The Relevance and the Concerning Sides of the Distance Education

Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.

Authors

José Câmara, Assistant Professor at ISTEC

Media

PDF

To cite this article

José Câmara, <strong>The Relevance and the Concerning Sides of the Distance Education</strong>DOI: 10.31112/kriativ-tech-2021-10-61

Abstract

Distance Education is becoming very popular and important nowadays, not only due to the pandemic moment that we are living, but also due to the several advantages it offers over the traditional teaching models and a need there is  for it.

This article presents the main characteristics and concepts, as well as the relevance and the concerning sides of the Distance Education.

Keywords

Distance Education,  Multimedia, Video Conference, Community of Inquiry, Cognitive Learning, Synchronous Learning, Asynchronous Learning.

References

[1]Siemens, George, in edX Course: Pivoting to Online Teaching and Practitioner Perspectives (2020). Consultado em https://courses.edx.org/dashboard

 

[2]Mirriahi,  Negin, in edX Course: Pivoting to Online Teaching and Practitioner Perspectives (2020). Consultado em https://courses.edx.org/dashboard

 

[3]Anderson, T., Rourke, L., Garrison, D. R., Archer, W. (2001). Assessing Teaching presence in a Computer Conference Environment. Consultado em https://coi.athabascau.ca/coi-model/

Journal of Asynchronous Learning Networks, 5(2), 1-17. Consultado em http://cde.athabascau.ca/coi_site/documents/Anderson_Rourke_Garrison_Archer_Teaching_Presence.pdf

 

[4]In edX Course: Pivoting to Online Teaching and Practitioner Perspectives (2020) Consultado em

https://courses.edx.org/dashboard

 

[5]Crosslin, Matt. Consultado em https://mattcrosslin.com/
[6]Kerketta, Susma, M. The Need and Importance of Distance Education in India.

Higher Education Review. Consultado em https://www.thehighereducationreview.com/news/the-need-and-importance-of-distance-education-in-india-nid-867.html

 

[7]Rigney, Lester-Irabinna. Consultado em https://people.unisa.edu.au/Lester.Rigney

Defining culturally responsive digital education for classrooms: Writing from Oceania to build indigenous pacific futures. In E. A. McKinley & L. T. Smith (Eds.), Handbook of Indigenous Education (pp. 1–17). Springer Singapore. Consultado em https://doi.org/10.1007/978-981-10-1839-8_44-1


CyberSecurity - Risks of Telework

Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.

Authors

Pedro Ramos Brandao, Coordinator Professor at ISTEC
Manuel Martins, Master's student in Computing at ISTEC

Media

PDF

To cite this article

Pedro Ramos Brandao, Manuel Martins, <strong>CyberSecurity - Risks of Telework</strong>DOI: 10.31112/kriativ-tech-2021-10-60

Abstract

Nowadays, telework is increasingly seen as an issue that must be addressed importantly and that solutions are found to enhance and strengthen it. As a result, organizations are increasingly relying on hybrid models of telework and presential work. The purpose of this paper is to assess whether an objective approach in the correlation between the tools made available and employee training and awareness for good use practices will reduce the risks associated with telework.

Keywords

Telework, Cybersecurity, Professional Qualification

References

[1]      "Work from Home Cyber Risks – CyberExperts.com." [Online]. Available: https://cyberexperts.com/work-from-home-cyber-risks/. [Accessed: 19-Jul-2021].

[2]      D. Dahlberg, "Identifying Unique Risks Of Work From Home-Remote Office Networks," p. 6, 2020.

[3]      GundechaPritam, BarbierGeoffrey, TangJiliang, and LiuHuan, "User Vulnerability and Its Reduction on a Social Networking Site," ACM Trans. Knowl. Discov. from Data, vol. 9, no. 2, Sep. 2014, doi: 10.1145/2630421.

[4]      L. Marinos and M. Lourenço, ENISA Threat Landscape Report 2018 15 Top Cyberthreats and Trends, no. January. 2018.

[5]      “CyberEdge 2020 Cyberthreat Defense Report Infographic | CyberEdge Group.” [Online]. Available: https://cyber-edge.com/resources/cyberedge-2020-cyberthreat-defense-report-infographic/. [Accessed: 31-Jul-2021].

[6]      " What's a honeypot? How do honeypots improve security | Kaspersky.” [Online]. Available: https://www.kaspersky.com.br/resource-center/threats/what-is-a-honeypot. [Accessed: 21-Jul-2021].

[7]      L. Bonacini, G. Gallo, and S. Scicchitano, "Working from home and income inequality: risks of a 'new normal' with COVID-19," J. Popul. Econ. 2020 341, vol. 34, no. 1, pp. 303–360, Sep. 2020, doi: 10.1007/S00148-020-00800-7.

[8]      “IT Management Software & Remote Monitoring Tools | SolarWinds.” [Online]. Available: https://www.solarwinds.com/. [Accessed: 21-Jul-2021].


Next-Generation Firewalls: Concept, Features, and Their Benefits

Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.

Authors

Pedro Ramos Brandao, Coordinator Professor at ISTEC
José Almeida, Master's student in Computing at ISTEC

Media

PDF

To cite this article

Pedro Ramos Brandao, José Almeida, <strong> Next-Generation Firewalls: Concept, Features, and Their Benefits </strong> DOI: 10.31112/kriativ-tech-2021-10-59

Abstract

A firewall is a solution for securing computer networks; it can be a software program or a hardware device that allows or inhibits access to or from a system. Firewalls are used regularly to prevent untrusted Internet-originating traffic from accessing private systems and networks. All connection requests and packets that intend to pass through the firewall are analyzed according to the configured security criteria and denied or allowed. By rule, firewalls are designed to protect against unauthorized and abusive access. This paper is intended to provide a historical background on the technological evolution of firewalls and present the concept, functionalities, benefits of use, and aspects to be taken into account when choosing and setting firewalls.

Keywords

Firewall, next-generation firewall, information security, protection, technological evolution.

References

[1] SÊMOLA, Marcos. Gestão da Segurança da Informação, uma visão Executiva. (Information Security Management, an Executive View). Rio de Janeiro: Elsevier,2003

[2] ABNT NBR ISO/IEC 27001:2013 – Tecnologia da Informação – Técnicas de Segurança – Sistemas de gestão da segurança da informação — Requisitos. (Information Technology - Security Techniques - Information Security Management Systems - Requirements).

[3] BEAL, Adriana. Segurança da Informação: princípios e melhores práticas para a proteção dos ativos de informação nas organizações (Information Security: principles and best practices for the protection of information assets within organizations) – São Paulo: Atlas, 2005.

[4] ABNT NBR ISO/IEC 27002:2013 – Tecnologia da Informação – Técnicas de Segurança – Código de prática para controles de segurança da informação. (Information Technology - Security Techniques - Code of practice for information security controls).

[5] KUROSE James F., ROSS, Keith W. (2010), Redes de Computadores e a Internet 5a. Edição. (Computer Networks and the Internet 5th Edition). 2010. Pearson Publishing.

[6] CHAURE, Rupali. An Implementation of Anomaly Detection Mechanism for Centralized and Distributed Firewalls. NRI Institute of Information Science and Technology. 2010. Bhopal, India.

[7] Tanenbaum, Andrew S. Redes de Computadores - Tradução da 4ª Edição. (Computer Networks - Translation of the 4th Edition). 2003. Editora Campus / Elsevier (Campus / Elsevier Publisher)

[8] Kagermann H., Wahlster, W., & Helbig, J. Recommendations for implementing the strategic initiative Industrie 4.0, Final report of the Industrie 4.0 Working Group. 2013

[9] Ashibani, Y. & Mahmoud, H. M. Cyber-physical systems security: Analysis, challenges, and solutions. Computers & Security. 2017

[10] Ahram, T., Arman, S., Saman, S., Daniels, J., & Amaba, B. Blockchain Technology Innovations. Conference:  IEEE-Technology-and-Engineering-Management-Society Conference. 2017

[11] Babiceanu, R.  F., & Seker, R. Cybersecurity and resilience modeling for software-defined networks-based manufacturing application. In:  Service Orientation in Holonic and Multi-Agent Manufacturing. Studies in Computational Intelligence. Springer, Cham. 2017

[12] Corallo, A., Lazo, i M., & Lezzi, M. Cybersecurity in the context of industry 4.0:  A structured classification of critical assets and business impacts. Science Direct, Elsevier, Computers in Industry. 2020

[13] Dimase, D., Collier, Z.A., Heffner, K., et al. Systems engineering framework for cyber-physical security and resilience. 2015

[14] European Union Agency for Network and Information Security (ENISA). Good Practice for Security of Internet of Things in the Context of Smart Manufacturing, ENISA. 2018

[15] Greitzer, F. L., J., Purl, Y. M., & Leong P. J. S. Positioning your organization to respond to insider threats. IEEE Engineering Management Review. 2019

[16] Industrial Control Systems Cyber Emergency Response Team ICS-CERT. Annual Assessment Report. National Cybersecurity and Communications Integration Center (NCCIC). 2016

[17] Kaplan J., Weinberg, A., & Sharma, S. Meeting the cybersecurity challenge. Digit. McKinsey. 2011

[18] Liu, Y., &Xu, X. Industry 4.0 and cloud manufacturing: A comparative analysis. Journal of Manufacturing Science and Engineering. 2017

[19] Lu, T., Lin J., Zhao, L., Li, Y., & Peng, Y. A security architecture in cyber-physical systems:  security theories, analysis simulation, and application fields. 2015

[20] National   Security   &   Defense. Memorandum on   Space   Policy   Directive   5 –Cybersecurity. https://www.whitehouse.gov/presidential-actions/memorandum-space-policy-directive-5-cybersecurity-principles-space-systems. 2020

[21] Zhu, Q., Craig, R., & Basar, T. A hierarchical security architecture for cyber-physical systems. In:  2011 4th International Symposium on Resilient Control Systems. 2011

[22] Theron, P., & Lazari, A. The IACS Cybersecurity Certification Framework (ICCF). Lessons from the 2017 study of state of the art., EUR 29237 EN, Publications Office of the European Union, Luxembourg, ISBN 978-92-79-85968-7, 10.2760/856808, JRC111611. 2018

[23] Stouffer, K., Pillitteri, V., Lightman, S., Abrams, M., & Hahn, A. NIST Special Publication 800-82.  Guide to Industrial Control Systems (ICS) Security. National Institute of Standard and Technology (NIST). 2015

[24] Fortinet the Next Step in Enterprise Firewall Evolution. https://www.fortinet.com/blog/industry-trends/the-next-step-in-enterprise-firewall-evolution

[25] Gartner. Available at: http://www.gartner.com/it-glossary/next-generationfirewalls-ngfws. 2015

[26] MANECA, Miguel António Moreira Boavida. Firewalls: A Próxima Geração, 2018. (The Next Generation, 2018).

[27]. Shinder T.W., Shimonski R.J., Shinder D.L., 2003, The Best Damn Firewall Book Period" Syngress Publishing, Rockland.

[28] Y. Yongxin, 2011, The comparative study on network firewalls performance, 2011 IEEE 3rd International Conference on Communication Software and Networks.

[29] GARTNER Global Research and Advisory Company. www.gartner.com

[30] GARTNER Peer Insights. https://www.gartner.com/reviews/market/network-firewalls

[31] Palo Alto Networks. https://www.paloaltonetworks.com/resources/datasheets/pa-7000-series

[32] Fortinet. https://www.fortinet.com/content/dam/fortinet/assets/data-sheets/FortiGate_7000_Series_Bundle.pdf


Extended Detection and Response Importance of Events Context

Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.

Authors

Pedro Ramos Brandao, Coordinator Professor at Instituto Superior de Tecnologias Avançadas
João Nunes, Master Degree Student at Instituto Superior de Tecnologias Avançadas

Media

PDF

To cite this article

Pedro Ramos Brandao, João Nunes, <strong>Extended Detection and Response Importance of Events Context </strong> DOI: 10.31112/kriativ-tech-2021-10-58

Abstract

In an increasingly dynamic and unpredictable world regarding IT security, it's essential to use adequate solutions that boost infrastructures protection, whether local, in the cloud, or hybrid. This article contextualizes the challenges of the new reality of remote work with traditional security solutions. Furthermore, it explains the importance of implementing a solution that has a holistic view of the infrastructure and correlates all suspicious or attack events. Thus, it enhances an improved and updated security to the current reality.

Keywords

XDR, EDR, SIEM, Correlation, Context, Cybersecurity

References

[1]       Kaspersky, "How COVID-19 changed the way people work," 2020.

[2]       W. U. Hassan, A. Bates, and D. Marino, "Tactical provenance analysis for endpoint detection and response systems," Proc. - IEEE Symp. Secur. Priv., vol. 2020-May, pp. 1172–1189, 2020, doi: 10.1109/SP40000.2020.00096.

[3]       G. Karantzas and C. Patsakis, "An Empirical Assessment of Endpoint Detection and Response Systems against Advanced Persistent Threats Attack Vectors," pp. 387–421, 2021, doi: 10.3390/jcp1030021.

[4]       S. Slate, "Endpoint Security: An Overview and a Look into the Future," Lat. Am. Polit. Hist., 2018, doi: 10.4324/9780429499340-15.

[5]       G. González-granadillo, S. González-zarzosa, and R. Diaz, “Trends, and Usage in Critical Infrastructures,” 2021.

[6]       M. Chopra and C. Mahapatra, "Significance of security information and event management (SIEM) in modern organizations," Int. J. Innov. Technol. Explor. Eng., vol. 8, no. 7, pp. 432–435, 2019.

[7]       M. Vielberth and G. Pernul, "A Security Information and Event Management Pattern," Fed. Minist. Educ. Res., vol. 1, no. November 2018, pp. 1–12, 2018.

[8]       H. Jauhiainen, "Designing End User Area Cybersecurity for Cloud-based Organization," no. February 2021.

[9]       A. Chuvakin, "Gartner Blog Network," 2013. https://blogs.gartner.com/anton-chuvakin/2013/07/26/named-endpoint-threat-detection-response/ (accessed July 2021).

[10]     Mcafee, "What is Endpoint Detection and Response (EDR)? " 2021.

[11]     "Endpoint Detection and Response - Global Market Outlook (2017-2026)," Stratistics Market Research Consulting, 2018. https://www.marketresearch.com/Stratistics-Market-Research-Consulting-v4058/Endpoint-Detection-Response-Global-Outlook-12066121/ (accessed July 2021).

[12]     L. Neely and A. Torres, "Endpoint Protection and Response: A SANS Survey," SANS Inst., no. June, p. 16, 2018.

[13]     J. Petters, "What is SIEM? A Complete Beginner's Guide - Varonis," 2020. https://www.varonis.com/blog/what-is-siem/ (accessed July 2021).

[14]     Cisco, “What is XDR? - Extended Detection and Response - Cisco,” 2021. https://www.cisco.com/c/en/us/products/security/what-is-xdr.html (accessed July 2021).

[15]     Mcafee, "What Is XDR? Extended Detection and Response l McAfee," 2021. https://www.mcafee.com/enterprise/en-us/security-awareness/endpoint/what-is-xdr.html (accessed July 2021).

[16]     "Endpoint Detection and Response (EDR): o caso do contexto | Security Report," 2019. https://www.securityreport.com.br/overview/endpoint-detection-and-response-edr-o-caso-do-contexto/#.YPc5kRNKj0p (accessed July 2021).


Detection and Prevention of TCP SYN Flood DoS Attacks: Concepts

Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.

Authors

Pedro Ramos Brandao, Coordinator Professor at Instituto Superior de Tecnologias Avançadas
Jeremias Tavares, Master Degree Student at Instituto Superior de Tecnologias Avançadas

Media

PDF

To cite this article

Pedro Ramos Brandao, Jeremias Tavares, <strong>Detection and Prevention of TCP SYN Flood DoS Attacks: Concepts </strong> DOI: 10.31112/kriativ-tech-2021-10-57

Abstract

Internet security is a topic of high importance, and in recent years it has gained greater popularity with the growing wave of DoS attacks perpetuated through TCP SYN Flood. This kind of attack has several types of motivation: political, unfair competition, human evil. It is intended to deepen the concepts related to this type of attack architecture and which vulnerabilities are exploited that possibly facilitate the success of the SYN Flood. The central attack prevention systems, IDS and IPS, are presented conceptually. A simulation of the attack in a virtually recreated environment is depicted as proof of concept and execution. In contrast, there is evidence of the greater demand and growing sophistication of the means of detection and prevention using modern technologies.

Keywords

Cybersecurity, IDS, IPS, SYN Flood, DoS

References

[1] A. Verma, R. Saha, G. Kumar, and T. Kim, "The Security Perspectives of Vehicular Networks: A Taxonomical Analysis of Attacks and Solutions", Appl. Sci., vol. 11, no. 10, 2021, doi: 10.3390/app11104682.

[2] A. E. Ibor, F. A. Oladeji, O. B. Okunoye, and O. O. Ekabua, "Conceptualisation of Cyberattack prediction with deep learning", Cybersecurity, vol. 3, no. 1, 2020, doi: 10.1186/s42400-020-00053-7.

[3] Y. Shen, E. Mariconti, P. A. Vervier, and G. Stringhini, "Tiresias: Predicting Security Events Through Deep Learning", in Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018, pp. 592–605, doi: 10.1145/3243734.3243811.

[4] K. K. Nguyen, D. T. Hoang, D. Niyato, P. Wang, D. Nguyen, E. Dutkiewicz, "Cyberattack detection in mobile cloud computing: A deep learning approach", 2018 IEEE Wireless Communications and Networking Conference (WCNC), Barcelona, pp. 1-6 2018, http://hdl.handle.net/10453/131928.

[5] Q. Zhang, K. Liu, Y. Xia, & A. Ma, "Optimal Stealthy Deception Attack Against Cyber-Physical Systems", IEEE transactions on cybernetics, 50(9), 2019, 3963–3972. https://doi.org/10.1109/TCYB.2019.2912622

[6] M. Al-Qatf, Y. Lasheng, M. Al-Habib, K. Al-Sabahi, "Deep learning approach combining sparse autoencoder with SVM for network intrusion detection", IEEE Access 6, pp. 843–856, 2018.

[7] B. Bouyeddou, B. Kadri, F. Harrou, Y. Sun, "DDOS-attacks detection using an efficient measurement-based statistical mechanism", Eng. Sci. Technol. an Int. J., vol. 23, no. 4, pp. 870–878, 2020, doi: 10.1016/j.jestch.2020.05.002.

[8] S. Shin, V. Yegneswaran, P. Porras, G. Gu, "AVANT-GUARD: Scalable and Vigilant Switch Flow Management in Software-Defined Networks", in Proceedings of the 2013 ACM SIGSAC Conference on Computer &amp; Communications Security, 2013, pp. 413–424, doi: 10.1145/2508859.2516684.

[9] M. Junaid et al., "An Indigenous Solution for SYN Flooding", Rev. GEINTEC-GESTAO Inov. E Tecnol., vol. 11, no. 4, pp. 2998–3022, 2021

[10] M. Rahouti, K. Xiong, N. Ghani, F. Shaikh, "SYNGuard: Dynamic threshold-based SYN flood attack detection and mitigation in software-defined networks", IET Networks, vol. 10, no. 2, pp. 76–87, 2021, doi: https://doi.org/10.1049/ntw2.12009.

[11] N. McKeown et al., "OpenFlow: Enabling innovation in campus networks", Comput. Commun. Rev., vol. 38, pp. 69-74, 2008, doi: 10.1145/1355734.1355746.

[12] E. Grimit, T. Gneiting, V. Berrocal, N.A. Johnson, "The continuously ranked probability score for circular variables and its application to mesoscale forecast ensemble verification", Quart. J. R. Meteorol. Soc. 132 (621C) 2006, https://doi.org/10.1256/qj.05.235.

[13] J. Matheson, R. Winkler, "Scoring rules for continuous probability distributions", Manage. Sci. 22 (10) 1087–1096, 1976, https://doi.org/10.1287/mnsc.22.10.1087.

[14] S. Fichera, L. Galluccio, S. Grancagnolo, G. Morabito, S. Palazzo, "Operetta: An OpenFlow-based remedy to mitigate TCP synflood attacks against web servers", Computer Networks, 92:89–100, 2015.

[15] R. Mohammadi, R. Javidan, M. Conti. "Slicots: An sdn-based lightweight countermeasure for TCP syn flooding attacks", IEEE Transactions on Network and Service Management, 2017.

[16] B. A. Khalaf et al., "A simulation study of syn flood attack in a cloud computing environment," AUS J., vol. 26, no. 1, pp. 188–197, 2019.


Technology, Empowerment and Economic Development

Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.

Authors

João Gonçalves, Assistant Professor at ISTEC

Media

PDF

To cite this article

João Gonçalves, Technology, Empowerment and Economic DevelopmentDOI: 10.31112/kriativ-tech-2021-10-50

Abstract

This article is based on a research whose objective was to identify and analyze, in the current context of technological development related to new forms of production and organization of working times, the main impacts that are expected regarding the future of labor, the adequacy of resource qualification, and the challenges of society and economic activity.
The research has shown that technological progress, being fundamental to the sustainability of business and economy, requires adjustments at the level of resources, society and companies' empowerment, the State's crucial role in supporting and creating the conditions through public policies for development and economic recovery.

Keywords

Technology, empowerment, economic development, public policy

References

[1] Ferreira, Joana (2019). Which are the most demanded jobs by the employers in Portugal?
Eco online. August 13th - available at https://eco.sapo.pt/2019/08/13/quais-as-funcoes- mais-procuradas-pelos-empregadores-em-portugal/; accessed on 04-07-2021
[2] Nuñez, Jesus (2021). Digitalization: a path of opportunity or an inequality factor? Eco online. July 8 - available at
https://eco.sapo.pt/opiniao/digitalizacao-um-caminho-de-oportunidades-ou-um-fator-de-desigualdade/; accessed on10-07-2021
[3] European Court of Auditors (2020). European Industry Digitization: an ambitious initiative whose success depends on the continued commitment of the EU, governments, and companies. Luxembourg. EU Publications Services
[4] Teixeira, Sebastião (2013). Organizations Management. Escolar editora, 3rd edition, Lisbon
[5] Page, Michael (2021). The impact of robots on employment. Available at
https://www.michaelpage.pt/not%C3%ADcias-estudos/estudos/fw-o-trabalho-do-futuro/o-impacto-dos-rob%C3%B4s-no-emprego; accessed on 04.07.2021
[6] Mills, Corinne (2021). Fluid skills. In Michael Page. Available at https://www.michaelpage.pt/not%C3%ADcias-estudos/estudos/fw-o-trabalho-do-futuro/compet%C3%AAncias-flu%C3%ADdas; accessed on 11-07-2021
[7] OECD (2019). OECD Employment Outlook 2019: The Future of Work, OECD Publishing, Paris
[8] Portuguese Republic (2021). Green Paper on the Future of Work. Working draft, CPCS discussion
[9] Ministry of Planning (2021). Portugal 2030 Strategy. Strategic Framework Document
[10] International group that gathers the world's most ambitious digital governments, with the common goal of using digital capabilities to improve businesses and citizens' lives
[11] Informal group, created on October 5, 2020, gathering those European countries considered leaders in digital transformation
[12] D9+ members include Denmark, Finland, Sweden, the Netherlands, Luxembourg, Belgium, the United Kingdom, Ireland, and Estonia, joined by the Czech Republic, Poland, and Portugal
[13] European Commission (2020), Digital Economy and Society Index (DESI) 2020
[14] RCM no. 98/2020, of November 13
[15] Decree Law No. 13/2015, of January 26 - Article 3, paragraph 2, a)
[16] Moura, João (1986). Labor Economics. Oliveira Martins Foundation, Labor Studies collection


The (weak) involvement of women in ICT and IS: the case of ISTEC-Porto

Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.

Authors

João Emílio Almeida, Assistant Professor at ISTEC-Porto
Mariana Carneiro, Student at ISTEC-Porto
Mariana Silva, Student at ISTEC-Porto

Media

PDF

To cite this article

João Emílio Almeida, Mariana Carneiro, Mariana Silva , The (weak) involvement of women in ICT and IS: the case of ISTEC-Porto DOI: 10.31112/kriativ-tech-2021-10-51

Abstract

The aim of this article is to point out some insight at the low female presence in higher education courses related with ICT/IS. What are the reasons that lead most students to seek courses linked to new technologies, such as computing, artificial intelligence, cybersecurity, internet, and cloud computing, to be male whilst fewer female students follow that direction? To better contextualize this issue, data from the last 15 years at ISTEC-Porto are presented, where gender inequality is evident. Some of the reasons found in the literature are indicated and possible solutions to reduce this gender imbalance are pointed out.

Keywords

Gender inequality, digital inclusion, higher education, information technologies.

References

[1] He, J.C., Kang, S.K., Tse, K., & Toh, S.M. (2019). Stereotypes at work: Occupational stereotypes predict race and gender segregation in the workforce. Journal of Vocational Behavior, 115 (2019), 1-17.
[2] Vainionpaa, F., Kinnula, M., Iivari, N., & Molin-Juustila, T. (2019). Gendering and segregation in girls’ perceptions of IT as a career choice – a nexus analytic inquiry. In Proceedings of the 28th International Conference on Information Systems Development, Toulon, France.
[3] Almeida, B. F. D. (2020). Participação feminina no setor de sistemas de informação/tecnologias de informação em Portugal: evidência empírica (in Portuguese, Master thesis, Instituto Superior de Economia e Gestão).
[4] O’Donnell, A., & Sweetman, C. (2018). Introduction: Gender, development and ICTs. Gender & Development, 26(2), 217-229.
[5] Lang, C., Craig, A., Fisher, J., Bennetts, K., & Forgasz, H. (2010). Dualisms: what women say about working in ICT. In Proceedings of the 21st Australasian Conference on Information Systems, Brisbane, Australia.
[6] Isaacson, W. (2014). The innovators: How a group of inventors, hackers, geniuses and geeks created the digital revolution. Simon and Schuster.
[7] Williams, Kathleen Broome (2001). Improbable Warriors: Women Scientists and the U.S. Navy in World War II. Annapolis, Maryland: Naval Institute Press. ISBN 978-1-55750-961-1.
[8] Naval Historical Center. https://web.archive.org/web/20000119173039/http://history.navy.mil/photos/images/h96000/h96566kc.htm (accessed Aug. 21, 2021).
[9] N. Salim, Meet the "Mother of the Internet [Women to Watch], in IEEE Women in Engineering Magazine, vol. 4, no. 2, pp. 10-12, Dec. 2010, doi: 10.1109/MWIE.2010.938214.
[10] Dr. Radia J. Perlman. NV Access Limited, NVDA Screen Reader. https://www.nae.edu/130123/Dr-Radia-J-Perlman (accessed Aug. 21, 2021).
[11] Leonel Morgado; et al. (2006). Radia Perlman – A pioneer of young children computer programming. Current Developments in Technology-Assisted Education: 1903–1908. doi: 10.1.1.99.8166
[12] The Shalvi / Hyman Encyclopedia of Jewish Women, https://jwa.org/encyclopedia/article/perlman-radia (accessed Aug. 23, 2021).
[13] National Academy of Engineering https://www.nae.edu/MembersSection/Directory20412/27854.aspx (accessed Aug. 23, 2021).
[14] Steele Jr., Guy (2011). “An interview with Frances E. Allen”.Communications of the ACM. 54:39–45. doi:10.1145/1866739.1866752
[15] Martins, P. S. M. (2011). Mulheres nas ciências e tecnologias: escolhas e constrangimentos (in Portuguese, Master thesis, Universidade do Minho). https://repositorium.sdum.uminho.pt/handle/1822/15823
[16] Corneliussen, H. G. (2021). Women empowering themselves to fit into ICT. In Technology and Women's Empowerment. Taylor & Francis.
[17] Portuguese Women {In Tech} https://www.portuguesewomenintech.com/awards2021 (accessed Sept. 9, 2021).


MOOC accomplishment through gamification

Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.

Authors

Bruno Miguel Pinheiro, Master Degree Student at Instituto Superior de Tecnologias Avançadas
Paulo Duarte Branco, Assistant Professor at Instituto Superior de Tecnologias Avançadas, Centro de Investigação em Artes e Comunicação

Media

PDF

To cite this article

Bruno Miguel Pinheiro, Paulo Duarte Branco, MOOC accomplishment through gamification  DOI: 10.31112/kriativ-tech-2021-10-52

Abstract

This article approaches the concept of gamification in teaching and learning contexts, mainly in Massive Open Online Courses (MOOC), to increase the motivation and commitment of students in the perseverance to complete the course. The use of game elements and concepts prompts an important factor in the way methodologies move toward for the development of student-directed courses.

Keywords

Gamification, MOOC, Motivation, Engagement, game-based learning.

References

[1] R. F. da SILVA and E. S. Correa, “Novas tecnologias e educação: a evolução do processo de ensino e aprendizagem na sociedade contemporânea,” Educ. e Linguagem, ano, vol. 1, no. 1, pp. 23–25, 2014.
[2] Statista, “Internet users by age worldwide | Statistic,” 27 de Janeiro de 2021, 2021. https://www.statista.com/statistics/272365/age-distribution-of-internet-users-worldwide/ (accessed Feb. 19, 2021).
[3] D. Cormier and G. Siemens, “Through the open door: Open courses as research, learning, and engagement,” Educ. Rev., vol. 45, pp. 30–39, 2010.
[4] W. Feng, J. Tang, and T. X. Liu, “Understanding Dropouts in MOOCs,” Proc. AAAI Conf. Artif. Intell., vol. 33, no. 01, pp. 517–524, 2019, doi: 10.1609/aaai.v33i01.3301517.
[5] D. Onah, J. Sinclair, and R. Boyatt, “Dropout Rates of Massive Open Online Courses: Behavioural Patterns,” 2014, doi: 10.13140/RG.2.1.2402.0009.
[6] K. Werbach, Level 1: Getting into the Game: An Introduction to Gamification. Wharton Digital Press, 2012.
[7] M. Khalil, M. Ebner, and W. Admiraal, “How can gamification improve MOOC student engagement,” in Proceedings of the 11th European Conference on Games Based Learning: ECGBL, 2017, pp. 819–828.
[8] N. F. Abu Bakar, A. F. Yusof, N. A. Iahad, and N. Ahmad, “Framework for embedding gamification in Massive Open Online Course (MOOC),” in 2017 International Conference on Research and Innovation in Information Systems (ICRIIS), 2017, pp. 1–5, doi: 10.1109/ICRIIS.2017.8002496.
[9] N. Spyropoulou, G. Demopoulou, C. Pierrakeas, I. Koutsonikos, and A. Kameas, “Developing a Computer Programming MOOC,” Procedia Comput. Sci., vol. 65, pp. 182–191, 2015, doi: https://doi.org/10.1016/j.procs.2015.09.107.
[10] L. N. M. Bezerra, M. Silva, and Autor, “A review of literature on the reasons that cause the high dropout rates in the MOOCS,” 2017.
[11] D. Shah, “By The Numbers: MOOCs in 2020,” Class Central, Nov. 2020. https://www.classcentral.com/report/mooc-stats-2020/.
[12] O. B. Gené, M. M. Núñez, and Á. F. Blanco, “Gamification in MOOC: Challenges, opportunities and proposals for advancing MOOC model,” in ACM International Conference Proceeding Series, 2014, pp. 215–220, doi: 10.1145/2669711.2669902.
[13] O. Borras-Gene, M. Martiñez-nunez, and Á. Fidalgo-Blanco, “New Challenges for the motivation and learning in engineering education using gamification in MOOC,” Int. J. Eng. Educ., vol. 32, no. 1, pp. 501–512, 2016.
[14] G. Zichermann and C. Cunningham, “Gamification by design implementing game mechanics in web and mobile apps,” O’Reilly Media, 2011.
[15] A. Antonaci, R. Klemke, K. Kreijns, and M. Specht, “Get Gamification of MOOC right! How to Embed the Individual and Social Aspects of MOOCs in Gamification Design.,” Int. J. Serious Games, vol. 5, no. 3, pp. 61–78, 2018, doi: 10.17083/ijsg.v5i3.255.
[16] G. Kiryakova, N. Angelova, and L. Yordanova, “Gamification in education,” 2014.
[17] R. M. Ryan and H. Patrick, “Self-determination theory and physical,” Hell. J. Psychol., vol. 6, pp. 107–124, 2009.
[18] K. M. Kapp, L. Blair, and R. Mesch, The gamification of learning and instruction fieldbook: ideas into practice. Wiley, 2014.
[19] R. Hunicke, M. Leblanc, and R. Zubek, “MDA : A Formal Approach to Game Design and Game Research,” 2004.


Smart Recycle – Development of a waste collection application

Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.

Authors

Fábio Oliveira da Silva, Master Degree Student at Instituto Superior de Tecnologias Avançadas
Paulo Duarte Branco, Assistant Professor at Instituto Superior de Tecnologias Avançadas, Centro de Investigação em Artes e Comunicação

Media

PDF

To cite this article

Fábio Oliveira da Silva, Paulo Duarte Branco, <strong>Smart Recycle – Development of a waste collection application </strong> DOI: 10.31112/kriativ-tech-2021-10-53

Abstract

Currently, the growing population demand for new technological resources, its housing growth and economic growth has brought to the fore a global discussion about how we should progress as a nation without affecting people's health and the planet's natural course in the coming years. Figures from 2019 indicate that each habitant produces 513.4 kilos of waste annually. The Portuguese environment agency has warned that these resources will be too destined for landfills, which will stop almost three out of five kilos (57.6%) of our urban waste.
The country's effective recycling rate is (23.7%), when compared to the targets set by the European Union for the year 2025 (55%) Portugal needs impulses and some actions to encourage smart and conscious recycling.
One of the factors addressed in this article is the uncontrolled advance of waste generated by individuals and companies, ways in which they are discarded in nature, actions that the government has taken and how the authors intend to help improve these numbers, bringing the country closer to the goals established by European Union.
Important facts about waste recycling are:

• Without some type of inspection / incentive / appropriate disposal site or help, many inhabitants choose to dispose of garbage in a simpler and easier way;
• There are not enough selective collection points in most countries/cities, or these cannot be easily found by the inhabitants;
• Access to public services for collection at home is very scarce and/or poorly managed;
• Material characteristics identification is ineffective and does not allow proper disposal;
• It is easier to use the “common trash” option if there is no incentive or any policy to raise awareness among the inhabitants;
• Correct recycling brings countless benefits not only to the inhabitants and the environment, but also to the economy and industries in general.

As a result of the study, tools in the form of mobile systems and applications with various control resources and intuitive assistants will be delivered in order to facilitate and make more pleasurable and exciting the way in which waste is characterized, disposed and reused by different organizational spheres to considerably reduce incorrect disposal and mitigate this impact on our planet thus making it healthier and less toxic for us and our future generations.

Keywords

Applications, conscious recycling, economic growth, mobile systems, sustainability, waste collection.

References

1. D. Bonino, M. T. D. Alizo, C. Pastrone and M. Spirito, "WasteApp: Smarter waste recycling for smart citizens," 2016 International Multidisciplinary Conference on Computer and Energy Science (SpliTech), Split, Croatia, 2016, pp. 1-6, doi: 10.1109/SpliTech.2016.7555951.
2. European Commission. https://ec.europa.eu/environment/waste/index.htm
3. Sa S. B¨ohm, B. Igler, R. Morales, F. Sand, and A. Ertan, “Sauberes
wiesbaden app: Introducing mobile e-participation for a clean city
project in germany,” in Proceedings of the 14th International Conference
on Mobile and Ubiquitous Multimedia, ser. MUM ’15. New York, NY,
USA: ACM, 2015, pp. 426–429.
4. M. Fishbein and I. Ajzen, Belief, Attitude, Intention, and Behavior: An
Introduction to Theory and Research. Addison-Wesley, 1975.
5. P.-Y. Chu and J.-F. Chiu, “Factors influencing household waste recycling
behavior: Test of an integrated model1,” Journal of Applied Social
Psychology, vol. 33, no. 3, pp. 604–626, 2003.
6. J. Berengueres, F. Alsuwairi, N. Zaki, and T. Ng, “Emo-bin: How to
recycle more by using emoticons,” in Proceedings of the 8th ACM/IEEE
International Conference on Human-robot Interaction, ser. HRI ’13.
Piscataway, NJ, USA: IEEE Press, 2013, pp. 397–398.
7. “Gamification of a recycle bin with emoticons,” in Proceedings
of the 8th ACM/IEEE International Conference on Human-robot Interaction,
ser. HRI ’13. Piscataway, NJ, USA: IEEE Press, 2013, pp. 83–84.
8. Thieme, R. Comber, J. Miebach, J. Weeden, N. Kraemer, S. Lawson,
and P. Olivier, “we’ve bin watching you”: Designing for reflection and
social persuasion to promote sustainable lifestyles,” in Proceedings of
the SIGCHI Conference on Human Factors in Computing Systems, ser.
CHI ’12. New York, NY, USA: ACM, 2012, pp. 2337–2346.
9. D. Casado-Mansilla, D. Foster, S. Lawson, P. Garaizar, and D. L´opez-de
Ipi˜na, “’close the loop’: An ibeacon app to foster recycling through justin-
time feedback,” in Proceedings of the 33rd Annual ACM Conference
Extended Abstracts on Human Factors in Computing Systems, ser. CHI
EA ’15. New York, NY, USA: ACM, 2015, pp. 1495–1500.
10. F. M. Lansana, “A comparative analysis of curbside recycling behavior
in urban and suburban communities*,” The Professional Geographer,
vol. 45, no. 2, pp. 169–179, 1993.
11. P. Vicente and E. Reis, “Factors influencing households’ participation in
recycling,” Waste Management & Research, vol. 26, no. 2, pp. 140–146,
2008.
12. D. Ziouzios and M. Dasygenis, "A Smart Recycling Bin for Waste Classification," 2019 Panhellenic Conference on Electronics & Telecommunications (PACET), 2019, pp. 1-4, doi: 10.1109/PACET48583.2019.8956270.
13. R. Elhassan, M. A. Ahmed and R. AbdAlhalem, "Smart Waste Management System for Crowded area : Makkah and Holy Sites as a Model," 2019 4th MEC International Conference on Big Data and Smart City (ICBDSC), 2019, pp. 1-5, doi: 10.1109/ICBDSC.2019.8645576.
14. Entenda a escala de Likert e como aplica-la em sua pesquisa (pesquisado em 28/5/2021). https://mindminers.com/blog/entenda-o-que-e-escala-likert/


Overview of 5G cellular networks

Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.

Authors

Sérgio Pinto, Teaching Assistant at ISTEC

Media

PDF

To cite this article

Sergio Pinto, <strong>Overview of 5G cellular networks </strong> DOI: 10.31112/kriativ-tech-2021-10-56

Abstract

The 5G technology corresponds to the 5th generation of mobile cellular networks, which, by the time this paper was written, was not yet commercially available in some countries, like Portugal. Therefore, the reason for this paper subject is to make known a general description of this new 5G technology, namely, its main improvements in respect to the previous 4th generation: the support of higher data transmission rates, enabling a network capacity/connectivity increase and the lower radio transmission latency, with their benefits for users and operators.

Keywords

5G, eMBB, mMTC, URLLC, CUPS, SBA, virtualization, cloud, slicing

References

[1] Correia, Luis M, 5G Mobile Communications, Instituto Superior Técnico / INESC-ID, University of Lisbon, Portugal

[2] Rommer S., Hedman P., Olsson M., Frid L., Sultana S., Mulligan C. (2020), 5G Core Networks, Powering Digitalization, Academic Press

[3] Pinto, Sérgio (2013), General perspective of 4G cellular networks, Kriativ.Tech journal, Edition 5, from Instituto Superior de Tecnologias Avançadas (ISTEC). Retrieved from:
http://kriativ-tech.pt/wp-content/uploads/2017/12/KriativTechEdicao005.pdf?x45251

[4] EventHelix (2017), 5G NR: The New Radio interface for 5G. Retrieved from:
https://medium.com/5g-nr/5g-nr-the-new-radio-interface-for-5g-2b769a59ea80

[5] Alepo (2019), 5G SA vs. 5G NSA: What Are The Differences? Retrieved from:
https://www.alepo.com/5g-sa-vs-5g-nsa-what-are-the-differences/

[6] Samsung (2019), 5G Core Vision, Revolutionary changes in Core with the arrival of 5G. Retrieved from:
https://image-us.samsung.com/SamsungUS/samsungbusiness/pdfs/5G_Core_Vision_Technical_Whitepaper.pdf

[7] Kosak S. (2019), Evolution of Core Network (3G vs. 4G vs. 5G). Retrieved from:
https://medium.com/@sarpkoksal/core-network-evolution-3g-vs-4g-vs-5g-7738267503c7

[8] Pinto, Sérgio (2019), General Perspective of Network Functions Virtualization, Kriativ.Tech journal, Edition 8, from Instituto Superior de Tecnologias Avançadas (ISTEC). Retrieved from:
http://www.kriativ-tech.com/?p=66135

[9] 3GPP Technical Specification (TS) 23.501 version 15.3.0 Release 15 (2017); 5G; System Architecture for the 5G System. Retrieved from: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3144

[10] Evopedia (2021), 5G Service-Based Architecture. Retrieved from:
https://devopedia.org/5g-service-based-architecture

[11] NGMN Alliance (2018), Service-Based Architecture in 5G. Retrieved from:
https://www.ngmn.org/wp-content/uploads/Publications/2018/180119_NGMN_Service_Based_Architecture_in_5G_v1.0.pdf

[12] Test and Verification (2018), 5G Usage Scenarios in Non-Standalone (NSA) and Standalone (SA) Operation. Retrieved from:
https://www.testandverification.com/5g-usage-scenarios-nsa-sa

[13] Semiconductor Engineering (2019), Should We Even Be Talking About 6G? Retrieved from:
https://semiengineering.com/should-we-even-be-talking-about-6g/

[14] EAHISON (2019), Characteristics Of 5G Network And Evolution Of Antenna Requirements. Retrieved from:
http://www.eahison.com/5g-network-evolution-of-antenna-requirements.html

[15] Telit, LTE Evolution: Standardization & Deployment The long run to 5G. Retrieved from:
https://www.telit.com/lte-evolution-standardization-and-deployment-the-long-run-to-5g/#mimo

[16] GoTechinicalNow, 5G Core Service-Based Architecture (SBA) Part 2. Retrieved from:
http://gotechnicalnow.com/5g-core-service-based-architecture-sba-part-2/

[17] Pathak R., A Beginners Guide for 5G Core Network Architecture. Retrieved from:
https://www.rajarshipathak.com/2020/01/beginners-guide-for-5g-core-network-architecture.html