{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:19:00Z","timestamp":1750220340968,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,12,15]],"date-time":"2021-12-15T00:00:00Z","timestamp":1639526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,12,15]]},"DOI":"10.1145\/3508072.3508191","type":"proceedings-article","created":{"date-parts":[[2022,4,13]],"date-time":"2022-04-13T17:01:56Z","timestamp":1649869316000},"page":"581-586","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Messengers integration methods with corporate information systems"],"prefix":"10.1145","author":[{"given":"Viktoria","family":"Konovalova","sequence":"first","affiliation":[{"name":"The Bonch-Bruevich Saint Petersburg State University of Telecommunications, Russia"}]},{"given":"Nikita","family":"Kazakov","sequence":"additional","affiliation":[{"name":"The Bonch-Bruevich Saint Petersburg State University of Telecommunications, Russia"}]},{"given":"Hamza","family":"Mohammed Ridha Al-Khafaji","sequence":"additional","affiliation":[{"name":"Biomedical Engineering Department, Al-Mustaqbal University College, Iraq"}]},{"given":"Maxim","family":"Kovtsur","sequence":"additional","affiliation":[{"name":"The Bonch-Bruevich Saint Petersburg State University of Telecommunications, Russia"}]},{"given":"Anton","family":"Kistruga","sequence":"additional","affiliation":[{"name":"The Bonch-Bruevich Saint Petersburg State University of Telecommunications, Russia"}]}],"member":"320","published-online":{"date-parts":[[2022,4,13]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"47","volume-title":"Methods of protection byte code java-programs from decompilation and theft of source code by an attacker","author":"A. V.","year":"2017","unstructured":"A. V. Krasov 2017 \u201c Methods of protection byte code java-programs from decompilation and theft of source code by an attacker .\u201d Vestnik of St. Petersburg State University of Technology and Design . Series 1. Natural and technical science, vol. 1 , pp. 47 - 50 , 2017 . A. V. Krasov 2017 \u201cMethods of protection byte code java-programs from decompilation and theft of source code by an attacker.\u201d Vestnik of St. Petersburg State University of Technology and Design. Series 1. Natural and technical science, vol. 1, pp. 47-50, 2017."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1108\/17410390810851417"},{"key":"e_1_3_2_1_3_1","volume-title":"Instant messaging an effective way of communication in workplace","author":"Maina T. M.","year":"2013","unstructured":"T. M. Maina , \u201c Instant messaging an effective way of communication in workplace .\u201d arXiv preprint arXiv:1310.8489, 2013 . T. M. Maina, \u201cInstant messaging an effective way of communication in workplace.\u201d arXiv preprint arXiv:1310.8489, 2013."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2837185.2837202"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064663.3064672"},{"key":"e_1_3_2_1_6_1","volume-title":"Vedomosti, 2018","author":"Kodachigov V.","year":"2021","unstructured":"V. Kodachigov , \u201c The most popular messengers in Russia .\u201d Vedomosti, 2018 . Accessed January 08 2021 , https:\/\/www.vedomosti.ru\/technology\/articles\/2018\/09\/17\/781109-samie-populyarnie-v-rossii-messendzheri. V. Kodachigov, \u201cThe most popular messengers in Russia.\u201d Vedomosti, 2018. Accessed January 08 2021, https:\/\/www.vedomosti.ru\/technology\/articles\/2018\/09\/17\/781109-samie-populyarnie-v-rossii-messendzheri."},{"key":"e_1_3_2_1_7_1","volume-title":"Microsoft, 2020","author":"Spataro J","year":"2021","unstructured":"J Spataro , \u201c Microsoft Teams reaches 115 million DAU\u2014plus, a new daily collaboration minutes metric for Microsoft 365 .\u201d Microsoft, 2020 . Accessed January 08 2021 , https:\/\/www.microsoft.com\/en-us\/microsoft-365\/blog\/2020\/10\/28\/microsoft-teams-reaches-115-million-dau-plus-a-new-daily-collaboration-minutes-metric-for-microsoft-365\/. J Spataro, \u201cMicrosoft Teams reaches 115 million DAU\u2014plus, a new daily collaboration minutes metric for Microsoft 365.\u201d Microsoft, 2020. Accessed January 08 2021, https:\/\/www.microsoft.com\/en-us\/microsoft-365\/blog\/2020\/10\/28\/microsoft-teams-reaches-115-million-dau-plus-a-new-daily-collaboration-minutes-metric-for-microsoft-365\/."},{"volume-title":"Whatsapp, 2020","year":"2021","key":"e_1_3_2_1_8_1","unstructured":"Whatsapp , \u201c Two Billion Users \u2013 Connecting the World Privately .\u201d Whatsapp, 2020 . Accessed January 08 2021 , https:\/\/blog.whatsapp.com\/two-billion-users-connecting-the-world-privately\/. Whatsapp, \u201cTwo Billion Users \u2013 Connecting the World Privately.\u201d Whatsapp, 2020. Accessed January 08 2021, https:\/\/blog.whatsapp.com\/two-billion-users-connecting-the-world-privately\/."},{"key":"e_1_3_2_1_9_1","unstructured":"CNews 2018 Viber reaches one billion users registered"},{"key":"e_1_3_2_1_10_1","volume-title":"Telegram, 2020","author":"Durov P.","year":"2021","unstructured":"P. Durov , \u201c 400 Million Users, 20,000 Stickers, Quizzes 2.0 and \u20ac400K for Creators of Educational Tests .\u201d Telegram, 2020 . Accessed January 08 2021 , https:\/\/telegram.org\/blog\/400-million\/ru. P. Durov, \u201c400 Million Users, 20,000 Stickers, Quizzes 2.0 and \u20ac400K for Creators of Educational Tests.\u201d Telegram, 2020. Accessed January 08 2021, https:\/\/telegram.org\/blog\/400-million\/ru."},{"key":"e_1_3_2_1_11_1","volume-title":"How to identify malicious HTTP Requests","author":"S\u00e4r\u00f6kaari N.","year":"2012","unstructured":"N. S\u00e4r\u00f6kaari , \u201c How to identify malicious HTTP Requests .\u201d SANS Institute , 2012 , p. 25. N. S\u00e4r\u00f6kaari, \u201cHow to identify malicious HTTP Requests.\u201d SANS Institute, 2012, p. 25."},{"volume-title":"Facebook, 2020","year":"2021","key":"e_1_3_2_1_12_1","unstructured":"Facebook for Developers , \u201c WhatsApp Business API .\u201d Facebook, 2020 . Accessed January 29 2021 , https:\/\/developers.facebook.com\/docs\/whatsapp\/. Facebook for Developers, \u201cWhatsApp Business API.\u201d Facebook, 2020. Accessed January 29 2021, https:\/\/developers.facebook.com\/docs\/whatsapp\/."},{"volume-title":"Viber Media S.\u00e0 r.l.","year":"2018","key":"e_1_3_2_1_13_1","unstructured":"Viber , \u201c Viber API Documentation \u201d Viber Media S.\u00e0 r.l. , 2018 . Accessed January 29 2021, https:\/\/developers.viber.com\/docs\/api\/rest-bot-api. Viber, \u201cViber API Documentation\u201d Viber Media S.\u00e0 r.l., 2018. Accessed January 29 2021, https:\/\/developers.viber.com\/docs\/api\/rest-bot-api."},{"volume-title":"Telegram, 2020","year":"2021","key":"e_1_3_2_1_14_1","unstructured":"Telegram , \u201c Telegram APIs \u201d Telegram, 2020 . Accessed January 29 2021 , https:\/\/core.telegram.org. Telegram, \u201cTelegram APIs\u201d Telegram, 2020. Accessed January 29 2021, https:\/\/core.telegram.org."},{"volume-title":"Telegram, 2020","year":"2021","key":"e_1_3_2_1_15_1","unstructured":"Telegram , \u201c Telegram Bot API \u201d Telegram, 2020 . Accessed January 29 2021 , https:\/\/core.telegram.org\/bots\/api. Telegram, \u201cTelegram Bot API\u201d Telegram, 2020. Accessed January 29 2021, https:\/\/core.telegram.org\/bots\/api."},{"key":"e_1_3_2_1_16_1","first-page":"532","volume-title":"Proceedings of VIII International Conference on advanced infotelecommunications, (Saint-Petersburg: The Bonch-Bruevich SPbSUT)","volume":"1","author":"Kovtsur M. M.","year":"2019","unstructured":"M. M. Kovtsur , P. Lueke , \u201cDevelopment of an attendance accounting system on a scale of a university .\u201d In Proceedings of VIII International Conference on advanced infotelecommunications, (Saint-Petersburg: The Bonch-Bruevich SPbSUT) , vol. 1 , pp. 532 - 537 , 2019 . M. M. Kovtsur, P. Lueke, \u201cDevelopment of an attendance accounting system on a scale of a university.\u201d In Proceedings of VIII International Conference on advanced infotelecommunications, (Saint-Petersburg: The Bonch-Bruevich SPbSUT), vol. 1, pp. 532-537, 2019."},{"key":"e_1_3_2_1_17_1","first-page":"38","volume-title":"Corporate insider detection based on big data analysis technologies","author":"Ushakov I. A.","year":"2019","unstructured":"I. A. Ushakov , \u201c Corporate insider detection based on big data analysis technologies .\u201d Vestnik of St. Petersburg State University of Technology and Design . Series 1. Natural and technical science, vol. 4 pp. 38 - 43 , 2019 . I. A. Ushakov, \u201cCorporate insider detection based on big data analysis technologies.\u201d Vestnik of St. Petersburg State University of Technology and Design. Series 1. Natural and technical science, vol. 4 pp. 38-43, 2019."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.15622\/sp.54.1"},{"key":"e_1_3_2_1_19_1","volume-title":"Software protection technologies on the Internet","author":"Shterenberg S. I.","year":"2015","unstructured":"S. I. Shterenberg , V. E. Morozov , and V. I. Andrianov , \u201c Software protection technologies on the Internet .\u201d (Saint-Petersburg: The Bonch-Bruevich SPbSUT) , 2015 . S. I. Shterenberg, V. E. Morozov, and V. I. Andrianov, \u201cSoftware protection technologies on the Internet.\u201d (Saint-Petersburg: The Bonch-Bruevich SPbSUT), 2015."},{"key":"e_1_3_2_1_20_1","first-page":"44","article-title":"Study of a distributed computer system of adaptive action","volume":"5","author":"Vitkova L. A.","year":"2015","unstructured":"L. A. Vitkova , \u201c Study of a distributed computer system of adaptive action .\u201d H&ES Research High Technologies In Earthspace Research , vol. 5 , pp. 44 - 49 , 2015 L. A. Vitkova, \u201cStudy of a distributed computer system of adaptive action.\u201d H&ES Research High Technologies In Earthspace Research, vol. 5, pp. 44-49, 2015","journal-title":"H&ES Research High Technologies In Earthspace Research"}],"event":{"name":"ICFNDS 2021: The 5th International Conference on Future Networks & Distributed Systems","acronym":"ICFNDS 2021","location":"Dubai United Arab Emirates"},"container-title":["The 5th International Conference on Future Networks &amp; Distributed Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508072.3508191","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3508072.3508191","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:12:30Z","timestamp":1750191150000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508072.3508191"}},"subtitle":["The introduction and application of instant messengers to the corporate information system"],"short-title":[],"issued":{"date-parts":[[2021,12,15]]},"references-count":20,"alternative-id":["10.1145\/3508072.3508191","10.1145\/3508072"],"URL":"https:\/\/doi.org\/10.1145\/3508072.3508191","relation":{},"subject":[],"published":{"date-parts":[[2021,12,15]]},"assertion":[{"value":"2022-04-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}