ARTICLE | doi:10.20944/preprints202005.0267.v1
Subject: Computer Science And Mathematics, Computer Science Keywords: Blockchain; ÐApp; UML; conceptual modelling; Ethereum; Smart Contract; Solidity; Quorum; middleware; Clockchain
Online: 16 May 2020 (16:29:58 CEST)
Blockchain decentralized applications (ÐApps) are applications which run on Blockchains nodes. Thus, in order to interact directly with this sort of applications, users need to have a blockchain address, wallet and knowledge about how to make transactions in order to interact with ÐApps. Therefore, the knowledge required to use a ÐApp can easily make users to desist when trying to interact with them. In order to tackle this issue, we propose a software architecture that will be located in the middle of the user and the ÐApp, thus making users initially unaware that they are interacting with a ÐApp. This is achieved by analyzing the relationship between ÐApps and Apps by using UML modelling. Next, based in the previous analysis, we created a middleware for users to interact with a ÐApp in the same manner the do with a traditional web app, i.e. by using usernames, passwords and UI elements instead of addresses, private keys or transactions. Finally, in order to put the developed middleware into practice, we developed a ÐApp that makes use of it. This ÐApp registers the time control of workers from companies by using Blockchain to store the data in a secure and non-modifiable manner.
Subject: Computer Science And Mathematics, Information Systems Keywords: fraud audit; process mining; visual analytics
Online: 2 March 2021 (09:19:01 CET)
Among the knowledge areas in which process mining has had an impact, the audit domain is particularly striking. Traditionally, audits seek evidence in a data sample that allows to make inferences about a population. Mistakes are usually committed when generalizing the results and anomalies, therefore, appear in unprocessed sets. However, there are some efforts to address these limitations using process mining-based approaches for fraud detection. To the best of our knowledge, no fraud audit method exists that combines process mining techniques and visual analytics to identify relevant patterns. This paper presents a fraud audit approach based on the combination of process mining techniques and visual analytics. The main advantages are: (i) a method is included that guides the use of the visual capabilities of process mining to detect fraud data patterns during an audit; (ii) the approach can be generalized to any business domain; (iii) well-known process mining techniques are used (Dotted Chart, Trace Alignment, Fuzzy Miner…). The techniques were selected by a group of experts and were extended to enable filtering for contextual analysis, to handle levels of process abstraction, and to facilitate implementation in the area of fraud audits. Based on the proposed approach, we developed a software solution that is currently being used in the financial sector as well as in the telecommunications and hospitality sector. Finally, for demonstration purposes, we present a real hotel management use case in which we detected suspected fraud behaviors, thus validating the effectiveness of the approach.