簡易檢索 / 詳目顯示

研究生: Bryan Andi Gerrardo
Bryan Andi Gerrardo
論文名稱: On the Design of a Blockchain-based Fraud-prevention Performance Appraisal System
On the Design of a Blockchain-based Fraud-prevention Performance Appraisal System
指導教授: 羅乃維
Nai-Wei Lo
口試委員: 楊傳凱
Chuan-kai Yang
林伯慎
Bor-Shen Lin
學位類別: 碩士
Master
系所名稱: 管理學院 - 資訊管理系
Department of Information Management
論文出版年: 2021
畢業學年度: 109
語文別: 英文
論文頁數: 62
中文關鍵詞: BlockchainElyptic Curve AlgorithmCryptographyDigital SignatureKeysHashingWork HistoryPerformance Appraisal
外文關鍵詞: Blockchain, Elyptic Curve Algorithm, Cryptography, Digital Signature, Keys, Hashing, Work History, Performance Appraisal
相關次數: 點閱:645下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報

  • Currently, the job recruitment process takes a lot of process steps and needs several applicant documents. It is very well known for job applicants to exaggerated, misrepresent, or falsify their work experiences, skills, performances, and other past employment data histories. The effect of falsifying data of job applicants may put a company at legal risk and significant commercial losses. Generally, companies as a recruiter use third-party Human Resources recruitment agencies to dealing with the process of verifying job applicant’s employment history by checking and confirming job applicants’ work history experience letter. However, involving third-party (HR) recruitment agencies is time-consuming and costly which may not convenient for all companies, especially for small companies. Additionally, it makes companies depend too much on third-party agencies which may not trustworthy and cause several other risks. Many companies use experience letters as proof of work history documents of their employee. However, the process of publishing an experience letter may involve unfair judgement and may contain conflict of interest between company and employee. Yet, publishing an experience letter is not mandatory for former companies in several countries and regions as it is not under their Government regulation. In this research, we propose a system to verify past employment data histories by using performance appraisal as proof of work history and utilizing Blockchain to provide a cost-effective, secure system, tampered-proof and real-time work history verification. The proposed approach also able to minimizes trust issues and privacy of data sharing by adding several encrypt and digital signature schema using Elliptic Curve Cryptography (ECC) algorithm. Furthermore, we have implemented a prototype to demonstrate how the proposed system work using a Quorum-based consortium blockchain

    Recommendation Letter Approval Letter Abstract Acknowledgment Table of Contents List of Figures List of Tables List of Algorithms 1 Introduction 1.1 Background 1.2 Contribution 1.3 Research Outline 2 Preliminaries 2.1 Blockchain 2.2 Elliptic-Curve Cryptography 2.2.1 Elliptic Curve Domain Parameters 2.2.2 Elliptic Curve Key Generation 2.2.3 Elliptic Curve Encryption Scheme 2.2.4 Elliptic Curve Digital Signature Algorithm (ECDSA) 2.3 SHA3-256 (Keccak) 2.4 Performance Appraisal 2.5 Fraud 3 Literature Review 3.1 Recruitment Process using Performance Appraisal 3.2 Fraud Prevention using Blockchain-Based System 4 System Design 4.1 Assumptions 4.2 Proposed System Architecture 4.3 Proposed Workflow 4.3.1 Publishing Evaluation Data 4.3.2 Checking Evaluation Data 4.3.3 Screening Applicant Data 5 Prototype Implementation 5.1 Key Generation 5.2 Implementation of Evaluation Data Publishing 5.3 Implementation of Evaluation Data Check 5.4 Implementation of Applicant Data Screening 6 System Analysis 7 Conclusion References

    [1] Risk Advisory, “CV Lies 2017,” [Online]. Available: https://www.riskadvisory.com/campaigns/cv-lies-2017/ (visited on 03/03/2021).
    [2] cFirst, “The growing menace of resumes lies and its impact on hiring,” Jul. 2019. [Online]. Available: https://www2.cfirst.io/the-growing-menace-ofresumes-lies-and-its-impact-on-hiring/ (visited on 03/03/2021).
    [3] H. Kierbow, “53% of people lie on resumes—including brian williams,” Feb. 2015. [Online]. Available: https://gosmallbiz.com/53-of-people- lie-onresumes-including-brian-williams/ (visited on 03/03/2021).
    [4] P. Sarda, M. J. M. Chowdhury, A. Colman, M. A. Kabir, and J. Han, “Blockchain for fraud prevention: A work-history fraud prevention system,” in 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), 2018, pp. 1858–1863.
    [5] L. M. LaVoie, “Four disadvantages of third-party recruiters,” Jul. 2017. [Online]. Available: https://www.hrmsworld.com/disadvantages-of-third-partyrecruiters-330.html.
    [6] M. J. Schwartz, “Linkedin breach: Worse than advertised,” May 2016. [Online]. Available: https://www.bankinfosecurity.com/linkedin-breach-worsethan-advertised-a-9113.
    [7] G. Anders, “How linkedin has turned your resume into a cash machine,” Jun. 2012. [Online]. Available: https://www.forbes.com/sites/georgeanders/2012/06/27/how-linkedin-strategy/?sh=fbca3b1494d1.
    [8] D. Yaga, P. Mell, N. Roby, and K. Scarfone, “Blockchain technology overview,” CoRR, vol. abs/1906.11078, 2019. [Online]. Available: http://arxiv.org/abs/1906.11078.
    [9] J. Wang, P. Wu, X. Wang, and W. Shou, “The outlook of blockchain technology for construction engineering management,” Frontiers of engineering management, vol. 4, pp. 67–75, 2017. DOI: 10.15302/J-FEM-2017006. [Online]. Available: https://journal.hep.com.cn/fem/EN/abstract/article_19503.shtml.
    [10] A. A. Monrat, O. Schelén, and K. Andersson, “A survey of blockchain from the perspectives of applications, challenges, and opportunities,” IEEE Access, vol. 7, pp. 117 134–117 151, 2019.
    [11] S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” Manubot, Tech.Rep., 2019.
    [12] J. Al-Jaroodi and N. Mohamed, “Blockchain in industries: A survey,” IEEE Access, vol. 7, pp. 36 500–36 515, 2019.
    [13] A. Baliga, I Subhod, P. Kamat, and S. Chatterjee, “Performance evaluation of the quorum blockchain platform,” arXiv preprint arXiv:1809.03421, 2018.
    [14] K. Salah, M. H. U. Rehman, N. Nizamuddin, and A. Al-Fuqaha, “Blockchain for ai: Review and open research challenges,” IEEE Access, vol. 7, pp. 10 127–10 149, 2019. DOI: 10.1109/ACCESS.2018.2890507.
    [15] X. Liang, S. Shetty, D. Tosh, C. Kamhoua, K. Kwiat, and L. Njilla, “Provchain: A blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability,” in 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID), 2017, pp. 468–477. DOI: 10.1109/CCGRID.2017.8.
    [16] T. Bocek, B. B. Rodrigues, T. Strasser, and B. Stiller, “Blockchains everywhere - a use-case of blockchains in the pharma supply-chain,” in 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017, pp. 772–777. DOI: 10.23919/INM.2017.7987376.
    [17] T. T. A. Dinh, R. Liu, M. Zhang, G. Chen, B. C. Ooi, and J. Wang, “Untangling blockchain: A data processing view of blockchain systems,” IEEE Transactions on Knowledge and Data Engineering, vol. 30, no. 7, pp. 1366–1385, 2018. DOI: 10.1109/TKDE.2017.2781227.
    [18] H.-N. Dai, Z. Zheng, and Y. Zhang, “Blockchain for internet of things: A survey,” IEEE Internet of Things Journal, vol. 6, no. 5, pp. 8076–8094, 2019. DOI: 10.1109/JIOT.2019.2920987
    [19] V. Chawla, “What are the top blockchain consensus algorithms?,” Jan. 2020. [Online]. Available: https://analyticsindiamag.com/blockchain-consensusalgorithms/ (visited on 05/04/2021).
    [20] V. S. Miller, “Use of elliptic curves in cryptography,” in Conference on the theory and application of cryptographic techniques, Springer, 1985, pp. 417–426.
    [21] N. Koblitz, A. Menezes, and S. Vanstone, “The state of elliptic curve cryptography,” Designs, codes and cryptography, vol. 19, no. 2, pp. 173–193, 2000.
    [22] S. K. Verma and D. Ojha, “A discussion on elliptic curve cryptography and its applications,” International Journal of Computer Science Issues (IJCSI), vol. 9, no. 1, p. 74, 2012.
    [23] D. Hankerson, A. J. Menezes, and S. Vanstone, Guide to elliptic curve cryptography. Springer Science & Business Media, 2006.
    [24] T. Elgamal, “A public key cryptosystem and a signature scheme based on discrete logarithms,” IEEE Transactions on Information Theory, vol. 31, no. 4, pp. 469–472, 1985. DOI: 10.1109/TIT.1985.1057074.
    [25] M. Bellare and P. Rogaway, “Minimizing the use of random oracles in authenticated encryption schemes,” in International Conference on Information and Communications Security, Springer, 1997, pp. 1–16.
    [26] D Brown, “Standards for efficient cryptography, sec 1: Elliptic curve cryptography,” Released Standard Version, vol. 1, 2009.
    [27] N. R. Chandran and E. M. Manuel, “Performance analysis of modified sha-3,” Procedia Technology, vol. 24, pp. 904–910, 2016.
    [28] J. Pardo and C Gómez-Rodríguez, “The sha-3 family of cryptographic hash functions and extendable-output functions,” in Maple Document, 2015.
    [29] M. J. Dworkin, “Sha-3 standard: Permutation-based hash and extendable-output functions,” 2015.
    [30] P. Cappelli and M. J. Conyon, “What do performance appraisals do?” ILR Review, vol. 71, no. 1, pp. 88–116, 2018.
    [31] G. Dessler, Human resource management twelfth edition. Pearson International Edition, 2011.
    [32] A. Aggarwal and G. S. M. Thakur, “Techniques of performance appraisal-a review,” International Journal of Engineering and Advanced Technology (IJEAT), vol. 2, no. 3, pp. 617–621, 2013.
    [33] J. W. Smither and M. London, Performance management: Putting research into action. John Wiley & Sons, 2009, vol. 21.
    [34] L. P. Dias, “Beginning management of human resources,” Washington: Flatworld Knowledge, 2012.
    [35] I. P. W. G. Profiles Asia Pacific, “Key behavioral indicators for employees,” Apr. 2018. [Online]. Available: https://www.profilesasiapacific.com/2018/04/24/key- behavioral- indicators- for- employees/ (visited on 11/04/2021).
    [36] L. McQuerrey, “What are the key performance indicators for employee job appraisal?,” Jun. 2018. [Online]. Available: https://work .chron.com/key-performance-indicators-employee-job-appraisal-21592.html (visited on 11/04/2021).
    [37] K. Zervos, “Responding to fraud in the 1990s,” Complex Commercial Fraud,pp. 199–209, 1992.
    [38] Gilbert, “Law dictionary,” p. 124, 1997.
    [39] R. G. Smith, “Defining, measuring, and reporting fraud risk within your organisation,” in IIR Conferences, Applying Risk Management to Implement a Proactive Fraud Prevention Strategy in Financial Services. Parkroyal Darling Harbour, 2001, pp. 19–20.
    [40] C.-F. Chien and L.-F. Chen, “Data mining to improve personnel selection and enhance human capital: A case study in high-technology industry,” Expert Systems with applications, vol. 34, no. 1, pp. 280–290, 2008.
    [41] H. Jantan, A. R. Hamdan, and Z. A. Othman, “Knowledge discovery techniques for talent forecasting in human resource application,” World Academy of Science, Engineering and Technology, vol. 50, pp. 775–783, 2009.
    [42] Q. A. Al-Radaideh and E. Al Nagi, “Using data mining techniques to build a classification model for predicting employees performance,” International Journal of Advanced Computer Science and Applications, vol. 3, no. 2, 2012.
    [43] M. Nasr, E. Shaaban, and A. Samir, “A proposed model for predicting employees’ performance using data mining techniques: Egyptian case study,” no. February, 2019.
    [44] A. A. Mahmoud, T. A. Shawabkeh, W. A. Salameh, and I. Al Amro, “Performance predicting in hiring process and performance appraisals using machine learning,” in 2019 10th International Conference on Information and Communication Systems (ICICS), IEEE, 2019, pp. 110–115.
    [45] M. Ruhl, M. Bern, and D. Goldberg, “Secure notarization of paper text documents,” in Symposium on Discrete Algorithms: Proceedings of the twelfth annual ACMSIAM symposium on Discrete algorithms, vol. 7, 2001, pp. 437–438.
    [46] Universidad Nacional De la Plata. [Online]. Available: https://unlp.edu.ar/.
    [47] F. Bond, F. Amati, and G. Blousson, “Blockchain, academic verification use case,” Buenos Aires, 2015.
    [48] F. Amati, “First official career diplomas on bitcoin’s blockchain; 2015,” URL https://blog. signatura. co/first-official-career-diplomas-on-bitcoin-s-blockchain69311acb544d, vol. 6,
    [49] C. Cassandra, H. A. E. Widjaja, H. Prabowo, E. Fernando, Y. U. Chandra, et al., “A blockchain technology-based for university teaching and learning processes,” in 2020 International Conference on Information Management and Technology (ICIMTech), IEEE, 2020, pp. 244–247.
    [50] M. Turkanović, M. Hölbl, K. Košič, M. Heričko, and A. Kamišalić, “Eductx: A blockchain-based higher education credit platform,” IEEE access, vol. 6, pp. 5112–5127, 2018.
    [51] H. Lycklama à Nijeholt, J. Oudejans, and Z. Erkin, “Decreg: A framework for preventing double-financing using blockchain technology,” in Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and Contracts, 2017, pp. 29–34.
    [52] E. Hofmann, U. M. Strewe, and N. Bosia, “Discussion—how does the full potential of blockchain technology in supply chain finance look like?” In Supply Chain Finance and Blockchain Technology, Springer, 2018, pp. 77–87.
    [53] B. Nicoletti, “Fintech and procurement finance 4.0,” in Procurement Finance, Springer, 2018, pp. 155–248.
    [54] M. Guerar, A. Merlo, M. Migliardi, F. Palmieri, and L. Verderame, “A fraudresilient blockchain-based solution for invoice financing,” IEEE Transactions on Engineering Management, vol. 67, no. 4, pp. 1086–1098, 2020.
    [55] M. Chanson, A. Bogner, F. Wortmann, and E. Fleisch, “Blockchain as a privacy enabler: An odometer fraud prevention system,” in Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers, 2017, pp. 13–16.
    [56] K. L. Brousmiche, T. Heno, C. Poulain, A. Dalmieres, and E. B. Hamida, “Digitizing, securing and sharing vehicles life-cycle over a consortium blockchain: Lessons learned,” in 2018 9th IFIP international conference on new technologies, mobility and security (NTMS), IEEE, 2018, pp. 1–5.
    [57] Walmart, “Walmart and sam’s club to require real-time, end-to-end food traceability with blockchain,” Sep. 2019. [Online]. Available: https://corporate.walmart.com/media-library/document/leafy-greens-on-blockchainpress-releas/proxyDocument?id=00000166-0c4c-d96e-a3ff -8f7c09b50001 (visited on 04/04/2021).
    [58] F. Tian, “A supply chain traceability system for food safety based on haccp, blockchain & internet of things,” in 2017 International conference on service systems and service management, IEEE, 2017, pp. 1–6.
    [59] M. P. Caro, M. S. Ali, M. Vecchio, and R. Giaffreda, “Blockchain-based traceability in agri-food supply chain management: A practical implementation,” in 2018 IoT Vertical and Topical Summit on Agriculture-Tuscany (IOT Tuscany), IEEE, 2018, pp. 1–4.
    [60] K. Salah, N. Nizamuddin, R. Jayaraman, and M. Omar, “Blockchain-based soybean traceability in agricultural supply chain,” IEEE Access, vol. 7, pp. 73 295–73 305, 2019.
    [61] R. Ekawati, Y. Arkeman, S. Suprihatin, and T. C. Sunarti, “Design of intelligent decision support system for sugar cane supply chains based on blockchain technology,” in 2020 2nd International Conference on Industrial Electrical and Electronics (ICIEE), IEEE, 2020, pp. 153–157.
    [62] T. Peisl and B. Shah, “The impact of blockchain technologies on recruitment influencing the employee lifecycle,” in European Conference on Software Process Improvement, Springer, 2019, pp. 695–705.
    [63] C. S. S. Yi, E. Yung, C. Fong, S. Tripathi, et al., “Benefits and use of blockchain technology to human resources management: A critical review,” International Journal of Human Resource Studies, vol. 10, no. 2, pp. 131 140–131 140, 2020.
    [64] V. Keršič, P. Štukelj, A. Kamišalić, S. Karakatić, and M. Turkanović, “A blockchain-and ai-based platform for global employability,” in International Congress on Blockchain and Applications, Springer, 2019, pp. 161–168.
    [65] G. Lallai, A. Pinna, M. Marchesi, R. Tonelli, F Chiaraluce, and L Mostarda, “Software engineering for dapp smart contracts managing workers contracts.,” in DLT@ ITASEC, 2020.
    [66] N. S. Dhanala and D Radha, “Implementation and testing of a blockchain based recruitment management system,” in 2020 5th International Conference on Communication and Electronics Systems (ICCES), IEEE, 2020, pp. 583–588.
    [67] A. Pinna, G. Baralla, G. Lallai, M. Marchesi, and R. Tonelli, “Design of a sustainable blockchain-oriented software for building workers management,” Front. Blockchain 3: 38. doi: 10.3389/fbloc, 2020.
    [68] PerformYard, “Employee,” Jul. 2019. [Online]. Available: https://www.performyard.com/articles/performance-review-ratings-scales-examples.
    [69] F Clegg, Simple statistics cambridge university press, 1990.
    [70] S. Jamieson, “Likert scales: How to (ab) use them?” Medical education, vol. 38, no. 12, pp. 1217–1218, 2004.
    [71] S. McLeod, “Likert scale definition, examples and analysis,” Simply Psychology, 2019.
    [72] GoQuorum, “Raft consensus protocol,” 2019. [Online]. Available: https://goquorum.readthedocs.io/en/latest/Consensus/raft/raft/.
    [73] YCHARTS, “Ethereum average gas price,” Jul. 2021. [Online]. Available: https://ycharts.com/indicators/ethereum_average_gas_price/ (visited on 04/07/2021).
    [74] CoinMarketCap, “Today’s cryptocurrency prices by market cap,” Jul. 2021. [Online]. Available: https://coinmarketcap.com/ (visited on 04/07/2021).

    QR CODE