2024
Authors
Mamede, S; Santos, A;
Publication
Creating Learning Organizations Through Digital Transformation
Abstract
Organizations find themselves at a pivotal crossroads in an era propelled by the sweeping tide of digital transformation, where the wake of the COVID-19 pandemic has reshaped the global landscape. Within these novel contexts, the imperative to cultivate Learning Organizations (LOs) has emerged as a beacon of adaptability and progress. Creating Learning Organizations Through Digital Transformation weaves the fabric of LOs within the digital tapestry, where minds perpetually expand, and learning begets learning. This journey hinges on the synergy of knowledge and digital prowess, as LOs harness data and digital content with finesse. From immersive learning to artificial intelligence, these technological frontiers reshape learning, spurring change. Unveiling the core concepts, implementations, and global impacts of LOs, this book is a compass for academics, researchers, and practitioners. It deciphers people capacities, digital contents, learning technologies, and evaluation, nurturing the symbiotic relationship between learning and transformation. Creating Learning Organizations Through Digital Transformation is the scholarly guidepost in a swiftly evolving landscape. It beckons to those attuned to academia and those shaping real-world organizations, resonating with the pursuit of knowledge in an era of unceasing change. © 2024 by IGI Global. All rights reserved.
2022
Authors
Silva, RP; Mamede, HS;
Publication
Int. J. Innov. Digit. Econ.
Abstract
2022
Authors
Rosal, TA; Mamede, HS; da Silva, MM;
Publication
Information Systems Development: Artificial Intelligence for Information Systems Development and Operations (ISD2022 Proceedings), Cluj-Napoca, Romania, 31 August - 2 September 2022.
Abstract
Serious Games use game strategies to encourage participants to make decisions and face challenges in a training environment; the more interactive the game, the more engaged the participants are with the content. Moreover, the best way to train is to simulate and identify scenarios for decision making, recreating situations, and strategies for learning. The Serious Games for training have this purpose. A Serious Game for Training can be refined with a game narrative, a methodology centered on the player to present independent and straightforward scenarios, giving solutions through the game story. The challenge is to rethink a unique narrative according to the individual player's experience. The present systematic literature review aims to answer which are the benefits of using Design Thinking for serious game narratives; the benefits of learning theories; the Design Thinking benefits for innovative solutions; and how game design elements can create an engaging Serious Game experience.
2024
Authors
Pinheiro, C; Guerreiro, S; Mamede, HS;
Publication
BUSINESS & INFORMATION SYSTEMS ENGINEERING
Abstract
Association Rule Mining (ARM) is a field of data mining (DM) that attempts to identify correlations among database items. It has been applied in various domains to discover patterns, provide insight into different topics, and build understandable, descriptive, and predictive models. On the one hand, Enterprise Architecture (EA) is a coherent set of principles, methods, and models suitable for designing organizational structures. It uses viewpoints derived from EA models to express different concerns about a company and its IT landscape, such as organizational hierarchies, processes, services, applications, and data. EA mining is the use of DM techniques to obtain EA models. This paper presents a literature review to identify the newest and most cited ARM algorithms and techniques suitable for EA mining that focus on automating the creation of EA models from existent data in application systems and services. It systematically identifies and maps fourteen candidate algorithms into four categories useful for EA mining: (i) General Frequent Pattern Mining, (ii) High Utility Pattern Mining, (iii) Parallel Pattern Mining, and (iv) Distribute Pattern Mining. Based on that, it discusses some possibilities and presents an exemplification with a prototype hypothesizing an ARM application for EA mining.
2023
Authors
Russo, N; Mamede, HS; Reis, L; Martins, J; Branco, F;
Publication
APPLIED SCIENCES-BASEL
Abstract
In a competitive business landscape heavily reliant on information and communication technology, organisations must be prepared to address disruptions in their business operations. Business continuity management involves effective planning for the swift reestablishment of business processes in the short term. However, there are still obstacles to implementing business continuity plans, which can be justified by various factors. The purpose of this study is to present the perspectives and future research paths based on a systematic literature review from the peer-reviewed literature published from 1 January 2000 to 31 December 2021. This systematic literature review adheres to the guidelines established by evidence-based software engineering and leverages the Parsifal online tool. The primary research results identify and establish connections between the common components and activities of business continuity management as defined in international standards and frameworks to identify gaps in the existing knowledge. These findings will contribute to the development of a framework that provides a practical approach applicable to organisations of all sizes, taking into account each aspect of business continuity management, with a particular emphasis on information and communication technology systems. This paper's contribution lies in offering insights from a systematic literature review regarding the strategic principles for designing and implementing a business continuity plan, along with a comprehensive overview of related research. Furthermore, it presents a path forward to guide future research efforts aimed at addressing the gaps in the literature concerning continuity planning.
2023
Authors
Ferreira, DJ; Mamede, S; Mateus Coelho, N;
Publication
Contemporary Challenges for Cyber Security and Data Privacy
Abstract
The global overview of the challenges faced in trying to minimise the risks of organisations in the face of cyber-attacks is arduous for any organisation. Defining an appropriate risk management model that proactively minimises cybersecurity incidents is a critical challenge. Many malicious attacks occur daily, and there is only sometimes an adequate response. There is a significant investment in research to identify the main factors that may cause such incidents, always trying to have the most appropriate response and, consequently, potentiating the response capacity and success. At the same time, several different methodologies evaluate risk management and the maturity level of organisations. Due to the lack of predictive models based on data (evidence), there is a significant investment in research to identify the main factors that may cause such incidents, starting to design models based on AI-Artificial Intelligence. This research will go in the direction of developing a user-friendly model supporting the assessment of the methodological aspects of an organisation. © 2023, IGI Global.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.