Data collection and provisioning, horizontal and vertical integration, cloud computing, big data analytics, mobile and social technologies, IoT (Internet of Things) are some of the essential components of the fourth industrial revolution. The synergy between cloud technologies and mobile applications globally changes every aspect of how organizations work today. This change has never been so tangible and fast. Mobile devices and sensors, cloud technologies and geographical information systems are digital technologies - factors in Industry 4.0. Natural disaster data acquisition through mobile units and sensors via internet, data management and data analysis are targets, which will be solve by digital technologies and system integration. The survey suggests an approach to management natural disaster and crisis, interoperability with existing IT systems, and decision support.
{"title":"Digital technologies of industry 4.0 in management of natural disasters","authors":"K. Schwertner, P. Zlateva, D. Velev","doi":"10.1145/3234781.3234798","DOIUrl":"https://doi.org/10.1145/3234781.3234798","url":null,"abstract":"Data collection and provisioning, horizontal and vertical integration, cloud computing, big data analytics, mobile and social technologies, IoT (Internet of Things) are some of the essential components of the fourth industrial revolution. The synergy between cloud technologies and mobile applications globally changes every aspect of how organizations work today. This change has never been so tangible and fast. Mobile devices and sensors, cloud technologies and geographical information systems are digital technologies - factors in Industry 4.0. Natural disaster data acquisition through mobile units and sensors via internet, data management and data analysis are targets, which will be solve by digital technologies and system integration. The survey suggests an approach to management natural disaster and crisis, interoperability with existing IT systems, and decision support.","PeriodicalId":386149,"journal":{"name":"ICEEG '18","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116614659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As mobile internet is currently proliferating, multi-sided platform operators such as Google and Apple mediating transactions between customer groups play a major role in forming market environment. In this regard, traditional tools of evaluating market dominance are required to reflect features of multi-sided platforms. Thus, existing judging factors of assessment of market dominant position such as market share and entry barrier should be modified to fit in with multi-sided platform market. In addition, special features of multi-sided platform market such as indirect network effects, multi-homing, dynamic innovation should be considered. The Korea Fair Trade Commission (hereafter the KFTC) and Korean courts heavily rely on market share based on the provision of presumption of market dominant position in evaluating market dominant power. However, there are some cases reflecting features of multi-sided platforms such as indirect network effect multi-homing and market dominance leveraging theory. As multi-sided platform business is developing continuously, competition authorities and courts are required to mirror changing market environment to secure fair competition and consumer welfare. Furthermore, as the importance of personal customer data with regards to market dominance leveraging phenomenon is increasing, market dominant power of platform operators should be examined more comprehensively.
{"title":"Rethinking modes of evaluation of market dominant power for multi-sided platforms","authors":"Sung Yoon Yang","doi":"10.1145/3234781.3234799","DOIUrl":"https://doi.org/10.1145/3234781.3234799","url":null,"abstract":"As mobile internet is currently proliferating, multi-sided platform operators such as Google and Apple mediating transactions between customer groups play a major role in forming market environment. In this regard, traditional tools of evaluating market dominance are required to reflect features of multi-sided platforms. Thus, existing judging factors of assessment of market dominant position such as market share and entry barrier should be modified to fit in with multi-sided platform market. In addition, special features of multi-sided platform market such as indirect network effects, multi-homing, dynamic innovation should be considered. The Korea Fair Trade Commission (hereafter the KFTC) and Korean courts heavily rely on market share based on the provision of presumption of market dominant position in evaluating market dominant power. However, there are some cases reflecting features of multi-sided platforms such as indirect network effect multi-homing and market dominance leveraging theory. As multi-sided platform business is developing continuously, competition authorities and courts are required to mirror changing market environment to secure fair competition and consumer welfare. Furthermore, as the importance of personal customer data with regards to market dominance leveraging phenomenon is increasing, market dominant power of platform operators should be examined more comprehensively.","PeriodicalId":386149,"journal":{"name":"ICEEG '18","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121767665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Daniel W. K. Tse, H. Yuen, Qiran He, Chaoya Wang, Jiheng Yu
The cloud computing has been widely in on-demand-and-sharing service economy and has become a hotspot in recent years especially in the IT industry which really lead to some changes in human's daily life. However, many users and researchers believed that the information security is the most significant challenge in cloud computing. Therefore, this paper aims to discover the threats and vulnerabilities of the cloud storage which is the most common application originating from the cloud computing. This research utilized a quantitative approach and all qualified respondents were asked to complete an online questionnaire. The result shows that (1) Data loss and leakage is the biggest threat in using cloud storage application (2) Abuse use of cloud computational resources is the most severe impact in cloud storage application (3) Respondents with different backgrounds have the different perspectives towards the cloud service (4) The countermeasures to minimize the security vulnerability are flexibility in choosing the protective measures, strengthen the infrastructure, improve the password authentication and strengthen the authorization.
{"title":"The security vulnerabilities of on-demand and sharing economy","authors":"Daniel W. K. Tse, H. Yuen, Qiran He, Chaoya Wang, Jiheng Yu","doi":"10.1145/3234781.3234787","DOIUrl":"https://doi.org/10.1145/3234781.3234787","url":null,"abstract":"The cloud computing has been widely in on-demand-and-sharing service economy and has become a hotspot in recent years especially in the IT industry which really lead to some changes in human's daily life. However, many users and researchers believed that the information security is the most significant challenge in cloud computing. Therefore, this paper aims to discover the threats and vulnerabilities of the cloud storage which is the most common application originating from the cloud computing. This research utilized a quantitative approach and all qualified respondents were asked to complete an online questionnaire. The result shows that (1) Data loss and leakage is the biggest threat in using cloud storage application (2) Abuse use of cloud computational resources is the most severe impact in cloud storage application (3) Respondents with different backgrounds have the different perspectives towards the cloud service (4) The countermeasures to minimize the security vulnerability are flexibility in choosing the protective measures, strengthen the infrastructure, improve the password authentication and strengthen the authorization.","PeriodicalId":386149,"journal":{"name":"ICEEG '18","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115562036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
[Objective] This study aims to explore the influence of on-line second-hand housing online attention, distance to subway and length of construction on the offline viewing of second-hand houses by consumers, and provide guidance for the second-hand housing marketing of real estate agen cy websites. [Method] Based on the data of second-hand house in 2505 Beijing and 2343 Chengdu areas in Chain House, the linear regression model combined with behavioral decision-making theory was used to verify the online attention, the distance to the subway and the construction time. Impact. [Conclusion] The second-hand housing online second-hand housing online attention to the distance to the subway and the length of construction will have a significant impact on consumer choice offline showings. Therefore, the real estate agency website in the display of second-hand housing information should try to show such information to attract consumers offline view second-hand housing listings.
{"title":"Study on the impact of secondhand house online information on consumers' online viewing","authors":"Fu He, Yixi Li, Lu Zhu","doi":"10.1145/3234781.3234785","DOIUrl":"https://doi.org/10.1145/3234781.3234785","url":null,"abstract":"[Objective] This study aims to explore the influence of on-line second-hand housing online attention, distance to subway and length of construction on the offline viewing of second-hand houses by consumers, and provide guidance for the second-hand housing marketing of real estate agen cy websites. [Method] Based on the data of second-hand house in 2505 Beijing and 2343 Chengdu areas in Chain House, the linear regression model combined with behavioral decision-making theory was used to verify the online attention, the distance to the subway and the construction time. Impact. [Conclusion] The second-hand housing online second-hand housing online attention to the distance to the subway and the length of construction will have a significant impact on consumer choice offline showings. Therefore, the real estate agency website in the display of second-hand housing information should try to show such information to attract consumers offline view second-hand housing listings.","PeriodicalId":386149,"journal":{"name":"ICEEG '18","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125309121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Philippine Data Privacy Act of 2012 (DPA of 2012) defined the rights of Filipino citizens to data privacy and created the National Privacy Commission to monitor compliance, by both public agencies and private organizations, to the said law to ensure data protection and rights of privacy of its citizens. This study aims to explore and explain why and how public universities of the Philippines, with the Caraga State University as the subject, would comply with DPA of 2012. Using a single case holistic design with common rationale, and pattern matching as an analytic technique as adapted by Yin's method and design. This study has shown that the e-Commerce Act, another law legislated previously, is a moderating factor in compliance with the Data Privacy Act, and that general deterrence and legitimacy of regulations has a compelling casual effect on complying with the DPA of 2012. Factors such as (1) lack of awareness, (2) lack of resources, and (3) low priority in the agenda are found to be critical factors in complying with DPA of 2012. It was also found that the Caraga State University is only partially compliant (Medium-High) to the provisions of DPA 2012.
2012年菲律宾数据隐私法(DPA of 2012)定义了菲律宾公民的数据隐私权利,并成立了国家隐私委员会,以监督公共机构和私人组织对上述法律的遵守情况,以确保其公民的数据保护和隐私权。本研究旨在探讨和解释菲律宾的公立大学,以卡拉加州立大学为对象,为什么以及如何遵守2012年的DPA。采用基于共同原理的单一案例整体设计,并将模式匹配作为一种分析技术,适应了尹的方法和设计。这项研究表明,之前制定的另一项法律“电子商务法”是遵守“数据隐私法”的调节因素,并且法规的一般威慑和合法性对遵守2012年DPA具有令人信服的偶然影响。(1)缺乏意识,(2)缺乏资源,(3)议程中的低优先级等因素被发现是遵守2012年DPA的关键因素。还发现卡拉加州立大学仅部分符合DPA 2012的规定(中高)。
{"title":"Assessing compliance of Philippine state universities to the data privacy act of 2012: the case of Caraga State University","authors":"J. Presbitero, M. Ching","doi":"10.1145/3234781.3234800","DOIUrl":"https://doi.org/10.1145/3234781.3234800","url":null,"abstract":"The Philippine Data Privacy Act of 2012 (DPA of 2012) defined the rights of Filipino citizens to data privacy and created the National Privacy Commission to monitor compliance, by both public agencies and private organizations, to the said law to ensure data protection and rights of privacy of its citizens. This study aims to explore and explain why and how public universities of the Philippines, with the Caraga State University as the subject, would comply with DPA of 2012. Using a single case holistic design with common rationale, and pattern matching as an analytic technique as adapted by Yin's method and design. This study has shown that the e-Commerce Act, another law legislated previously, is a moderating factor in compliance with the Data Privacy Act, and that general deterrence and legitimacy of regulations has a compelling casual effect on complying with the DPA of 2012. Factors such as (1) lack of awareness, (2) lack of resources, and (3) low priority in the agenda are found to be critical factors in complying with DPA of 2012. It was also found that the Caraga State University is only partially compliant (Medium-High) to the provisions of DPA 2012.","PeriodicalId":386149,"journal":{"name":"ICEEG '18","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125462473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This study explored the innovation value chain in Solen Electric's product integration services case study to better understand the impact of information system implementation. This study uses a case study method and collects secondary data to understand the impact of the introduction of information systems during 2013--2014. This study found that product integration services and collaborative design method are valuable and analyze the innovation value chain on a case. Finally, this study proposes Key success factors for Solen electric company. Moreover, the study identifies practical implications and proposes practical suggestions for government policy and Small and medium-sized enterprises.
{"title":"The impact of information system implement on innovation value chain: a case study of solen electric company's product integration services","authors":"Yao-Chin Lin, Ching-Chuan Yeh, Wei-Hung Chen","doi":"10.1145/3234781.3234797","DOIUrl":"https://doi.org/10.1145/3234781.3234797","url":null,"abstract":"This study explored the innovation value chain in Solen Electric's product integration services case study to better understand the impact of information system implementation. This study uses a case study method and collects secondary data to understand the impact of the introduction of information systems during 2013--2014. This study found that product integration services and collaborative design method are valuable and analyze the innovation value chain on a case. Finally, this study proposes Key success factors for Solen electric company. Moreover, the study identifies practical implications and proposes practical suggestions for government policy and Small and medium-sized enterprises.","PeriodicalId":386149,"journal":{"name":"ICEEG '18","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122018974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Network effects are one of the defining properties of the digital economy. It has been shown, both in theory and practice, that network effects contribute to the growth and potential success of businesses in the digital economy. In this paper, we present a quantitative case study of network effects in Facebook for the period 2011 to 2017. We estimate the value of Facebook, and analyse how this value depends on the number of Facebook users. Our results show that there are strong network effects in Facebook, as the value per user increases more than estimations obtained from Metcalfe's law. We also outline a general theory of the strength of network effects, and quantitatively estimate the strength of network effects in Facebook.
{"title":"Network effects in Facebook","authors":"H. Øverby","doi":"10.1145/3234781.3234782","DOIUrl":"https://doi.org/10.1145/3234781.3234782","url":null,"abstract":"Network effects are one of the defining properties of the digital economy. It has been shown, both in theory and practice, that network effects contribute to the growth and potential success of businesses in the digital economy. In this paper, we present a quantitative case study of network effects in Facebook for the period 2011 to 2017. We estimate the value of Facebook, and analyse how this value depends on the number of Facebook users. Our results show that there are strong network effects in Facebook, as the value per user increases more than estimations obtained from Metcalfe's law. We also outline a general theory of the strength of network effects, and quantitatively estimate the strength of network effects in Facebook.","PeriodicalId":386149,"journal":{"name":"ICEEG '18","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126347118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anestia Hayubriandini Fermay, B. Santosa, Amanda Yudisia Kertopati, Ilma Meidira Eprianto
This paper aims to explore any possibilities or any chance the happening collaborative and disruptive between financial technology (Fintech) and bank with the focus on Peer to Peer (P2P) model. We describe how financial innovations P2P model may have the possibility to disturb the financial system and analyze the collaborative model between bank and Fintech in Indonesia. The method of this study is literature review in which we combine the theoretical perspective, lesson learned from some countries and Indonesia's experience. We find that the collaboration model is feasible with some requirement.
{"title":"The development of collaborative model between fintech and bank in Indonesia","authors":"Anestia Hayubriandini Fermay, B. Santosa, Amanda Yudisia Kertopati, Ilma Meidira Eprianto","doi":"10.1145/3234781.3234783","DOIUrl":"https://doi.org/10.1145/3234781.3234783","url":null,"abstract":"This paper aims to explore any possibilities or any chance the happening collaborative and disruptive between financial technology (Fintech) and bank with the focus on Peer to Peer (P2P) model. We describe how financial innovations P2P model may have the possibility to disturb the financial system and analyze the collaborative model between bank and Fintech in Indonesia. The method of this study is literature review in which we combine the theoretical perspective, lesson learned from some countries and Indonesia's experience. We find that the collaboration model is feasible with some requirement.","PeriodicalId":386149,"journal":{"name":"ICEEG '18","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127059153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The "Data Privacy Act of 2012" also known as the Republic Act No. 10173 of the Philippines aims to safeguard the personal data of its citizens, this gave rise to the creation of the National Privacy Commission (NPC) in 2015 and this agency is tasked to oversee and enforce the DPA of 2012. This case study aims to explore and understand the underpinning reasons on how the Department of Health (DOH) will comply with RA 10173 and to identify the challenges and determinants to success of the DOH relative to compliance. The research will implore (Yin, 2014) case study method that uses single case holistic design with common rationale and pattern matching for its analytics. This study uses the e-Commerce Act as the moderating variable with DPA 2012 and the determinants of compliance are deterrence, legitimacy and moral obligation. Also, the challenges that were identified in the research were the lack of awareness, budget priorities, and human capital capacity.
{"title":"Performance compliance of Philippine national government agency on the data privacy act of 2012: a qualitative case study","authors":"Erwin Carlo Gonzales, M. Ching","doi":"10.1145/3234781.3234792","DOIUrl":"https://doi.org/10.1145/3234781.3234792","url":null,"abstract":"The \"Data Privacy Act of 2012\" also known as the Republic Act No. 10173 of the Philippines aims to safeguard the personal data of its citizens, this gave rise to the creation of the National Privacy Commission (NPC) in 2015 and this agency is tasked to oversee and enforce the DPA of 2012. This case study aims to explore and understand the underpinning reasons on how the Department of Health (DOH) will comply with RA 10173 and to identify the challenges and determinants to success of the DOH relative to compliance. The research will implore (Yin, 2014) case study method that uses single case holistic design with common rationale and pattern matching for its analytics. This study uses the e-Commerce Act as the moderating variable with DPA 2012 and the determinants of compliance are deterrence, legitimacy and moral obligation. Also, the challenges that were identified in the research were the lack of awareness, budget priorities, and human capital capacity.","PeriodicalId":386149,"journal":{"name":"ICEEG '18","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127059967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}