Pub Date : 2021-12-31DOI: 10.7250/csimq.2021-29.02
C. Voigt, Jonas Kötter, Natallia Kukharenka
The COVID-19 pandemic and measures to contain it pushed many universities to switch to online learning in the spring of 2020. The changes took place very quickly and it became clear that the long-term consequences of such a transformation are uncertain and require more detailed study. This research attempts to analyze the impact of online learning on study success. This research makes use of a triangulation with quantitative and qualitative methods. Quantitatively, it contains path diagram with various factors that have an impact on the study success at a German university, which is based on a quantitative online survey with 1.529 participants. Qualitatively, 49 interviews were analyzed in order to identify reasons for the risk of failing to achieve study success. The relevance of technology becomes evident in the quantitative analysis, as it manifests itself in almost all categories that affect study success. Moreover, a new influencing factor appeared, the “adaption to digital teaching”, which was often considered important qualitatively.
{"title":"An Empirical Research on Study Success in Times of COVID-19 Pandemic - a Case Study","authors":"C. Voigt, Jonas Kötter, Natallia Kukharenka","doi":"10.7250/csimq.2021-29.02","DOIUrl":"https://doi.org/10.7250/csimq.2021-29.02","url":null,"abstract":"The COVID-19 pandemic and measures to contain it pushed many universities to switch to online learning in the spring of 2020. The changes took place very quickly and it became clear that the long-term consequences of such a transformation are uncertain and require more detailed study. This research attempts to analyze the impact of online learning on study success. This research makes use of a triangulation with quantitative and qualitative methods. Quantitatively, it contains path diagram with various factors that have an impact on the study success at a German university, which is based on a quantitative online survey with 1.529 participants. Qualitatively, 49 interviews were analyzed in order to identify reasons for the risk of failing to achieve study success. The relevance of technology becomes evident in the quantitative analysis, as it manifests itself in almost all categories that affect study success. Moreover, a new influencing factor appeared, the “adaption to digital teaching”, which was often considered important qualitatively.","PeriodicalId":416219,"journal":{"name":"Complex Syst. Informatics Model. Q.","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128185304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-31DOI: 10.7250/csimq.2021-28.02
T. Weiß, Susanne Strahringer
The publication discusses the adaptation of dedicated known methods for structured content analysis for the usage of smartphone apps, taking into account the specifics of these dynamic media types and resulting consequences for the procedure and content rating. The background is the increasing popularity of apps and the growing demand for precise analysis of the status quo regarding the content and functions of apps on the market, esp. within design-oriented business informatics. Within the literature, no uniform, comparable and systematic approach to this could be identified so far. Therefore, an existing standard for the evaluation of apps from the medical context has been adapted for general application to apps. This provides a helpful procedure for researchers, practitioners, and students and ensures consistency across studies. The feasibility of the proposed method and assessment standard were confirmed by a successful demonstrational instantiation based on an app review of energy information systems for private customers.
{"title":"Development and Demonstrational Instantiation of a Method for the Structured Content Analysis of Smartphone Apps","authors":"T. Weiß, Susanne Strahringer","doi":"10.7250/csimq.2021-28.02","DOIUrl":"https://doi.org/10.7250/csimq.2021-28.02","url":null,"abstract":"The publication discusses the adaptation of dedicated known methods for structured content analysis for the usage of smartphone apps, taking into account the specifics of these dynamic media types and resulting consequences for the procedure and content rating. The background is the increasing popularity of apps and the growing demand for precise analysis of the status quo regarding the content and functions of apps on the market, esp. within design-oriented business informatics. Within the literature, no uniform, comparable and systematic approach to this could be identified so far. Therefore, an existing standard for the evaluation of apps from the medical context has been adapted for general application to apps. This provides a helpful procedure for researchers, practitioners, and students and ensures consistency across studies. The feasibility of the proposed method and assessment standard were confirmed by a successful demonstrational instantiation based on an app review of energy information systems for private customers.","PeriodicalId":416219,"journal":{"name":"Complex Syst. Informatics Model. Q.","volume":"300 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123125869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-31DOI: 10.7250/csimq.2021-28.03
Janis Bauvars
Technological advancements are often adopted to financial markets to improve their operations and safety. Blockchain technology has been recognized as one of the potential technologies to be utilized in capital markets. The goal of this article is to evaluate the applicability of using the blockchain technology in securities settlement process. First, the theoretical background of blockchain technology is reviewed and the current financial market infrastructure is examined. Then Central Securities Depositories Regulation and the current securities settlement processes are examined. Blockchain applicability framework designed by Gourisetti, Mylrea and Patangia is applied to assess the blockchain technology’s applicability to securities settlement. The results suggest that blockchain technology can be applied to securities settlement, and the used blockchain type should be a private blockchain with Proof-of-Authority consensus mechanism. A blockchain architecture model, based on a model provided by Zhuang, Chen, Shae and Shyu, and potential node structure for securities settlement are developed, taking into account the existing literature on blockchain technology, financial markets, and Central Securities Depositories Regulation. The proposed blockchain architecture model and node structure are then evaluated against scholar expected benefits and drawbacks of using blockchain for securities settlement and cross-border settlement efficiency. The evaluation reveals that the proposed blockchain technology model can potentially improve some of the current securities settlement issues, such as costly reconciliation and difficult cross-border securities settlement. At the same time, using blockchain technology in securities settlement would be challenging because the practical implementation time would be long and would require market-wide commitment. The main artefacts of this article are the proposed blockchain architecture model and node structure that would allow securities settlement processes to be executed using blockchain technology.
{"title":"Applicability of Blockchain Technology in Securities Settlement","authors":"Janis Bauvars","doi":"10.7250/csimq.2021-28.03","DOIUrl":"https://doi.org/10.7250/csimq.2021-28.03","url":null,"abstract":"Technological advancements are often adopted to financial markets to improve their operations and safety. Blockchain technology has been recognized as one of the potential technologies to be utilized in capital markets. The goal of this article is to evaluate the applicability of using the blockchain technology in securities settlement process. First, the theoretical background of blockchain technology is reviewed and the current financial market infrastructure is examined. Then Central Securities Depositories Regulation and the current securities settlement processes are examined. Blockchain applicability framework designed by Gourisetti, Mylrea and Patangia is applied to assess the blockchain technology’s applicability to securities settlement. The results suggest that blockchain technology can be applied to securities settlement, and the used blockchain type should be a private blockchain with Proof-of-Authority consensus mechanism. A blockchain architecture model, based on a model provided by Zhuang, Chen, Shae and Shyu, and potential node structure for securities settlement are developed, taking into account the existing literature on blockchain technology, financial markets, and Central Securities Depositories Regulation. The proposed blockchain architecture model and node structure are then evaluated against scholar expected benefits and drawbacks of using blockchain for securities settlement and cross-border settlement efficiency. The evaluation reveals that the proposed blockchain technology model can potentially improve some of the current securities settlement issues, such as costly reconciliation and difficult cross-border securities settlement. At the same time, using blockchain technology in securities settlement would be challenging because the practical implementation time would be long and would require market-wide commitment. The main artefacts of this article are the proposed blockchain architecture model and node structure that would allow securities settlement processes to be executed using blockchain technology.","PeriodicalId":416219,"journal":{"name":"Complex Syst. Informatics Model. Q.","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116678405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-31DOI: 10.7250/csimq.2021-28.00
Erika Nazaruka
The articles, which have been recommended by reviewers for this issue of CSIMQ, present contributions in evaluation of application of the advanced means for evaluation, monitoring and modification of complex systems and similar content mobile applications. The focus of the presented articles is on the adaptation of the above-described means for new contexts and challenges.
{"title":"Selected Topics on Advanced Methods in Complex Systems Research: Editorial Introduction to Issue 28 of CSIMQ","authors":"Erika Nazaruka","doi":"10.7250/csimq.2021-28.00","DOIUrl":"https://doi.org/10.7250/csimq.2021-28.00","url":null,"abstract":"The articles, which have been recommended by reviewers for this issue of CSIMQ, present contributions in evaluation of application of the advanced means for evaluation, monitoring and modification of complex systems and similar content mobile applications. The focus of the presented articles is on the adaptation of the above-described means for new contexts and challenges.","PeriodicalId":416219,"journal":{"name":"Complex Syst. Informatics Model. Q.","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130052318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-31DOI: 10.7250/csimq.2021-28.01
D. Staegemann, M. Volk, K. Turowski
With a continuously increasing amount and complexity of data being produced and captured, traditional ways of dealing with their storing, processing, analysis and presentation are no longer sufficient, which has led to the emergence of the concept of big data. However, not only the implementation of the corresponding applications is a challenging task, but also the proper quality assurance. To facilitate the latter, in this publication, a comprehensive structured literature metareview on the topic of big data quality assurance is presented. The results will provide interested researchers and practitioners with a solid foundation for their own quality assurance related endeavors and therefore help in advancing the cause of quality assurance in big data as well as the domain of big data in general. Furthermore, based on the findings of the review, worthwhile directions for future research were identified, providing prospective authors with some guidance in this complex environment.
{"title":"Quality Assurance in Big Data Engineering - A Metareview","authors":"D. Staegemann, M. Volk, K. Turowski","doi":"10.7250/csimq.2021-28.01","DOIUrl":"https://doi.org/10.7250/csimq.2021-28.01","url":null,"abstract":"With a continuously increasing amount and complexity of data being produced and captured, traditional ways of dealing with their storing, processing, analysis and presentation are no longer sufficient, which has led to the emergence of the concept of big data. However, not only the implementation of the corresponding applications is a challenging task, but also the proper quality assurance. To facilitate the latter, in this publication, a comprehensive structured literature metareview on the topic of big data quality assurance is presented. The results will provide interested researchers and practitioners with a solid foundation for their own quality assurance related endeavors and therefore help in advancing the cause of quality assurance in big data as well as the domain of big data in general. Furthermore, based on the findings of the review, worthwhile directions for future research were identified, providing prospective authors with some guidance in this complex environment.","PeriodicalId":416219,"journal":{"name":"Complex Syst. Informatics Model. Q.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133466861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-30DOI: 10.7250/csimq.2021-26.02
Anne Sofie Vingerhoets, Samedi Heng, Yves Wautelet
New blockchain-based projects do appear every day. The technology has indeed been popularized by cryptocurrencies but is now gaining interest in various domains and new types of applications are evaluated constantly. Understanding the impact of blockchain adoption on the organization and the internals of blockchain-related behavior nevertheless remains a challenge for managers but also for IT professionals. This article studies how two existing organizational and software modeling languages can be fit to document a blockchain development project in Supply Chain Management (SCM) at its earliest stages. These two frameworks are i* on the one side and the Unified Modeling Language (UML) use case and sequence diagrams on the other side. The real life project used as a case study in this application is ‘Farm-to-Fork’ where a blockchain solution for the Supply Chain (SC) of farm animals is developed. The application of the frameworks is intended to identify their strengths and weaknesses. An extension of i* is proposed to deal with blockchain privacy issues as well as laws and norms. We finally point to the complementarity of i* and UML use case and sequence diagrams in a Blockchain-Oriented Software Engineering (BOSE) context. The i* framework indeed supports early requirements to understand the impact of the project on stakeholders while UML use case and sequence diagrams support the late requirements and the design by depicting the use of blockchain and some of its behavioral mechanisms.
{"title":"Using i* and UML for Blockchain Oriented Software Engineering: Strengths, Weaknesses, Lacks and Complementarity","authors":"Anne Sofie Vingerhoets, Samedi Heng, Yves Wautelet","doi":"10.7250/csimq.2021-26.02","DOIUrl":"https://doi.org/10.7250/csimq.2021-26.02","url":null,"abstract":"New blockchain-based projects do appear every day. The technology has indeed been popularized by cryptocurrencies but is now gaining interest in various domains and new types of applications are evaluated constantly. Understanding the impact of blockchain adoption on the organization and the internals of blockchain-related behavior nevertheless remains a challenge for managers but also for IT professionals. This article studies how two existing organizational and software modeling languages can be fit to document a blockchain development project in Supply Chain Management (SCM) at its earliest stages. These two frameworks are i* on the one side and the Unified Modeling Language (UML) use case and sequence diagrams on the other side. The real life project used as a case study in this application is ‘Farm-to-Fork’ where a blockchain solution for the Supply Chain (SC) of farm animals is developed. The application of the frameworks is intended to identify their strengths and weaknesses. An extension of i* is proposed to deal with blockchain privacy issues as well as laws and norms. We finally point to the complementarity of i* and UML use case and sequence diagrams in a Blockchain-Oriented Software Engineering (BOSE) context. The i* framework indeed supports early requirements to understand the impact of the project on stakeholders while UML use case and sequence diagrams support the late requirements and the design by depicting the use of blockchain and some of its behavioral mechanisms.","PeriodicalId":416219,"journal":{"name":"Complex Syst. Informatics Model. Q.","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126724707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-30DOI: 10.7250/csimq.2021-26.04
Wenjun Xiong, Simon Hacks, Robert Lagerström
. Cyber attacks on IT and OT systems can have severe consequences for individuals and organizations, from water or energy distribution systems to online banking services. To respond to these threats, attack simulations can be used to assess the cyber security of systems to foster a higher degree of resilience against cyber attacks; the steps taken by an attacker to compromise sensitive system assets can be traced, and a time estimate can be computed from the initial step to the compromise of assets of interest. Previously, the Meta Attack Language (MAL) was introduced as a framework to develop security-oriented domain-specific languages. It allows attack simulations on modeled systems and analyzes weaknesses related to known attacks. To produce more realistic simulation results, probability distributions can be assigned to attack steps and defenses to describe the efforts required for attackers to exploit certain attack steps. However, research on assessing such probability distributions is scarce, and we often rely on security experts to model attackers’ efforts. To address this gap, we propose a method to assign probability distributions to the attack steps and defenses of MAL-based languages. We demonstrate the proposed method by assigning probability distributions to a MAL-based language. Finally, the resulting language is evaluated by modeling and simulating a known cyber attack.
{"title":"A Method for Assigning Probability Distributions in Attack Simulation Languages","authors":"Wenjun Xiong, Simon Hacks, Robert Lagerström","doi":"10.7250/csimq.2021-26.04","DOIUrl":"https://doi.org/10.7250/csimq.2021-26.04","url":null,"abstract":". Cyber attacks on IT and OT systems can have severe consequences for individuals and organizations, from water or energy distribution systems to online banking services. To respond to these threats, attack simulations can be used to assess the cyber security of systems to foster a higher degree of resilience against cyber attacks; the steps taken by an attacker to compromise sensitive system assets can be traced, and a time estimate can be computed from the initial step to the compromise of assets of interest. Previously, the Meta Attack Language (MAL) was introduced as a framework to develop security-oriented domain-specific languages. It allows attack simulations on modeled systems and analyzes weaknesses related to known attacks. To produce more realistic simulation results, probability distributions can be assigned to attack steps and defenses to describe the efforts required for attackers to exploit certain attack steps. However, research on assessing such probability distributions is scarce, and we often rely on security experts to model attackers’ efforts. To address this gap, we propose a method to assign probability distributions to the attack steps and defenses of MAL-based languages. We demonstrate the proposed method by assigning probability distributions to a MAL-based language. Finally, the resulting language is evaluated by modeling and simulating a known cyber attack.","PeriodicalId":416219,"journal":{"name":"Complex Syst. Informatics Model. Q.","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134409824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-30DOI: 10.7250/csimq.2021-26.05
Mubashrah Saddiqa, M. Kirikova, Rikke Magnussen, Birger Larsen, J. Pedersen
The continuous innovation in modern technologies in various sectors of society has transformed everyday life. It becomes imperative for the educational community to equip the future generation with digital skills. In this article, using qualitative and quantitative research techniques, we define criteria for school curricula-compatible sensors (particularly, for secondary school students in grades 5 through 9). We also develop requirements models for sensor classes that satisfy the school curricula compatibility criteria using requirements engineering techniques. The results show that integrating sensors into schools can improve students’ digital and data skills. Additionally, requirements models can help in developing school curricula-compatible sensors or transforming existing sensors into curricula-compatible sensors.
{"title":"Towards Using Sensors as Data Sources in Teaching: Requirements for School Curricula-Compatible Sensors","authors":"Mubashrah Saddiqa, M. Kirikova, Rikke Magnussen, Birger Larsen, J. Pedersen","doi":"10.7250/csimq.2021-26.05","DOIUrl":"https://doi.org/10.7250/csimq.2021-26.05","url":null,"abstract":"The continuous innovation in modern technologies in various sectors of society has transformed everyday life. It becomes imperative for the educational community to equip the future generation with digital skills. In this article, using qualitative and quantitative research techniques, we define criteria for school curricula-compatible sensors (particularly, for secondary school students in grades 5 through 9). We also develop requirements models for sensor classes that satisfy the school curricula compatibility criteria using requirements engineering techniques. The results show that integrating sensors into schools can improve students’ digital and data skills. Additionally, requirements models can help in developing school curricula-compatible sensors or transforming existing sensors into curricula-compatible sensors.","PeriodicalId":416219,"journal":{"name":"Complex Syst. Informatics Model. Q.","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117072017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-30DOI: 10.7250/csimq.2021-26.03
Johannes Rude Jensen, Victor von Wachter, Omri Ross
. Decentralized financial applications (DeFi) are a new breed of consumer-facing financial applications composed as smart contracts, deployed on permissionless blockchain technologies. In this article, we situate the DeFi concept in the theoretical context of permissionless blockchain technology and provide a taxonomical overview of agents, incentives and risks. We examine the key market categories and use-cases for DeFi applications today and identify four key risk groups for potential stakeholders contemplating the advantages of decentralized financial applications. We contribute novel insights into a rapidly emerging field, with far-reaching implications for the financial services.
{"title":"An Introduction to Decentralized Finance (DeFi)","authors":"Johannes Rude Jensen, Victor von Wachter, Omri Ross","doi":"10.7250/csimq.2021-26.03","DOIUrl":"https://doi.org/10.7250/csimq.2021-26.03","url":null,"abstract":". Decentralized financial applications (DeFi) are a new breed of consumer-facing financial applications composed as smart contracts, deployed on permissionless blockchain technologies. In this article, we situate the DeFi concept in the theoretical context of permissionless blockchain technology and provide a taxonomical overview of agents, incentives and risks. We examine the key market categories and use-cases for DeFi applications today and identify four key risk groups for potential stakeholders contemplating the advantages of decentralized financial applications. We contribute novel insights into a rapidly emerging field, with far-reaching implications for the financial services.","PeriodicalId":416219,"journal":{"name":"Complex Syst. Informatics Model. Q.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129920614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-30DOI: 10.7250/csimq.2021-26.00
Ben Roelens
Business Information Systems research deals with the conceptualization, development, introduction, maintenance and utilization of systems for computer-assisted information processing within companies and enterprise-wide networks [1, p.1]. This CSIMQ issue contains five articles that deal with various information system (IS) issues, including IS security, product-related ISs, blockchain technology and sensor technology. The call for this issue was particularly targeted towards extended articles of two workshops that were held in conjunction with the 13th IFIP WG 8.1 working conference on the Practice of Enterprise Modelling. The first is the BES 2020 workshop (i.e., 1st Workshop on Blockchain and Enterprise Systems), which has the ambition to change the way one thinks, designs and implements ISs. The second one is ManComp 2020 (i.e., 5th Workshop on Managed Complexity), which is focused on approaches and methods for managing the complexity of ISs and IS interaction within ecosystems. • The first article is written by Julia Kaidalova, Kurt Sandkuhl and Ulf Seigerroth and is titled Product-IT inclusive Enterprise ArchitectureManagement: An Approach based on Ecosystems, Customer Journey and Data-driven Business Opportunities. This article is focused on IS components that are integrated into smart connected products, which are used by an enterprise for value creation and delivery. The contribution of the article is methodological support for integrating those smart products within Enterprise Architecture. The contribution is based on TOGAF and ArchiMate, which are two standards in the Enterprise Architecture field. • The second is authored by Anne Sofie Vingerhoets, Samedi Heng and Yves Wautelet and is titled Using i* and UML for Blockchain Oriented Software Engineering: Strengths, Weaknesses, Lacks and Complementarity. This contribution is an extended BES 2020workshop paper that studies how i* and UML can be used to document a blockchain development project in Supply Chain Management. These models are applied in the context of a real-life case study called ‘Farm-to-Fork’ where a blockchain solution for the supply chain of farm animals is developed. This enables to compare the strengths and weaknesses of the languages used. • The third contribution is a short article that is written by Johannes Rude Jensen, Victor von Wachter and Omri Ross and is titled An Introduction to Decentralized Finance (DeFi). This
商业信息系统研究涉及公司和企业范围网络内计算机辅助信息处理系统的概念化、开发、引进、维护和利用[1,页1]。本期CSIMQ包含五篇文章,涉及各种信息系统(IS)问题,包括IS安全,产品相关的IS,区块链技术和传感器技术。针对这一问题的呼吁特别针对与第13届IFIP WG 8.1企业建模实践工作会议同时举行的两个研讨会的扩展文章。第一个是BES 2020研讨会(即第一届区块链和企业系统研讨会),其目标是改变人们思考、设计和实施区块链的方式。第二个是ManComp 2020(即第五届管理复杂性研讨会),其重点是管理生态系统内ISs和is相互作用复杂性的方法和方法。•第一篇文章由Julia Kaidalova、Kurt Sandkuhl和Ulf Seigerroth撰写,题为“产品- it包容性企业架构管理:基于生态系统、客户旅程和数据驱动的商业机会的方法”。本文主要关注集成到智能连接产品中的is组件,这些组件被企业用于价值创造和交付。本文的贡献在于为在企业架构中集成这些智能产品提供了方法上的支持。该贡献基于TOGAF和ArchiMate,这是企业架构领域的两个标准。•第二本书由Anne Sofie Vingerhoets, Samedi Heng和Yves Wautelet撰写,标题为使用i*和UML进行面向区块链的软件工程:优势,劣势,不足和互补性。这是一篇扩展的BES 2020研讨会论文,研究了如何使用i*和UML来记录供应链管理中的区块链开发项目。这些模型应用于一个名为“农场到餐桌”的现实案例研究中,该案例研究为农场动物供应链开发了区块链解决方案。这样就可以比较所使用语言的优缺点。•第三份贡献是由Johannes Rude Jensen、Victor von Wachter和Omri Ross撰写的一篇短文,题为《去中心化金融简介》(DeFi)。这
{"title":"Selected Topics on Business Information Systems Research: Editorial Introduction to Issue 26 of CSIMQ","authors":"Ben Roelens","doi":"10.7250/csimq.2021-26.00","DOIUrl":"https://doi.org/10.7250/csimq.2021-26.00","url":null,"abstract":"Business Information Systems research deals with the conceptualization, development, introduction, maintenance and utilization of systems for computer-assisted information processing within companies and enterprise-wide networks [1, p.1]. This CSIMQ issue contains five articles that deal with various information system (IS) issues, including IS security, product-related ISs, blockchain technology and sensor technology. The call for this issue was particularly targeted towards extended articles of two workshops that were held in conjunction with the 13th IFIP WG 8.1 working conference on the Practice of Enterprise Modelling. The first is the BES 2020 workshop (i.e., 1st Workshop on Blockchain and Enterprise Systems), which has the ambition to change the way one thinks, designs and implements ISs. The second one is ManComp 2020 (i.e., 5th Workshop on Managed Complexity), which is focused on approaches and methods for managing the complexity of ISs and IS interaction within ecosystems. • The first article is written by Julia Kaidalova, Kurt Sandkuhl and Ulf Seigerroth and is titled Product-IT inclusive Enterprise ArchitectureManagement: An Approach based on Ecosystems, Customer Journey and Data-driven Business Opportunities. This article is focused on IS components that are integrated into smart connected products, which are used by an enterprise for value creation and delivery. The contribution of the article is methodological support for integrating those smart products within Enterprise Architecture. The contribution is based on TOGAF and ArchiMate, which are two standards in the Enterprise Architecture field. • The second is authored by Anne Sofie Vingerhoets, Samedi Heng and Yves Wautelet and is titled Using i* and UML for Blockchain Oriented Software Engineering: Strengths, Weaknesses, Lacks and Complementarity. This contribution is an extended BES 2020workshop paper that studies how i* and UML can be used to document a blockchain development project in Supply Chain Management. These models are applied in the context of a real-life case study called ‘Farm-to-Fork’ where a blockchain solution for the supply chain of farm animals is developed. This enables to compare the strengths and weaknesses of the languages used. • The third contribution is a short article that is written by Johannes Rude Jensen, Victor von Wachter and Omri Ross and is titled An Introduction to Decentralized Finance (DeFi). This","PeriodicalId":416219,"journal":{"name":"Complex Syst. Informatics Model. Q.","volume":"408 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116168722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}