2024
Authors
Magano, J; Au-Yong-Oliveira, M; Fernandes, JPT;
Publication
ADVANCED RESEARCH IN TECHNOLOGIES, INFORMATION, INNOVATION AND SUSTAINABILITY, PT 2, ARTIIS 2023
Abstract
This cross-sectional study addresses Portuguese online shoppers' behavior toward Chinese online retailers, assessing the impact of financial, product, and time-convenience risks and demographic traits on their willingness to buy from those e-stores. The research relies on a survey of 1,432 participants who have shopped online at least once. Approximately half of the sample already buys from Chinese websites; age, financial, and time-convenience risks explain 21.5% of the variance of their purchase intention. On the other hand, participants who buy on Chinese websites present significantly lower values of all risks and the intention to buy from Chinese websites, possibly reflecting a satisfactory transaction experience. Furthermore, a generation gap is evident as younger people feel more confident in dealing intuitively with and solving online issues, giving them the confidence necessary to purchase online from Chinese e-stores - perhaps geographically and ideologically distant - but brought closer by e-expertise (online dexterity).
2024
Authors
Silva, JM; Ribeiro, D; Ramos, LFM; Fonte, V;
Publication
PROCEEDINGS OF THE 57TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES
Abstract
The availability of public services through online platforms has improved the coverage and efficiency of essential services provided to citizens worldwide. These services also promote transparency and foster citizen participation in government processes. However, the increased online presence also exposes sensitive data exchanged between citizens and service providers to a wider range of security threats. Therefore, ensuring the security and trustworthiness of online services is crucial to Electronic Government (EGOV) initiatives' success. Hence, this work assesses the security posture of online platforms hosted in 3068 governmental domain names, across all UN Member States, in three dimensions: support for secure communication protocols; the trustworthiness of their digital certificate chains; and services' exposure to known vulnerabilities. The results indicate that despite its rapid development, the public sector still falls short in adopting international standards and best security practices in services and infrastructure management. This reality poses significant risks to citizens and services across all regions and income levels.
2024
Authors
Macedo, JN; Rodrigues, E; Viera, M; Saraiva, J;
Publication
JOURNAL OF SYSTEMS AND SOFTWARE
Abstract
Strategic term re-writing and attribute grammars are two powerful programming techniques widely used in language engineering. The former relies on strategies to apply term re-write rules in defining largescale language transformations, while the latter is suitable to express context-dependent language processing algorithms. These two techniques can be expressed and combined via a powerful navigation abstraction: generic zippers. This results in a concise zipper-based embedding offering the expressiveness of both techniques. In addition, we increase the functionalities of strategic programming, enabling the definition of outwards traversals; i.e. outside the starting position. Such elegant embedding has a severe limitation since it recomputes attribute values. This paper presents a proper and efficient embedding of both techniques. First, attribute values are memoized in the zipper data structure, thus avoiding their re-computation. Moreover, strategic zipper based functions are adapted to access such memoized values. We have hosted our memoized zipper-based embedding of strategic attribute grammars both in the Haskell and Python programming languages. Moreover, we benchmarked the libraries supporting both embedding against the state-of-the-art Haskell-based Strafunski and Scala-based Kiama libraries. The first results show that our Haskell Ztrategic library is very competitive against those two well established libraries.
2024
Authors
Stabler, D; Hakala, H; Huikkola, T; Mention, AL;
Publication
JOURNAL OF CLEANER PRODUCTION
Abstract
This conceptual study explores the alignment between servitization-a shift from selling products to offering services-and circularity principles. The study introduces institutional confluence-a configuration of institutional pressures that enhance business model legitimacy to stakeholders and facilitate operational success- which can serve as a driver aligning servitization with circular principles. Institutional confluence has the capacity to trigger novel business models, shape resources and processes, enhance value capture, and inhibit unsustainable business models. The study develops the concept and underscores the role of institutional confluence in promoting this alignment and subsequent environmental sustainability. The article utilizes illustrative case examples from servitization and circular business models to develop the concept of institutional confluence serving sustainable servitization. The study offers strategic insights for managers and policymakers, emphasizing the need for a holistic approach that integrates servitization and circularity from the outset of business model design. It advocates for policies that leverage regulatory, normative, and mimetic pressures to foster sustainable business practices. The article contributes to the servitization literature by delineating the mechanisms through which institutional forces facilitate or hinder the integration of servitization and circularity, offering directions for future research to explore these dynamics across different contexts and industries.
2024
Authors
Moreira, J; Mendes, D; Gonçalves, D;
Publication
VISUAL INFORMATICS
Abstract
Incidental visualizations convey information to a person during an ongoing primary task, without the person consciously searching for or requesting that information. They differ from glanceable visualizations by not being people's main focus, and from ambient visualizations by not being embedded in the environment. Instead, they are presented as secondary information that can be observed without a person losing focus on their current task. However, despite extensive research on glanceable and ambient visualizations, the topic of incidental visualizations is yet a novel topic in current research. To bridge this gap, we conducted an empirical user study presenting participants with an incidental visualization while performing a primary task. We aimed to understand how complexity contributory factors - task complexity, output complexity, and pressure - affected primary task performance and incidental visualization accuracy. Our findings showed that incidental visualizations effectively conveyed information without disrupting the primary task, but working memory limitations should be considered. Additionally, output and pressure significantly influenced the primary task's results. In conclusion, our study provides insights into the perception accuracy and performance impact of incidental visualizations in relation to complexity factors. (c) 2024 The Authors. Published by Elsevier B.V. on behalf of Zhejiang University and Zhejiang University Press Co. Ltd. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
2024
Authors
Lucas, A; Carvalhosa, S; Golmaryami, S;
Publication
2024 INTERNATIONAL CONFERENCE ON SMART ENERGY SYSTEMS AND TECHNOLOGIES, SEST 2024
Abstract
This research presents an anomaly detection algorithm for a Vanadium Redox Flow Battery (VRFB) using battery dataset as an example. The algorithm determines the anomaly detection threshold by fitting a Gaussian mixed model (GMM) to an anomaly-free dataset and testing it against a dataset containing only anomalies. By forcing the test dataset to classify all observations as anomalies, the threshold can be found. Applying again the model to the training dataset, classifies 11% of normal observations as failures, indicating that, not all observations were captured by the GMM, resulting in false positives. A percentage based on the likelihood values is suggested for replication to other systems, and a ratio of anomaly detection over time is proposed for preventive maintenance alerts.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.