2024
Autores
Bernardo, BMV; Sao Mamedeb, H; Barroso, JMP; dos Santos, VMPD;
Publicação
JOURNAL OF INNOVATION & KNOWLEDGE
Abstract
In today's rapidly evolving digital landscape, the substantial advance and rapid growth of data presents companies and their operations with a set of opportunities from different sources that can profoundly impact their competitiveness and success. The literature suggests that data can be considered a hidden weapon that fosters decision-making while determining a company's success in a rapidly changing market. Data are also used to support most organizational activities and decisions. As a result, information, effective data governance, and technology utilization will play a significant role in controlling and maximizing the value of enterprises. This article conducts an extensive methodological and systematic review of the data governance field, covering its key concepts, frameworks, and maturity assessment models. Our goal is to establish the current baseline of knowledge in this field while providing differentiated and unique insights, namely by exploring the relationship between data governance, data assurance, and digital forensics. By analyzing the existing literature, we seek to identify critical practices, challenges, and opportunities for improvement within the data governance discipline while providing organizations, practitioners, and scientists with the necessary knowledge and tools to guide them in the practical definition and application of data governance initiatives. (C) 2024 The Author(s). Published by Elsevier Espana, S.L.U. on behalf of Journal of Innovation & Knowledge.
2024
Autores
Bernardo, MV; Mamede, S; Barroso, MP; Dos Santos, MPD;
Publicação
Emerging Science Journal
Abstract
Cybercrime is growing rapidly, and it is increasingly important to use advanced tools to combat it and support investigations. One of the battlefronts is the forensic investigation of mobile devices to analyze their misuse and recover information. Mobile devices present numerous challenges, including a rapidly changing environment, increasing diversity, and integration with the cloud/IoT. Therefore, it is essential to have a secure and reliable toolbox that allows an investigator to thwart, discover, and solve all problems related to mobile forensics while deciphering investigations, whether criminal, civil, corporate, or other. In this work, we propose an original and innovative instantiation of a structure in a forensic toolbox for mobile devices, corresponding to a set of different applications, methods, and best practice information aimed at improving and perfecting the investigative process of a digital investigator. To ensure scientific support for the construction of the toolbox, the Design Science Research (DSR) methodology was applied, which seeks to create new and unique artifacts, drawing on the strength and knowledge of science and context. The toolbox will help the forensic investigator overcome some of the challenges related to mobile devices, namely the lack of guidance, documentation, knowledge, and the ability to keep up with the fast-paced environment that characterizes the mobile industry and market. © 2024 by the authors. Licensee ESJ, Italy.
2024
Autores
Pereira, R; Lima, C; Reis, A; Pinto, T; Barroso, J;
Publicação
INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 3, WORLDCIST 2023
Abstract
Virtual assistants offer a new type of solution to handle interaction between human and machine and can be applied in various business contexts such as Industry or Education. When designing and building a virtual assistant the developers must ensure a set of parameters to achieve a good solution. Various platforms and frameworks emerged to allow developers to create virtual assistant solutions easier and faster. This paper provides a review of available platforms and frameworks used by authors to create their own solutions in different areas. Big tech companies like Google with Dialogflow, IBM with Watson Assistant and Microsoft with Bot Framework, present mature solutions to build virtual assistants that provide to the developer all components of the basic architecture to build a fast and solid solution. Open-Source solutions focus on providing to the developer the main components to build a virtual assistant, namely language understanding and response generation.
2024
Autores
Silva, T; Bispo, J; Carvalho, T;
Publicação
PROCEEDINGS OF THE 25TH ACM SIGPLAN/SIGBED INTERNATIONAL CONFERENCE ON LANGUAGES, COMPILERS, AND TOOLS FOR EMBEDDED SYSTEMS, LCTES 2024
Abstract
Memory safety issues in C are the origin of various vulnerabilities that can compromise a program's correctness or safety from attacks. We propose a different approach to tackle memory safety, the replication of Rust's Mid-level Intermediate Representation (MIR) Borrow Checker, through the usage of static analysis and successive source-to-source code transformations, to be composed upstream of the compiler, thus ensuring maximal compatibility with most build systems. This allows us to approximate a subset of C to Rust's core concepts, applying the memory safety guarantees of the rustc compiler to C. In this work, we present a survey of Rust's efforts towards ensuring memory safety, and describe the theoretical basis for a C borrow checker, alongside a proof-of-concept that was developed to demonstrate its potential. This prototype correctly identified violations of the ownership and aliasing rules, and accurately reported each error with a level of detail comparable to that of the rustc compiler.
2024
Autores
Samadi, M; Royuela, S; Pinho, LM; Carvalho, T; Quinones, E;
Publicação
JOURNAL OF SYSTEMS ARCHITECTURE
Abstract
The performance of time-predictable systems can be improved in multi-core processors using parallel programming models (e.g., OpenMP). However, schedulability analysis of parallel applications is a big challenge due to their sophisticated structure. The common drawbacks of current task-to-thread mapping approaches in OpenMP are that they (i) utilize a global queue in the mapping process, which may increase contention, (ii) do not apply heuristic techniques, which may reduce the predictability and performance of the system, and (iii) use basic analytical techniques, which may cause notable pessimism in the temporal conditions. Accordingly, this paper proposes a task-to-thread mapping method in multi-core processors based on the OpenMP framework. The mapping process is carried out through two phases: allocation and dispatching. Each thread has an allocation queue in order to minimize contention, and the allocation and dispatching processes are performed using several heuristic algorithms to enhance predictability. In the allocation phase, each task-part from the OpenMP DAG is allocated to one of the allocation queues, which includes both sibling and child task-parts. A suitable thread (i.e., allocation queue) is selected using one of the suggested heuristic allocation algorithms. In the dispatching phase, when a thread is idle, a task-part is selected from its allocation queue using one of the suggested heuristic dispatching algorithms and then dispatched to and executed by the thread. The performance of the proposed method is evaluated under different conditions (e.g., varying the number of tasks and the number of threads) in terms of application response time and overhead of the mapping process. The simulation results show that the proposed method surpasses the other methods, especially in the scenario that includes overhead of the mapping. In addition, a prototype implementation of the main heuristics is evaluated using two kernels from real-world applications, showing that the methods work better than LLVM's default scheduler in most of the configurations.
2024
Autores
Pistono, AMAD; dos Santos, AMP; Baptista, RJV; Mamede, HS;
Publicação
COMPUTER APPLICATIONS IN ENGINEERING EDUCATION
Abstract
Professional training presents a significant challenge for organizations, particularly in captivating and engaging employees in these learning initiatives. With the ever-evolving landscape of workplace education, various learning modes have emerged within organizations, and e-learning stands out as a prominent choice. This increasingly cost-effective and adaptable solution has revolutionized training by facilitating numerous learning activities, including the seamless integration of educational games driven by cutting-edge technologies. However, incorporating serious games into educational and professional settings introduces its own set of challenges, particularly in quantifying their tangible impact on learning and assessing their adaptability across diverse contexts. Organizations require a consistent framework to guide best practices in implementing e-learning combined with serious games in professional training. The primary objective of this research is to bridge this gap. Rooted in the methodology of Design Science Research, it aims to provide a comprehensive framework for creating and assessing adaptive serious games that achieve desired learning and engagement outcomes. The overarching goal is to enhance the teaching-learning process in professional training, ultimately elevating student engagement and boosting learning outcomes to new heights. The proposal is grounded in a review of literature, expert insights, and user experiences with Serious Games in professional training, considering learning outcomes and forms of adaptation as essential characteristics for developing or evaluating Serious Games. The result is a framework designed to guide learners toward improved learning outcomes and increased engagement. The proposal underwent evaluation through triangulation, involving focus groups and expert interviews. Additionally, it was utilized in the development and assessment of a Serious Game, offering new insights and application suggestions. This experiment provided an evaluation of the framework based on real courses. In summary, this investigation contributes to the development of evidence-based approaches for the effective use of Serious Games in professional training.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.