) is applied to manage business processes. Currently, business processes are becoming more complex with increasing conditions. As a result, it is highly difficult to manage activities and decision-making in business processes. However, BPMN still cannot handle the decision-making in business processes. Object management group (OMG) created Decision Model and Notation (DMN) to complement BPMN and to manage the decision-making of business processes. In software development process, creating a business process model can occur earlier during requirement gathering. However, a tester can generate test cases to verify accuracy of information in the business process. Previously, many researchers have focused on BPMN test cases generation. None of their studies has been conducted on the creation of BPMN test cases with DMN. Consequently, this paper proposes an approach to generate test cases from BPMN with DMN. BPMN along with DMN, paths traverse from the entry to the exit of the BPMN, and existing test cases are inputs of our approach. BPMN, DMN, and existing test cases are analyzed to check whether they cover all rules in the DMN. In case that all rules are not covered, new test cases will be generated. This paper proposes an approach to generate test cases cover all rules in the DMN to effective monitoring BPMN with DMN. This approach is used to check the rules within the DMN decision table without affecting BPMN process. It ensures the business processes are implemented correctly.","PeriodicalId":187087,"journal":{"name":"Proceedings of the 2019 3rd International Conference on Software and e-Business","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114550107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Let's Do Feature Driven Scrum","authors":"M. Mirza, Atchyutha Veni Choday, Soma Datta","doi":"10.1145/3374549.3374573","DOIUrl":"https://doi.org/10.1145/3374549.3374573","url":null,"abstract":"Agile manifestos are used in the software industry and now it has expanded into the education, teaching, and workspace environment. Agile development methodology is currently being tested in certain non-software systems. It supports better organization and rapid feedback for the users that can be acted upon or modified. Our study presents an amalgamation of Feature Driven Development and Scrum methodologies from Agile into a new ensemble method \"Feature Driven Scrum.\" This ensemble method is implemented in an online study group and an educational workspace environment. The results indicate that Agile goes well in an educational workspace but there are some shortcomings when Agile is used in an online study group.","PeriodicalId":187087,"journal":{"name":"Proceedings of the 2019 3rd International Conference on Software and e-Business","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123468782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Transforming YAWL Workflows with Time Constraints to Generalized Stochastic Petri Nets","authors":"Supattra Boonyawat, W. Vatanawood","doi":"10.1145/3374549.3374564","DOIUrl":"https://doi.org/10.1145/3374549.3374564","url":null,"abstract":"YAWL is a workflow language for creating workflow and used to describe and animate the designated business processes. In this paper, we extend the time duration to several essential task related YAWL symbols as the representation of the average time used in order to enable the quantitative analysis of the time forecasting in business processes. A set of mapping rules are formally defined to transform a particular YAWL with time constraints into a generalized stochastic Petri nets which can analyze the quantitative time performance of each task in the business process. We demonstrate the construction of the reachability graph of the resulting GSPN as the state space of the business process. A Markovian graph is then isomorphically generated with the exponential probability distribution matrix for the final time forecasting analysis.","PeriodicalId":187087,"journal":{"name":"Proceedings of the 2019 3rd International Conference on Software and e-Business","volume":"170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121345186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Formal Modeling of Multi-Server Queuing Network Using Stochastic Petri Nets","authors":"Pimporn Boon-in, W. Vatanawood","doi":"10.1145/3374549.3374563","DOIUrl":"https://doi.org/10.1145/3374549.3374563","url":null,"abstract":"Queuing network systems formally provide an extensive high-level model to assist in analyzing performance of incoming customer availability and service resources. The business process designer could adjust the queuing network constructs to cope with the time constraints in random manners. We aim at formalizing stochastic queues with multiple servers in this paper and constructing them into a complex multi-server queuing network system. Service time random behaviors are considered and transformed into Stochastic Petri Nets. A set of mapping rules are defined to transform a given multi-server queuing network into Stochastic Petri Nets. We demonstrate the construction of the isomorphic Markovian graph with the probability distribution of the queuing network.","PeriodicalId":187087,"journal":{"name":"Proceedings of the 2019 3rd International Conference on Software and e-Business","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128400113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Derick Lyle D. Ancheta, Leynard Jay C. Bautista, Ayana Victoria H. Estrada, G. L. Intal
{"title":"EyEstate","authors":"Derick Lyle D. Ancheta, Leynard Jay C. Bautista, Ayana Victoria H. Estrada, G. L. Intal","doi":"10.1145/3374549.3374580","DOIUrl":"https://doi.org/10.1145/3374549.3374580","url":null,"abstract":"Virtual tours are used in industries like tourism and hotels in order to attract clients. It can be beneficial for the real estate industry to make use of this technology in conducting demonstration and presentation to their clients. Client relations management is important in any types of industry, and in real estate, managing a client becomes extremely difficult since purchasing real estate is a big investment on the client's part. The study aims to help the real estate industry in the monitoring needs of sales agents and brokers during the sales process and provide a tool for offsite property demonstration that visually engages a client. It also aims to match the demands of real estate property via the different demographic factors based on current client property purchases.","PeriodicalId":187087,"journal":{"name":"Proceedings of the 2019 3rd International Conference on Software and e-Business","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130135555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Construct a Three-Stage Analysis Model of Integrated Main Path Analysis and Patent Family-Exploring the Development of Blockchain","authors":"Fang-Pei Su, Shujen Chen, Yu-Hsin Chang, K. Lai","doi":"10.1145/3374549.3374583","DOIUrl":"https://doi.org/10.1145/3374549.3374583","url":null,"abstract":"Regarding the evolution of technology, many scholars have used patent citations, main path analysis and other methods to explore their development path ([1];[2]). These methods, however, are mostly external perspective of the company, which are the self-citing or mutual citation of the patent literature in essence, focusing on analyzing the evolutionary path of the past and the present. This paper proposes a three-stage analysis model of Integrated Main Path analysis and Patent Family (IMP&PF) by connecting with the internal strategic management perspective of the company's technology R&D. Firstly, establishing a research dataset is according to the research purpose; secondly, integrating the main path analysis method is based on patent citation, and find out the direction of dominant technical knowledge flow in the industry, as well as know well the assignees of the key patented technologies; and then analyze the patent families of the assignees, in order to gain insight into the strategic intent of their patent portfolio and consider these patents as potential candidates for standard essential patents (SEP). This method takes the developing technology of blockchain as the research target. Through the mutual verification of the analysis of results and market information, it can be found that this method can explain the development of the technology-driven market. With the analysis method proposed in this paper, emerging technology investors can apply to predict the patent portfolio intention and technology development direction of critical technology leaders, and then to decide how their companies' technical resources are invested when they with mature technology companies can think about how to make breadth of applications or even different industry alliances.","PeriodicalId":187087,"journal":{"name":"Proceedings of the 2019 3rd International Conference on Software and e-Business","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116674417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Asset Management System using NFC and IoT Technologies","authors":"K. Saraubon, Panurut Chinakul, Rittinan Chanpen","doi":"10.1145/3374549.3374558","DOIUrl":"https://doi.org/10.1145/3374549.3374558","url":null,"abstract":"Asset management is essential since it helps an organization track and manage its assets using a systemized approach. Asset management software has been adopted in many organizations these days, but there are some problems with the procedures which lead to inaccurate asset recording. This paper presents an asset management system using NFC and IoT technologies. The system allows asset officers to track and update asset information using NFC-enabled and non-NFC Android devices under the Internet and non-Internet modes. Available asset tagging includes QR codes, numbers and NFC tags. A low-cost IoT-based NFC reader/writer was implemented and used as a companion module working with non-NFC Android devices.","PeriodicalId":187087,"journal":{"name":"Proceedings of the 2019 3rd International Conference on Software and e-Business","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125073633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}