Pub Date : 2023-01-01DOI: 10.1007/978-3-031-39386-0
{"title":"Enterprise Information Systems: 24th International Conference, ICEIS 2022, Virtual Event, April 25–27, 2022, Revised Selected Papers","authors":"","doi":"10.1007/978-3-031-39386-0","DOIUrl":"https://doi.org/10.1007/978-3-031-39386-0","url":null,"abstract":"","PeriodicalId":11750,"journal":{"name":"Enterprise Information Systems","volume":"43 4","pages":""},"PeriodicalIF":4.4,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50988072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1080/17517575.2021.1989494
Bokolo Anthony Jnr
{"title":"Distributed Ledger and Decentralised Technology Adoption for Smart Digital Transition in Collaborative Enterprise","authors":"Bokolo Anthony Jnr","doi":"10.1080/17517575.2021.1989494","DOIUrl":"https://doi.org/10.1080/17517575.2021.1989494","url":null,"abstract":"","PeriodicalId":11750,"journal":{"name":"Enterprise Information Systems","volume":"17 1","pages":""},"PeriodicalIF":4.4,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"60134638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1080/17517575.2021.1942997
Ignacio Fernandez De Arroyabe, J. C. F. D. Arroyabe
{"title":"The severity and effects of Cyber-breaches in SMEs: a machine learning approach","authors":"Ignacio Fernandez De Arroyabe, J. C. F. D. Arroyabe","doi":"10.1080/17517575.2021.1942997","DOIUrl":"https://doi.org/10.1080/17517575.2021.1942997","url":null,"abstract":"","PeriodicalId":11750,"journal":{"name":"Enterprise Information Systems","volume":"17 1","pages":""},"PeriodicalIF":4.4,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/17517575.2021.1942997","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"60134525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-02DOI: 10.1080/17517575.2021.2008513
Yang Lu
ABSTRACT Blockchain, as a distributed ledger and decentralized database, has the potential to form a secured system of value exchange. Due to its attractive features, blockchain has drawn a lot of attention. As the pioneer of blockchain, Bitcoin has been implemented for more than a decade, and it reflects high levels of stability and reliability. It is foreseeable that blockchain will be implemented and applied to daily activities among institutions, businesses, and personnel. We conduct a study consisting of operating mechanisms, core technologies, research directions, applications, and drawbacks. This paper links that research to blockchain-based information systems.
{"title":"Implementing blockchain in information systems: a review","authors":"Yang Lu","doi":"10.1080/17517575.2021.2008513","DOIUrl":"https://doi.org/10.1080/17517575.2021.2008513","url":null,"abstract":"ABSTRACT Blockchain, as a distributed ledger and decentralized database, has the potential to form a secured system of value exchange. Due to its attractive features, blockchain has drawn a lot of attention. As the pioneer of blockchain, Bitcoin has been implemented for more than a decade, and it reflects high levels of stability and reliability. It is foreseeable that blockchain will be implemented and applied to daily activities among institutions, businesses, and personnel. We conduct a study consisting of operating mechanisms, core technologies, research directions, applications, and drawbacks. This paper links that research to blockchain-based information systems.","PeriodicalId":11750,"journal":{"name":"Enterprise Information Systems","volume":" ","pages":""},"PeriodicalIF":4.4,"publicationDate":"2022-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47338769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-09DOI: 10.1080/17517575.2022.2142854
Masataka Nakahara, Norihiro Okui, Yasuaki Kobayashi, Yutaka Miyake, A. Kubota
ABSTRACT For the security of IoT devices, the number and type of devices are generally large, so it is important to collect data efficiently and detect threats in a lightweight way. In this paper, we propose the architecture for malware detection, a method to detect malware using flow information, and a method to decrease the amount of transmission data between the servers in this architecture. We evaluate the performance of malware detection and the amount of data before and after the data reduction. And show that the performance of malware detection is maintained even though the amount of data is reduced.
{"title":"Malware detection for IoT devices using hybrid system of whitelist and machine learning based on lightweight flow data","authors":"Masataka Nakahara, Norihiro Okui, Yasuaki Kobayashi, Yutaka Miyake, A. Kubota","doi":"10.1080/17517575.2022.2142854","DOIUrl":"https://doi.org/10.1080/17517575.2022.2142854","url":null,"abstract":"ABSTRACT For the security of IoT devices, the number and type of devices are generally large, so it is important to collect data efficiently and detect threats in a lightweight way. In this paper, we propose the architecture for malware detection, a method to detect malware using flow information, and a method to decrease the amount of transmission data between the servers in this architecture. We evaluate the performance of malware detection and the amount of data before and after the data reduction. And show that the performance of malware detection is maintained even though the amount of data is reduced.","PeriodicalId":11750,"journal":{"name":"Enterprise Information Systems","volume":" ","pages":""},"PeriodicalIF":4.4,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45747338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-01DOI: 10.1080/17517575.2022.2095535
Ling Li
Industry 4.0 was initially introduced during the Hannover Fair in 2011. In 2013, it was officially announced as a German strategic initiative to take a pioneering role in industries currently revolutionising the manufacturing sector. Industrie 4.0, also called Industry 4.0, symbolises the beginning of the Fourth Industrial Revolution. Industry 4.0 represents the current trend of automation technologies in the manufacturing industry, and it mainly includes enabling technologies such as the cyber-physical systems (CPS), Internet of Things (IoT), and cloud computing (Gorkhali 2022; Karnik et al. 2022; Li 2020; Li & Zhou, 2021; Sigov et al. 2022; Xu 2020). Various technologies can be used to implement Industry 4.0. These technologies include CPS, IoT, cloud computing, industrial information integration, and blockchain technology. World Economic Forum (2015) predicted that by 2027 10% of global GDP will be stored on blockchain technology. In recent years, the interest in studying the role to be played by blockchain in the manufacturing sector has been increasing. As a result, some companies have started integrating the blockchain concept into manufacturing practices (Gorkhali, Li, Shrestha 2020; Xu, Lu, and Li 2021). Potential applications of blockchain in Industry 4.0 include promoting resilience, scalability, security, and autonomy, as well as the usage of blockchain to timestamp sensor data. According to a recent study, Industry 4.0 and blockchain will significantly impact future enterprise information systems. This special issue (SI) aims to allow researchers and practitioners to share the most recent advances in Industry 4.0-related blockchain technologies from enterprise information systems perspectives. To foster a coherent, cumulative body of knowledge regarding blockchain technology in Industry 4.0, this SI presents eight articles authored by scholars from China, Hungary, Thailand, the US, and other countries. In addition, all authors were asked to respond to at least two rounds of peer review to prepare for this issue. In the paper entitled ‘Building trust of Blockchain-based Internet-of-Thing services using public key infrastructure’, Viriyasitavat et al. (2022) introduce a generic architecture design that incorporates Public Key Infrastructure (PKI) to establish the trust in BIoT services. In the paper entitled ‘A novel service level agreement model using blockchain and smart contract for cloud manufacturing in industry 4.0’, Tan et al. (2021) proposed a method to facilitate data security. Szabó, Ternai, and Fodor (2022), in their paper entitled ‘Affordances in blockchain-based financial recommendations concerned with life events and personalities’, aim to discover affordances in blockchain when designing an AI-based financial recommendation system as a decision support system. Bi et al. (2022), in their paper ‘Security and safety assurance of collaborative manufacturing in industry 4.0’, considered that Industry 4.0 provides an ideal plat
工业4.0最初是在2011年汉诺威工业博览会期间推出的。2013年,它被正式宣布为德国的一项战略举措,旨在引领当前制造业革命的行业。工业4.0,也被称为工业4.0,象征着第四次工业革命的开始。工业4.0代表了制造业自动化技术的当前趋势,主要包括网络物理系统(CPS)、物联网(IoT)和云计算等使能技术(Gorkhali 2022;Karnik et al. 2022;李2020年;Li & Zhou, 2021;Sigov et al. 2022;徐2020)。多种技术可用于实现工业4.0。这些技术包括CPS、物联网、云计算、工业信息集成、区块链技术等。世界经济论坛(2015)预测,到2027年,全球GDP的10%将存储在区块链技术上。近年来,研究bb0在制造业中所扮演的角色的兴趣越来越大。因此,一些公司已经开始将区块链概念整合到制造实践中(Gorkhali, Li, Shrestha 2020;Xu, Lu, and Li 2021)。区块链在工业4.0中的潜在应用包括提高弹性、可扩展性、安全性和自主性,以及使用区块链对传感器数据进行时间戳。根据最近的一项研究,工业4.0和区块链将对未来的企业信息系统产生重大影响。本期特刊(SI)旨在让研究人员和从业者从企业信息系统的角度分享与工业4.0相关的区块链技术的最新进展。为了建立一个关于工业4.0区块链技术的连贯、累积的知识体系,本SI提供了来自中国、匈牙利、泰国、美国和其他国家的学者撰写的八篇文章。此外,所有作者都被要求对至少两轮同行评议做出回应,为本期做准备。在题为“使用公钥基础设施构建基于区块链的物联网服务的信任”的论文中,Viriyasitavat等人(2022)介绍了一种通用架构设计,该设计结合了公钥基础设施(PKI)来建立对BIoT服务的信任。在题为“工业4.0中使用区块链和智能合约的新型服务水平协议模型”的论文中,Tan等人(2021)提出了一种促进数据安全的方法。Szabó, Ternai和Fodor(2022)在他们题为“与生活事件和个性有关的基于区块链的金融建议中的能力”的论文中,旨在在设计基于人工智能的金融推荐系统作为决策支持系统时发现区块链中的能力。Bi等人(2022)在其论文《工业4.0中协同制造的安全和安全保障》中认为,工业4.0提供了一个理想的平台,支持人和机器的直接交互,以适应系统运行中的变化和不确定性。在题为“区块链技术-近期研究和未来趋势”(Zheng and Lu 2021)的论文中,作者介绍了区块链的未来研究方向。在企业信息系统2022,VOL. 16, NO. 1。12, 1733-1735 https://doi.org/10.1080/17517575.2022.2095535
{"title":"Blockchain technology in industry 4.0","authors":"Ling Li","doi":"10.1080/17517575.2022.2095535","DOIUrl":"https://doi.org/10.1080/17517575.2022.2095535","url":null,"abstract":"Industry 4.0 was initially introduced during the Hannover Fair in 2011. In 2013, it was officially announced as a German strategic initiative to take a pioneering role in industries currently revolutionising the manufacturing sector. Industrie 4.0, also called Industry 4.0, symbolises the beginning of the Fourth Industrial Revolution. Industry 4.0 represents the current trend of automation technologies in the manufacturing industry, and it mainly includes enabling technologies such as the cyber-physical systems (CPS), Internet of Things (IoT), and cloud computing (Gorkhali 2022; Karnik et al. 2022; Li 2020; Li & Zhou, 2021; Sigov et al. 2022; Xu 2020). Various technologies can be used to implement Industry 4.0. These technologies include CPS, IoT, cloud computing, industrial information integration, and blockchain technology. World Economic Forum (2015) predicted that by 2027 10% of global GDP will be stored on blockchain technology. In recent years, the interest in studying the role to be played by blockchain in the manufacturing sector has been increasing. As a result, some companies have started integrating the blockchain concept into manufacturing practices (Gorkhali, Li, Shrestha 2020; Xu, Lu, and Li 2021). Potential applications of blockchain in Industry 4.0 include promoting resilience, scalability, security, and autonomy, as well as the usage of blockchain to timestamp sensor data. According to a recent study, Industry 4.0 and blockchain will significantly impact future enterprise information systems. This special issue (SI) aims to allow researchers and practitioners to share the most recent advances in Industry 4.0-related blockchain technologies from enterprise information systems perspectives. To foster a coherent, cumulative body of knowledge regarding blockchain technology in Industry 4.0, this SI presents eight articles authored by scholars from China, Hungary, Thailand, the US, and other countries. In addition, all authors were asked to respond to at least two rounds of peer review to prepare for this issue. In the paper entitled ‘Building trust of Blockchain-based Internet-of-Thing services using public key infrastructure’, Viriyasitavat et al. (2022) introduce a generic architecture design that incorporates Public Key Infrastructure (PKI) to establish the trust in BIoT services. In the paper entitled ‘A novel service level agreement model using blockchain and smart contract for cloud manufacturing in industry 4.0’, Tan et al. (2021) proposed a method to facilitate data security. Szabó, Ternai, and Fodor (2022), in their paper entitled ‘Affordances in blockchain-based financial recommendations concerned with life events and personalities’, aim to discover affordances in blockchain when designing an AI-based financial recommendation system as a decision support system. Bi et al. (2022), in their paper ‘Security and safety assurance of collaborative manufacturing in industry 4.0’, considered that Industry 4.0 provides an ideal plat","PeriodicalId":11750,"journal":{"name":"Enterprise Information Systems","volume":" ","pages":""},"PeriodicalIF":4.4,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42233791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-10DOI: 10.1080/17517575.2022.2130014
C. Greco, G. Fortino, B. Crispo, K. Choo
ABSTRACT Internet of Things (IoT) is gaining importance as its applications are found in many critical infrastructure sectors (e.g., Industry 4.0, healthcare, transportation, and commercial facilities). This reinforces the importance of investigating the security risks associated with IoT deployment. Hence, in this paper, we perform a comprehensive review of the literature on penetration testing of IoT devices and systems. Specifically, a total of 99 articles published between 2015 and 2021 was reviewed to identify existing and potential IoT penetration testing applications and proposed approaches. We finally provide recent advances of AI-enabled penetration testing methods that can notably be performed at the network edge.
{"title":"AI-enabled IoT penetration testing: state-of-the-art and research challenges","authors":"C. Greco, G. Fortino, B. Crispo, K. Choo","doi":"10.1080/17517575.2022.2130014","DOIUrl":"https://doi.org/10.1080/17517575.2022.2130014","url":null,"abstract":"ABSTRACT Internet of Things (IoT) is gaining importance as its applications are found in many critical infrastructure sectors (e.g., Industry 4.0, healthcare, transportation, and commercial facilities). This reinforces the importance of investigating the security risks associated with IoT deployment. Hence, in this paper, we perform a comprehensive review of the literature on penetration testing of IoT devices and systems. Specifically, a total of 99 articles published between 2015 and 2021 was reviewed to identify existing and potential IoT penetration testing applications and proposed approaches. We finally provide recent advances of AI-enabled penetration testing methods that can notably be performed at the network edge.","PeriodicalId":11750,"journal":{"name":"Enterprise Information Systems","volume":" ","pages":""},"PeriodicalIF":4.4,"publicationDate":"2022-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48545830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-07DOI: 10.1080/17517575.2022.2130013
Victor Chang, Yeqing Mou, Qi Xu, Yue Xu
ABSTRACT This paper proposes that high value on the work-life balance, compensation, career opportunity and fitness of culture and management style would improve job satisfaction. A turnover risk prediction model based on the random forest is constructed to understand the turnover risk feature and identify risk. Using a sample of 17,724 online reviews of employees from Glassdoor, the positive effect of antecedents, the job satisfaction variable as a mediator, and the unemployment rate variable as a moderator is verified. Finally, job satisfaction is identified as the most important feature for predicting turnover based on the random forest algorithm.
{"title":"Job satisfaction and turnover decision of employees in the Internet sector in the US","authors":"Victor Chang, Yeqing Mou, Qi Xu, Yue Xu","doi":"10.1080/17517575.2022.2130013","DOIUrl":"https://doi.org/10.1080/17517575.2022.2130013","url":null,"abstract":"ABSTRACT This paper proposes that high value on the work-life balance, compensation, career opportunity and fitness of culture and management style would improve job satisfaction. A turnover risk prediction model based on the random forest is constructed to understand the turnover risk feature and identify risk. Using a sample of 17,724 online reviews of employees from Glassdoor, the positive effect of antecedents, the job satisfaction variable as a mediator, and the unemployment rate variable as a moderator is verified. Finally, job satisfaction is identified as the most important feature for predicting turnover based on the random forest algorithm.","PeriodicalId":11750,"journal":{"name":"Enterprise Information Systems","volume":" ","pages":""},"PeriodicalIF":4.4,"publicationDate":"2022-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44701066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-05DOI: 10.1080/17517575.2022.2130012
Juling Ding, Maowei Xu, Y. K. Tse, Kuo-Yi Lin, Minhao Zhang
ABSTRACT Social media has emerged as a vital tool to advance two-way communication between companies and customers. This paper uses 29,764 tweets to investigate a sustainability fraud crisis, the Volkswagen emissions scandal. We provide a Tweet Analytic Framework comprising three approaches: cluster analysis, sentiment analysis, and time series analysis. This paper explores public opinions regarding the Volkswagen emissions scandal in two stages and reveals the typical crisis development trend, the strong condemnation and negative sentiment, and significant public concerns. This paper can yield important insights for understanding how customers’ opinions change, thereby improving the effectiveness of managing sustainability fraud crises.
{"title":"Customer opinions mining through social media: insights from sustainability fraud crisis - Volkswagen emissions scandal","authors":"Juling Ding, Maowei Xu, Y. K. Tse, Kuo-Yi Lin, Minhao Zhang","doi":"10.1080/17517575.2022.2130012","DOIUrl":"https://doi.org/10.1080/17517575.2022.2130012","url":null,"abstract":"ABSTRACT Social media has emerged as a vital tool to advance two-way communication between companies and customers. This paper uses 29,764 tweets to investigate a sustainability fraud crisis, the Volkswagen emissions scandal. We provide a Tweet Analytic Framework comprising three approaches: cluster analysis, sentiment analysis, and time series analysis. This paper explores public opinions regarding the Volkswagen emissions scandal in two stages and reveals the typical crisis development trend, the strong condemnation and negative sentiment, and significant public concerns. This paper can yield important insights for understanding how customers’ opinions change, thereby improving the effectiveness of managing sustainability fraud crises.","PeriodicalId":11750,"journal":{"name":"Enterprise Information Systems","volume":" ","pages":""},"PeriodicalIF":4.4,"publicationDate":"2022-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45444999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-29DOI: 10.1080/17517575.2022.2101025
Kusum Yadav, Elham Kariri, Shoayee Alotaibi, W. Viriyasitavat, G. Dhiman, Amandeep Kaur
ABSTRACT Laws and regulations for privacy protection have been promulgated one after another, and the phenomenon of data islands has become a significant bottleneck hindering the development of big data and artificial intelligence technologies. From the perspective of the historical development, concepts, and architecture classification of federated learning, the technical advantages of federated learning are explained using Internet of Things. Simultaneously, numerous attack methods and classifications of federated learning systems are examined, as well as the distinctions between different federated learning encryption algorithms. Finally, it reviews research in the subject of federal learning privacy protection and security mechanisms, as well as identifies difficulties and opportunities.
{"title":"Privacy protection against attack scenario of federated learning using internet of things","authors":"Kusum Yadav, Elham Kariri, Shoayee Alotaibi, W. Viriyasitavat, G. Dhiman, Amandeep Kaur","doi":"10.1080/17517575.2022.2101025","DOIUrl":"https://doi.org/10.1080/17517575.2022.2101025","url":null,"abstract":"ABSTRACT Laws and regulations for privacy protection have been promulgated one after another, and the phenomenon of data islands has become a significant bottleneck hindering the development of big data and artificial intelligence technologies. From the perspective of the historical development, concepts, and architecture classification of federated learning, the technical advantages of federated learning are explained using Internet of Things. Simultaneously, numerous attack methods and classifications of federated learning systems are examined, as well as the distinctions between different federated learning encryption algorithms. Finally, it reviews research in the subject of federal learning privacy protection and security mechanisms, as well as identifies difficulties and opportunities.","PeriodicalId":11750,"journal":{"name":"Enterprise Information Systems","volume":" ","pages":""},"PeriodicalIF":4.4,"publicationDate":"2022-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48024107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}