2022
Autores
de Almeida, JESC; Carneiro, MA; Silva, MFL; Baptista, RJV;
Publicação
Lecture Notes in Networks and Systems
Abstract
Following the reduced number of female students at ISTEC Porto computer science and engineering courses, we tried to find out what are the factors that might be causing this fact. This gender inequality was found looking back at the data from the last 15 years, clearly showing the gap between male and female students managing to conclude the degree. To point out the reasons and probable explanation a literature review was made to figure out conceivable paths to change this status quo. The article concludes that gender inequality resides on cultural differences as well as in the lack of information about the real role played by women in technology companies, particularly IT companies. © 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.
2022
Autores
Rosa, I; Batista, R; Goncalves, R; Martins, J; Branco, F;
Publicação
2022 17TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI)
Abstract
When talking about Cybersecurity, particularly in security incident response plan and processes it is very common and relevant to talk about the ability to detect malicious or suspicious activities and behavior as soon as possible, in other words, in this domain, in Cybersecurity everyone wants to reduce the Mean time to detect (MTTD) or Mean time to respond (MTTR) a potential security incident. The use of Cyber Threat Intelligence CTI indicators can contribute to the reduction of the mean time to detect threats and consequently directly influence the time to response, however there are different types of Cyber Threat Intelligence that serve different purposes. The objective of the study is the development of a reference architecture to support and process data from the most diverse type of data sources in terms of Cyber Threat Intelligence, for example using the combination data from Open Source Intelligence - OSINT sources and honeypots, taking into consideration the advantages and disadvantages of each of these types of data sources to correlate them with each other in order to increase the trust and reliability of the relevant indicators that can be used by security analysts in incident response processes. This paper presents the proposed work for a PhD thesis in Web Science and Technology, scheduled for completion in July 2023. This doctoral thesis falls within the area of Computer Engineering, with applicability in the domain of Cybersecurity and consequently in the subdomain of Threat Intelligence. The research project is in the state-of-the-art study phase. It is expected that the participation in this Doctoral Symposium will provide potential comments that can enhance the growth and complement the ongoing research work.
2025
Autores
Pistono, A; Santos, A; Baptista, R;
Publicação
World Journal of Information Systems
Abstract
2017
Autores
Ricardo José Vieira Baptista;
Publicação
Abstract
2021
Autores
Oliveira, André; Gomes, António Alberto; Baptista, Ricardo;
Publicação
Abstract
2021
Autores
Pistono, AMAA; Santos, A; Baptista, RJV;
Publicação
Atas da Conferencia da Associacao Portuguesa de Sistemas de Informacao
Abstract
Serious Games have been used in professional training to increase employee engagement and improve the results of training initiatives in this context. This work intends to investigate the influence of game elements, in adaptable Serious Games, according to the users' interactions, in the increase of engagement in the game itself and, as the main objective, in the learning outcomes and the transfer of the acquired knowledge and practised skills to activities in the daily work. Using the Design Science Research methodology, this study is intended to develop a framework for the development and evaluation of Serious Games to improve the user experience, the learning outcomes, the transfer of knowledge to work situations, and the application of skills practised in the game in real professional scenarios. © 2021 Associacao Portuguesa de Sistemas de Informacao. All rights reserved.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.