2019
Autores
Floridia, C; Rosolem, JB; Fracarolli, JPV; Bassan, FR; Penze, RS; Pereira, LM; da Motta Resende, MAC;
Publicação
Remote Sensing
Abstract
2019
Autores
Jones, T; Willis, E; Amorim Lopes, M; Drach Zahavy, A;
Publicação
JOURNAL OF ADVANCED NURSING
Abstract
Aims The aims of this paper are to explore the role of cross-disciplinary knowledge exchange and integration in advancing the science of unfinished nursing care and to offer preliminary guidance for theory development activities for this growing international community of scholars. Background Unfinished nursing care, also known as missed care or rationed care is a highly prevalent problem with negative consequences for patients, nurses and healthcare organizations around the world. It presents as a 'wicked' sustainability problem resulting from structural obstacles to effective resource allocation that have been resistant to conventional solutions. Research activity related to this problem is on the rise internationally but is hindered by inconsistencies in conceptualizations of the problem and lack of robust theory development around the phenomenon. A unified conceptual framework is needed to focus scholarly activities and facilitate advancement of a robust science of unfinished nursing care. Design Discussion paper. Data Sources This discussion paper is based on our own experiences in international and interdisciplinary research partnerships related to unfinished nursing care. These experiences are placed in the context of both classic and current literature related to the evolution of scientific knowledge. Implications for Nursing The problem of unfinished nursing care crosses multiple scientific disciplines. It is imperative that the community of scholars interested in solving this wicked problem engage in meaningful cross-disciplinary knowledge integration and move towards transdisciplinarity. Conclusion Metatheorizing guided by structuration theory should be considered as a strategy to promote transdiciplinarity around the problem of unfinished nursing care.
2019
Autores
Couto, R; Campos, JC;
Publicação
PROCEEDINGS OF THE ACM SIGCHI SYMPOSIUM ON ENGINEERING INTERACTIVE COMPUTING SYSTEMS (EICS'19)
Abstract
The IVY workbench is a model-based tool that supports the formal verification of interactive computing systems. It adopts a plugin-based architecture to support a flexible development model. Over the years the chosen architectural solution revealed a number of limitations, resulting both from technological deprecation of some of the adopted solutions and a better understanding of the verification process to support. This paper presents the redesign and implementation of the original plugin infrastructure, originating a new version of the tool: IVY 2. It describes the limitations of the original solutions and the new architecture, which resorts to the Java module system in order to solve them.
2019
Autores
Costa, P; Montenegro, R; Pereira, T; Pinto, P;
Publicação
MOBILE NETWORKS & APPLICATIONS
Abstract
An increase number of cyberattacks on public and private organizations have been performed by exploiting their social and technological vulnerabilities. Mainly, these attacks aim to obtain illegal profits by extorting organizations, affecting their reputation and normal operation. In order to minimize the impact of these attacks, it is essential that these organizations not only implement preventive actions and efficient security mechanisms, but also continually evaluate the security risks their staff are exposed to when performing their job tasks. This paper presents a case study to assess the private and public Portuguese organizations security related practices followed by their staff. The results obtained by a conducted survey allow the analysis of behaviours and practices followed by the staff of these organizations and also allow to draw conclusions about their security procedures and risk awareness.
2019
Autores
Silva, P; Moreira, AC;
Publicação
REVIEW OF INTERNATIONAL BUSINESS AND STRATEGY
Abstract
Purpose The existing literature suggests that multinational corporations (MNCs) divest subsidiary units whenever they cease to enjoy the advantages of ownership, location or internalization. However, not all MNCs divest under these conditions. This paper aims to explore the factors that contributed to the survival of a particular subsidiary and prevented it from being divested. Design/methodology/approach The analysis focuses on an individual subsidiary of a large foreign MNC in the electronics industry, which divested other subsidiaries from Portugal. Data were collected using semi-structured interviews. Findings The subsidiary's diverse customer base, specificity and high level of efficiency, the local advantages, the existing governmental agreements and the parent MNC's previous unsuccessful relocation experiences seem to have contributed to the survival of the subsidiary. Research limitations/implications - Although the results of the case study are not generalizable to the entire population of firms, the featured case study is a rare survival success story in the Portuguese electronics industry. Practical implications - The proposed framework may offer public authorities measures to create conditions to encourage firms to retain their investment in a particular site. For corporate strategists, new perspectives on subsidiary survival are provided. Originality/value This paper is one of the few qualitative studies in the field of subsidiary survival. The results offer an integrative framework on which factors contribute to the survival of a subsidiary located on a comparatively unfavorable labor cost location and support the role of the organizational learning and of previous failed relocation experiences and relocation barriers when a parent MNC decides whether to retain a unit.
2019
Autores
Sousa, PR; Cirne, A; Resende, JS; Martins, R; Antunes, L;
Publicação
ICDCN '19: PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND NETWORKING
Abstract
The number of devices connected to the Internet has been increasing exponentially. There is a substantial amount of data being exchanged among numerous connected devices. The added convenience brought by these devices spans across multiple facets of everyday life, such as drivers reporting an accident through dash cams, patients monitoring their own health, and companies controlling the safety of their facilities. However, it is critical to increase safety and privacy across the data generated and propagated by these devices. Previous works have focused mainly on device management and relied on centralized solutions namely Public Key Infrastructure (PKI). This paper describes a novel mechanism that ensures secure autonomous communication between Internet of Things (IoT) devices, while using a completely decentralized solution that mitigates the classical single points-of-failure problem. This is accomplished by a new peer-to-peer protocol using Short Authentication Strings (SAS), in which verification is made through a Limited-Location Channel (LLC).
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.