Skip to main content

Über dieses Buch

This book constitutes the refereed proceedings of the 12th IFIP WG 8.9 Working Conference on Research and Practical Issues of Enterprise Information Systems, CONFENIS 2018, held as part of the World Computer Congress, WCC 2018, in Poznan, Poland, in September 2018.

The 12 full papers presented in this volume were carefully reviewed and selected from 28 submissions. They were organized in topical sections named: EIS management and case studies; data management and applications for EIS; collaborative and social interaction; and data access, security, and privacy.



EIS Management and Case Studies


Enterprise Information Management in Cultural Heritage Domain

The aim of this paper is to present the complexity of information management in cultural heritage domain on the basis of real-life examples of distributed research infrastructures for the arts and humanities. The digitisation of cultural heritage artefacts is a process that is ongoing for many years in institutions all over the world and generates increasing amount of digital information. This generates challenges on the level of particular institutions which are holding heritage collections, but also on the national and international level, where such information is combined to provide end users unified access to distributed heritage datasets. The paper presents the flow of cultural heritage information from the level of a single institution up to pan-European data platform via the level of regional and national cultural heritage data services. It is based on experiences of Poznań Supercomputing and Networking Center collected during the last 15+ years of involvement in the development of cultural heritage network services on all these levels.
Cezary Mazurek, Marcin Werla

Designing a Technical Debt Visualization Tool to Improve Stakeholder Communication in the Decision-Making Process: A Case Study

Technical debt is the release of immature software to meet time to market. In large complex companies, technical dept drives IT decision, even when participants in the decision-making process do not realize it. In this paper, we propose technical debt visualizations that can serve as a communication platform between different stakeholders. We conducted a case study in a large multi-industry state-owned company that faces significant challenges due to global digital transformation, its rigid control structures, and external pressures for cost reduction and investment optimization. In this study, we designed and evaluated technical debt visualizations to get feedback concerning its usefulness and ease its future acceptance. The results from this case study show that technical debt visualizations were considered useful for decision-making processes associated with software life cycle, especially for executives, business managers, software product owners, architects and project managers.
Alexia Pacheco, Gabriela Marín-Raventós, Gustavo López

Facebook Posts Engagement Analysis – Case Study of the Leading e-Shop in the Czech Republic

This study examines shopping behavior and customers’ interests based on analysis of the content of Facebook posts. Identifies types of the post which are more likely to inspire purchase. Two main methods were used: a content analysis of posts on a Facebook page connected with data from marketing department and statistical analysis of these data. Posts were categorized by selected quantitative and qualitative criteria. Four research questions were selected, all hypotheses were evaluated by ANOVA and regression analysis. Findings: the relation between posts’ reactions on Facebook and revenues was not confirmed. Some relation between negative reactions and visits was found. The more negative reactions the more visits with quite high probability according to calculated correlation. Positive reactions do not correlate significantly with the number of visits. In case of a number of posts in categories dependence, a number of functional brand posts are dependent on the number of experiential brand posts and a number of sales promotion posts are dependent on the number of functional brand posts. Implications: Improve targeted advertising, carefully watch what types of post publish on social media, focus also on types of posts like employee, cause-related, experiential and customer relationship that should be used more and possibly combined with functional and emotional types of posts and watch out for positive and/or negative reactions more according to the results.
Antonin Pavlicek, Petr Doucek, Richard Novák

Data Management and Applications for EIS


A Cost-Effective Data Replica Placement Strategy Based on Hybrid Genetic Algorithm for Cloud Services

Cloud computing provide an efficient big data processing platform for many small and medium scale enterprises, how to replicate and allocate data in clouds is a critical problem influencing cost consumption for small and medium scale enterprises. Cloud data management systems mainly serve two kinds of workloads, one is read-intensive analytical workloads (e.g. OLAP), the other is write-intensive transactional workloads (e.g. OLTP). It is essential to minimize data management costs like storage, communication bandwidth, update and power with guaranteeing the service level agreements. Toward two workloads, a cost-effective data replica placement approach for minimizing data management costs on cloud computing centers is proposed. The definition of different data management costs is identified first, then we construct the cost optimization model of the data replica placement problem. The paper proposes a hybrid genetic algorithm and a data support-based initialization method that addresses the problem. Experiments show that the approach result in significant reduction in total data management cost and the algorithm is with good performance.
Xin Huang, Feng Wu

Analysis of Industry 4.0 Readiness Indexes and Maturity Models and Proposal of the Dimension for Enterprise Information Systems

The article deals with the analysis of available readiness indexes and maturity models for Industry 4.0. The main goal is to determine the extent to which these models and indexes are able to show a company’s readiness from the point of view of its information system. Because this topic is not sufficiently dealt with in the available models there is a proposal focusing on the enterprise information system in the conclusion of this article.
Josef Basl

The Penetration of ICT into the Economy—Technical Infrastructure in the V4 Countries

This article deals with the integration of information technology tools and services into the economies of European countries and compares the degrees to which ICT has penetrated into their economies and societies. Our evaluation of the penetration of ICT into economies within this article works primarily from the standpoint of infrastructure-services penetration. These services are today typically expressed through computer-network connection speeds. For our comparison of the nations of Europe, and of the V4 nations, we utilized public, open data for 2010–2014 provided by various institutions. These include primarily Eurostat, the Office of the European Union, the World Bank, and the Czech Statistical Office. In terms of methodology, the multi-criteria TOPSIS analysis method is used for comparison. A comparison of the penetration of technological infrastructure into the V4 countries between 2010 and 2014 and a comparison of them with the EU average is provided at the end of the article.
Petr Doucek, Martina Kuncová, Lea Nedomová

Collaborative and Social Interaction


Raising Students’ Cognitive Engagement Intention in a Preliminary IS Course Using Gamification

This paper guides factors influencing undergraduate students’ cognitive engagement intention, using activities in the preliminary Information Systems (IS) course as the gamified settings. A simple process, using student-led activities, to implement gamification in educational environments, is described. A research model, consisting of game elements, perceived game usefulness, attitude towards the course, and cognitive engagement intention, is proposed. The main objectives are to examine the impact of these factors on students’ cognitive engagement intention. Data are collected using questionnaires. The model is statistically tested using structure equation modeling. The results show that game elements directly and indirectly affect cognitive engagement intention. Student’s attitude towards the course, which is strongly influenced by perceived game usefulness, is also important to raise their cognitive engagement.
Mathupayas Thongmak

Understanding Enterprise Architects: Different Enterprise Architect Behavioral Styles

Enterprise Architecture (EA) is an emerging field that focuses on the establishment of a conceptual blueprint that describes the structure and operation of an organization. The purpose is to enable the organization to strategically make decisions on the future state of the organization. Enterprise architects play a key role in the establishment of the EA, even though there are different views of what EA is and how the organization can establish the EA using EA frameworks. In this paper we focused on the different behavioral styles used by enterprise architects in the organization, which enable us to understand the role that EA plays in the organization and shed light on why EA is often executed differently within organizations. Nine behavioral styles are identified by focusing on the roles and competencies of enterprise architects.
Jaco Du Preez, Alta Van der Merwe, Machdel Matthee

Equity Crowdfunding: Quality Signals for Online-Platform Projects and Supporters’ Motivations

The paper assesses and evaluates quality signals for online platform projects and motivations for equity crowdfunding which might increase a potential supporter’s propensity to commit his financial resources. Based on a literature analysis a number of motives that may have an effect on the investment decision and other non-motivational dimensions are taken into account as they might convey information about the underlying and often not directly observable qualitative characteristics of the business.
Benjamin Buerger, Andreas Mladenow, Niina Maarit Novak, Christine Strauss

Data Access, Security and Privacy


The Design of an Identity and Access Management Assurance Dashboard Model

Executives overseeing Identity and Access Management (IAM) solutions of enterprise information systems have to manage problematic issues at business, technology and governance levels and their related trade-offs. They are required to make informed investment decisions about technology in a complex, ever changing world. The IAM assurance dashboard model proposed by this research provides a comprehensive view of identity and access management components at an executive level. By revealing the current status of the IAM environment within an enterprise, strategic identity and access decisions are possible based on compliance with IAM requirements. The IAM assurance dashboard model gives the current state of an enterprise’s IAM status, based on evaluation criteria such as hot spots, maturity, technology gaps and compliance. The SABSA model supports the design of the IAM assurance dashboard which is business requirements driven, to address the needs of executives.
Ferdinand Damon, Marijke Coetzee

A New Schema for Securing Data Warehouse Hosted in the Cloud

Cloud computing is a new model in which computing infrastructure resources are provided as a service over the internet. Data owners can outsource their data in the cloud and benefit from on-demand high quality services. However, because cloud services and data owners are not in the same trusted domain, the outsourced data may be at risk. Therefore, data security is of critical importance in such a scenario. As a solution to this problem, data owners encrypt data before sending it to the cloud to ensure data confidentiality and cloud services decrypt it when processing queries. Such a scenario is not a suitable solution to data warehouse because of the large mass of data that will be processed. For that, this paper proposes a new schema based on the sample privacy homomorphism presented in [1]. This new schema improves the security of data warehouse hosted in the cloud, reduces storage space and processes encrypted data with minimum time complexity.
Kawthar Karkouda, Ahlem Nabli, Faiez Gargouri

Business Process-Based Legitimacy of Data Access Framework for Enterprise Information Systems Protection

Nowadays European context is introducing a new directive for data protection, which imposes new constraints to business owners which manipulate personal data. Among imposed constraints, we find that while a disclosure occurs on user’s personal data, the burden of proof is now in the charge of business owners. In this context, data access has to be managed according to what is mentioned in Terms of Service and logged in a way to prove the occurrence of a disclosure or not. This work, part of Personal Information Controller Service project proposes a data-driven privacy control system, based on Collaborative Usage Control (CUCON), allows organizations to manage the access authorizations they provide to stakeholders. The proposed system intervenes in two contexts, which are ad-hoc business processes and while using big data techniques. In fact, new data usage introduces changes in usage-based models since used systems are usually distributed and involving several organizations which can have different definitions for a given role. This framework manages the consistency between already allowed data access rights and potential given rights to a given business stakeholder according to business process’s activity affected to him/her. It also warns when a conflict occurs and when the aggregation of the rights granted to a given stakeholder lead to having rights to a sensitive data.
Hind Benfenatki, Frédérique Biennier


Weitere Informationen

Premium Partner