Please use this identifier to cite or link to this item:
A study of e-invoice system based on Blockchaintechnology
|Issue Date: ||2016-12-07 10:45:39 (UTC+8)|
Different e-invoice systems are designed to meet different needs and application scenarios. Although these systems areuseful and readily available, researchers and businesses hope to be able to expand the coverage of e-invoice systems using Blockchain technologies.
This study proposes an e-invoice system based on Blockchain technologies which shows anotherapplication scenario of Blockchain technology and e-invoice system. First, a review of about 980 publicationson e-invoicing and Blockchain was carried outwithinformetrics used for further analysis so as to better understandthe development of e-invoice and Blockchain technologies. Second, the concepts and mechanisms of Bitcoin and Blockchain technologies were reviewed. Finally, an e-invoice system based on Ethereumwas proposed.
The proposed system meets the six needs of an e-invoice system: integrity, authenticity, availability, auditability, non-repudiation and traceability. It is not only suitable for issuing general invoices but also can play a role in further invoicing applications such as invoice financing as well as agri-food supply chain traceability. In the future, Openchain or hybrid Blockchain infrastructure that combines public and private nodes can be consideredfor use in this proposed e-invoice system.
|Reference: ||Arendsen, R., & van de Wijngaert, L. (2011).Government as a Launching Customer for eInvoicing.In Electronic government (pp. 122-133).Springer Berlin Heidelberg.|
Back, A. (2002). Hashcash-a denial of service counter-measure.
Bayer, D., Haber, S., &Stornetta, W. S. (1993).Improving the efficiency and reliability of digital time-stamping. Sequences II: Methods in Communication, Security and Computer Science, 329-334.
Bitcoin Block Explorer. (2016). Bitcoin Block Explorer – Block#411546, Retrieved May 12 2016, from the World Wide Web: https://blockexplorer.com/block/000000000000000005868c8c7b85b4e217380a4f465731967517207b0046e97e
Bitcoin.it. (2015).Weaknesses - Bitcoin Wiki. Retrieved May 12 2016, from the World Wide Web: https://en.Bitcoin.it/wiki/Weaknesses.
Blockchain Use Cases: Comprehensive Analysis & Startups Involved. (2015). LTB Network. Retrieved May 23 2016, from the World Wide Web: https://letstalkpayments.com/Blockchain-use-cases-comprehensive-analysis-startups-invoved/
Borden, K. (2004). Determining negotiating ranges for EDI-induced transaction and float cost reductions. Global Finance Journal, 15(1), 71-79.
Buterin, V. (2014). Ethereum: A Next-Generation Cryptocurrency and Decentralized Application Platform.
Bitcoin Magazine. Retrieved May 24, 2016, from the World Wide Web: https://Bitcoinmagazine.com/articles/ethereum-next-generation-cryptocurrency-decentralized-application-platform-1390528211
Cade Metz Business. (2015). SEC Approves Plan To Issue Stock ViaBitcoin’s Blockchain. WIRED. Retrieved May 24, 2016, from the World Wide Web: http://www.wired.com/2015/12/sec-approves-plan-to-issue-company-stock-via-the-bitcoin-blockchain/
Cha, S. C., Joung, Y. J., Tseng, Y. C., Huang, S. C., Chen, G. H., & Tseng, C. T. (2014, June). Ensuring the integrity and non-repudiation of remitting e-invoices in conventional channels with commercially available NFC devices. InSoftware Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), 2014 15th IEEE/ACIS International Conference on (pp. 1-6). IEEE.
Chang, C. J., Kuo, H. C., Chen, C. Y., Chen, T. H., & Chung, P. Y. (2013). Ergonomic Techniques for a Mobile E‐Invoice System: Operational Requirements of an Information Management System. Human Factors and Ergonomics in Manufacturing & Service Industries, 23(6), 582-589.
Charlon, F. (2015).Openchain Documentation Release 0.5.0.Openchain. Retrieved May 24, 2016, from the World Wide Web: https://media.readthedocs.org/pdf/openchain/latest/openchain.pdf
Chaum, D. (1983). Blind signatures for untraceable payments.In Advances in cryptology (pp. 199-203).Springer US.
Chen, W. K. (2012). On Design of Secure APIs for IoT Applications—Using Taiwan Uniform e-Invoices as Examples.Radio Frequency Identification System Security, 8, 9.
Cimander, R., Kubicek, H., &Brun, M. H. (2007).eInvoicing in DenmarkeGovernment Unit, Information Society and Media Directorate-General, European Commission, Tech. Rep.
Coinprism. (2015). Openchain, Retrieved May 12 2016, from: https://www.openchain.org/
Das, S. (2015). Coinprism Launches OpenChain, an Open-Source Distributed Ledger. CCN.LA. Retrieved May 24, 2016, from the World Wide Web: https://www.cryptocoinsnews.com/coinprism-launches-openchain-an-open-source-distributed-ledger/
De Bellis, N. (2009). Bibliometrics and citation analysis: from the science citation index to cybermetrics. Scarecrow Press.
EBA Working Group on Electronic and Alternative Payments.(2015). Cryptotechnologies as major IT innovation and technical change agent.Euro Banking Association.
Eom, S. (2008).An introduction to bibliometrics and informetrics. Author Cocitation Analysis: Quantitative Methods for Mapping the Intellectual Structure of an Academic Discipline, 1-35.
Futuregovt.(2011). Winners of Futuregov Awards 2011. Retrieved May 24, 2016, from the World Wide Web: http://pacific.scoop.co.nz/2011/10/winners-of-futuregov-awards-2011
Gilson, D. (2013). What are Namecoins and .bit domains? CoinDesk. Retrieved May 24, 2016, from the World Wide Web: http://www.coindesk.com/what-are-namecoins-and-bit-domains/
Haber, S., &Stornetta, W. S. (1990). How to time-stamp a digital document(pp. 437-455). Springer Berlin Heidelberg.
Hernández-Ortega, B. (2011). The role of post-use trust in the acceptance of a technology: drivers and consequences. Technovation, 31(10), 523-538.
Hovden, R. (2013). Bibliometrics for Internet media: Applying the h‐index to YouTube. Journal of the American Society for Information Science and Technology, 64(11), 2326-2331.
Huemer, C., Zapletal, M., &Liegl, P. (2014).Crossing the boundaries: e-Invoicing/e-procurement as native ERP features. In Novel Methods and Technologies for Enterprise Information Systems (pp. 9-17). Springer International Publishing.
Joung, Y. J., Tseng, Y. C., Cha, S. C., Lo, N. W., Chung, G., & Liu, C. K. (2014, January). Motivations, Deployment, and Assessment of Taiwan's E-Invoicing System: An Overview. In System Sciences (HICSS), 2014 47th Hawaii International Conference on (pp. 2200-2209).IEEE.
Karjalainen, K., &Kemppainen, K. (2008). The involvement of small-and medium-sized enterprises in public procurement: Impact of resource perceptions, electronic systems and enterprise size. Journal of Purchasing and Supply Management, 14(4), 230-240.
Karlsson, S. (2008).Research and development of a cost efficient Finvoice B2C billing solution.
Keen, L. (2016). Australia Post to use Blockchain to store identities. Financial Review. Retrieved May 24, 2016, from the World Wide Web: http://www.afr.com/technology/australia-post-to-use-Blockchain-to-store-identities-20160316-gnk6w5
Keifer, S. (2011). E-invoicing: The catalyst for financial supply chain efficiencies. Journal of Payments Strategy & Systems, 5(1), 38-51.
Koch, B. (2016). E-Invoicing / E-Billing Digitisation& Automation.Billentis. Retrieved June 01, 2016, from the World Wide Web: https://www.simac.com/uploads/media/574ea9aa39094/E-Invoicing%20%20E-Billing.pdf
Ledra capital. (2014). Bitcoin Series 24 : The Mega-Master Blockchain List. Retrieved May 24, 2016, from the World Wide Web: http://ledracapital.com/blog/2014/3/11/Bitcoin-series-24-the-mega-master-Blockchain-list
Lian, J. W. (2015). Critical factors for cloud based e-invoice service adoption in Taiwan: An empirical study. International Journal of Information Management,35(1), 98-109.
Massias, H., Avila, X. S., &Quisquater, J. J. (1999).Design of a secure timestamping service with minimal trust requirement.In the 20th Symposium on Information Theory in the Benelux.
Maxim, J. (2015). Onename Launches Blockchain Identity Product Passcard. Bitcoin Magazine. Retrieved May 24, 2016, from the World Wide Web: https://Bitcoinmagazine.com/articles/onename-launches-Blockchain-identity-product-passcard-1431548450
Merkle, R. C. (1980, April). Protocols for public key cryptosystems. In null (p. 122). IEEE.
Ministry of Finance, R.O.C. (2005).Outsourcing project on the planning and assessment of e-invoice: Survey and report of current status on demands for e-invoicing (in Chinese).
Ministry of Finance, R.O.C. (2009).Related historical data on uniform invoice (in Chinese). Retrieved May 24, 2016, from the World Wide Web: http://www.mof.gov.tw/ museum/ct.asp?xItem=3693/&ctNode=35/&mp=1
Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system.
Noizat, P. (2015). Chapter 22 – Blockchain Electronic Vote.Handbook of digital currency.
OpenText GXS. (2015). Lost? Don't Know What to look for in an e-invoicing solution?. Retrieved May 12 2016, from the World Wide Web: http://www.gxs.co.uk/eBooks/eInvoicing/e-invoicing_ebook_uk.pdf.
Oxford Dictionaries.(2002). OECD Frascati Manual, Sixth edition, Annex 7, paras. 20-22, page 203
Palmer, D. (2016). Blockchain Startup To Secure 1 Million eHealth Records in Estonia. CoinDesk. Retrieved May 24, 2016, from the World Wide Web: http://www.coindesk.com/blockchain-startup-aims-to-secure-1-million-estonian-health-records/
Patron, T. (2016). What’s the Big Idea BehindEthereum’s World Coumputer? CoinDesk. Retrieved May 24, 2016, from the World Wide Web: http://www.coindesk.com/whats-big-idea-behind-ethereums-world-computer/
Rofhök-Björni, A. (2006). Electronic Invoicing in Finland-attitudes towards electronic invoicing by financial managers in small-to mid-sized companies.Swedish School of Economics and Business Administration, Master’s of Science Degree Programme in Accounting.
Sande, A. (2015). How the Ethereum Network handle ddos Attacks?. Retrieved May 12 2016, from the World Wide Web: https://www.reddit.com/r/ethereum/comments/2iyyk9/how_the_ethereum_network_handle_ddos_attacks/.
Sir Mark Walport. (2016). Distributed Ledger Technology: beyond block chain. UK Government Office for Science. Retrieved May 24, 2016, from the World Wide Web: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/492972/gs-16-1-distributed-ledger-technology.pdf
Swan, M. (2015). Blockchain: Blueprint for a New Economy. O'Reilly Media, Inc.
Swanson, T. (2014). Blockchain 2.0 – Let a Thousand Chains Blossom. LTB Network. Retrieved May 24, 2016, from the World Wide Web: https://letstalkBitcoin.com/Blockchain-2-0-let-a-thousand-chains-blossom
Tague-Sutcliffe, J. (1992). An introduction to informetrics. Information Processing and Management, 28(1), 1–3
Tian, Feng. "An agri-food supply chain traceability system for China based on RFID & blockchain technology." Service Systems and Service Management (ICSSSM), 2016 13th International Conference on.IEEE, 2016.
Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS quarterly, 425-478.
Venkatesh, V., Thong, J. Y., &Xu, X. (2012). Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology. MIS quarterly, 36(1), 157-178.
Veselá, L., &Radiměřský, M. (2014).The Development of Electronic Document Exchange. Procedia Economics and Finance, 12, 743-751.
Vitalk, B. (2015). On Slow and Fast Block Times. Ethereum Blog. Retrieved May 24, 2016, from the World Wide Web: https://blog.ethereum.org/2015/09/14/on-slow-and-fast-block-times/
Vogelsteller, F. (2016).Ethereum Development Tutorial. Retrieved May 24, 2016, from the World Wide Web: https://github.com/ethereum/wiki/wiki/Ethereum-Development-Tutorial
Wikipedia (2016).Information security. Retrieved May 12 2016, from the World Wide Web: https://en.wikipedia.org/wiki/Information_security#Key_concepts
Wilcke, J. (2016). Security Alert – Geth suffers from a very low probable DoS attack vector – Update immediately. Ethereum Blog. Retrieved May 17 2016, from: https://blog.ethereum.org/2016/05/17/security-alert-geth-suffers-from-a-very-low-probable-dos-attack-vector-update-immediately/
Wilson, C. S. (1999). Informetrics. Annual Review of Information Science and Technology (ARIST), 34, 107-247.
Wolfram, D. (2003). Applied informetrics for information retrieval research (No. 36). Greenwood Publishing Group.
Wood, G. (2014). Ethereum: A secure decentralisedgeneralised transaction ledger. Ethereum Project Yellow Paper.
Wu, R. (2013). An overview of e-invoicing in China and the factors affecting individual's intention to B2C e-invoicing adoption.
ZOHO Corp. (2015) Standard Fields in Invoices. Retrieved May 12 2016, from the World Wide Web: https://www.zoho.com/crm/help/invoices/standard-fields.html
|Source URI: ||http://thesis.lib.nccu.edu.tw/record/#G0099932007|
|Data Type: ||thesis|
|Appears in Collections:||[經營管理碩士學程EMBA] 學位論文|
Files in This Item:
All items in 政大典藏 are protected by copyright, with all rights reserved.