ABSTRACT
Today we cannot imagine our life without the introduction of digital technologies into the life of society. Messengers have become popular not only among ordinary users, but also among IT companies. Such companies tend to use and support one or multiple corporate systems. In this case, events that require prompt response from users of those systems are possible to occur. To solve this problem, the corporate information system is integrated with other communication channels, including messengers, social networks, etc. The article discusses integration of corporate information systems with the Telegram messenger using bots. Having studied publications in one way or another related to this problem, it turned out that almost all of them do not reflect the topic of the introduction and application of instant messengers to the corporate information system. Most of them describe the importance of notifications, calculate the speed of notifications, or create separate information systems, but do not talk about the possibilities of using messengers as a method of interaction between user and system. Therefore, the task arose of studying approaches to integrating messengers.
- A. V. Krasov 2017 “Methods of protection byte code java-programs from decompilation and theft of source code by an attacker.” Vestnik of St. Petersburg State University of Technology and Design. Series 1. Natural and technical science, vol. 1, pp. 47-50, 2017.Google Scholar
- S. Zhang, and J. Fjermestad, “Instant messaging: observations from two small e-commerce businesses,” Journal of Enterprise Information Management, vol. 21, no. 2, pp. 179-197, 2008.Google ScholarCross Ref
- T. M. Maina, “Instant messaging an effective way of communication in workplace.” arXiv preprint arXiv:1310.8489, 2013.Google Scholar
- C. Rottermanner, P. Kieseberg, M. Huber, M. Schmiedecker, and S. Schrittwieser, “Privacy and data protection in smartphone messengers.” In Proceedings of the 17th International Conference on Information Integration and Web-based Applications & Services, pp. 1-10, 2015.Google ScholarDigital Library
- L. C. Klopfenstein, S. Delpriori, S. Malatini, and A. Bogliolo, “The rise of bots: A survey of conversational interfaces, patterns, and paradigms.” In Proceedings of the 2017 conference on designing interactive systems, pp. 555-565, 2017.Google ScholarDigital Library
- V. Kodachigov, “The most popular messengers in Russia.” Vedomosti, 2018. Accessed January 08 2021, https://www.vedomosti.ru/technology/articles/2018/09/17/781109-samie-populyarnie-v-rossii-messendzheri.Google Scholar
- J Spataro, “Microsoft Teams reaches 115 million DAU—plus, a new daily collaboration minutes metric for Microsoft 365.” Microsoft, 2020. Accessed January 08 2021, https://www.microsoft.com/en-us/microsoft-365/blog/2020/10/28/microsoft-teams-reaches-115-million-dau-plus-a-new-daily-collaboration-minutes-metric-for-microsoft-365/.Google Scholar
- Whatsapp, “Two Billion Users – Connecting the World Privately.” Whatsapp, 2020. Accessed January 08 2021, https://blog.whatsapp.com/two-billion-users-connecting-the-world-privately/.Google Scholar
- CNews, “Viber reaches one billion users registered.” CNews, 2018. Accessed January 08 2021, https://www.cnews.ru/news/line/2018-12-25_chislo_zaregistrirovannyh_polzovatelej_viber.Google Scholar
- P. Durov, “400 Million Users, 20,000 Stickers, Quizzes 2.0 and €400K for Creators of Educational Tests.” Telegram, 2020. Accessed January 08 2021, https://telegram.org/blog/400-million/ru.Google Scholar
- N. Särökaari, “How to identify malicious HTTP Requests.” SANS Institute, 2012, p. 25.Google Scholar
- Facebook for Developers, “WhatsApp Business API.” Facebook, 2020. Accessed January 29 2021, https://developers.facebook.com/docs/whatsapp/.Google Scholar
- Viber, “Viber API Documentation” Viber Media S.à r.l., 2018. Accessed January 29 2021, https://developers.viber.com/docs/api/rest-bot-api.Google Scholar
- Telegram, “Telegram APIs” Telegram, 2020. Accessed January 29 2021, https://core.telegram.org.Google Scholar
- Telegram, “Telegram Bot API” Telegram, 2020. Accessed January 29 2021, https://core.telegram.org/bots/api.Google Scholar
- M. M. Kovtsur, P. Lueke, “Development of an attendance accounting system on a scale of a university.” In Proceedings of VIII International Conference on advanced infotelecommunications, (Saint-Petersburg: The Bonch-Bruevich SPbSUT), vol. 1, pp. 532-537, 2019.Google Scholar
- I. A. Ushakov, “Corporate insider detection based on big data analysis technologies.” Vestnik of St. Petersburg State University of Technology and Design. Series 1. Natural and technical science, vol. 4 pp. 38-43, 2019.Google Scholar
- I. V. Kotenko, A. A. Kuleshov and I. A. Ushakov, “A System for Collecting, Storing and Processing Security Information and Events based on Elastic Stack Tools.” In SPIIRAS Proceedings, vol. 5, pp. 5-34, 2017, 10.15622/sp.54.1.Google ScholarCross Ref
- S. I. Shterenberg, V. E. Morozov, and V. I. Andrianov, “Software protection technologies on the Internet.” (Saint-Petersburg: The Bonch-Bruevich SPbSUT), 2015.Google Scholar
- L. A. Vitkova, “Study of a distributed computer system of adaptive action.” H&ES Research High Technologies In Earthspace Research, vol. 5, pp. 44-49, 2015Google Scholar
Index Terms
- Messengers integration methods with corporate information systems: The introduction and application of instant messengers to the corporate information system
Recommendations
Analysis of Telegram, An Instant Messaging Service
CIKM '17: Proceedings of the 2017 ACM on Conference on Information and Knowledge ManagementTelegram has become one of the most successful instant messaging services in recent years. In this paper, we developed a crawler to gather its public data. To the best of our knowledge, this paper is the first attempt to analyze the structural and ...
Privacy and data protection in smartphone messengers
iiWAS '15: Proceedings of the 17th International Conference on Information Integration and Web-based Applications & ServicesEver since the Snowden revelations regarding mass surveillance, the role of privacy protection in commodity communication software has gained increasing awareness in the general public. Still, during the last years many new messengers were developed for ...
Information Systems and Integration
IMAC '95: Proceedings of the 4th International Conference on Image Management and Communication (IMAC '95)Abstract: Many hospitals and medical centers have computerized information systems either within radiology (RIS) or throughout the hospital (HIS). These different systems, which include, order entry, scheduling, transcription, ADT, and other functions ...
Comments