Applications of Artificial Intelligence in Neuroscience Research: an Overview
Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.
Authors
João Emílio Almeida, Assistant Professor at ISTEC Porto
Carlos Teixeira, Student at ISTEC-Porto
João Morais, Student at ISTEC-Porto
Ernesto Oliveira, Student at ISTEC-Porto
Luís Couto, Student at ISTEC-Porto
Media
To cite this article
João Emílio Almeida, Carlos Teixeira, João Morais, Ernesto Oliveira, Luís Couto, Applications of Artificial Intelligence in Neuroscience Research: an Overview
DOI: 10.31112/kriativ-tech-2022-06-75
Abstract
This article presents a review of how artificial intelligence (AI) supports neuroscience investigations and explores a case study where it is applied. AI has an important role to play in research, because it focuses on the mechanisms that generate intelligence and cognition. Neuroscience benefits from AI techniques and increased computing power to improve the interpretation of brain behaviors, having focused on the reciprocal importance that both areas have on research & development. In the future, it is expected that both neuroscience and AI will increase their results of research and empirical advances, accelerating the knowledge of these areas of research and science.
Keywords
Artificial Intelligence, Neuroscience Research, Applied AI.
References
[1] McCarthy, J. & Minsky, M., (2006). A Proposal for the Dartmouth Summer Research Project on Artificial Intelligence. AI Magazine. 27(4), 12-14.
[2] Built In. (2021) 32 Examples of AI in healthcare that will make you feel Better About the Future, https://builtin.com/artificial-intelligence/artificial-intelligence-healthcare
[3] Human Brain Project. (2020) Discover EBRAINS A key enabler to advance brain science, https://www.humanbrainproject.eu/en/
[4] J. Frye, R. Ananthanarayanan, and D. S. Modha. (2007) Towards real-time, mouse-scale cortical simulations, IBM Research Report RJ10404
[5] Goldman, J.S., Kusch, L., Yalcinkaya, B.H., Depannemaecker, D., Nghiem, T-A., Jirsa, V. and Destexhe, A., (2020). Brain-scale emergence of slow-wave synchrony and highly responsive asynchronous states based on biologically realistic population models simulated in The Virtual Brain. bioRxiv.
https://doi.org/10.1101/2020.12.28.424574
[6] V. Braitenberg and A. Schuz. (1991) Anatomy of the Cortex: Statistics and Geometry. Springer.
[7] H. Markram. (2006) The blue brain project. Nature Reviews Neuroscience, 7 (2), 153–160.
[8] Gonzalez, R.T., Riascos, J.A., Barone, D.A.C. (2017) How Artificial Intelligence is Supporting Neuroscience Research: A Discussion About Foundations, Methods and Applications. In: Barone D., Teles E., Brackmann C. (eds) Computational Neuroscience. LAWCN 2017. Communications in Computer and Information Science, vol 720. Springer.
[9] SAS Institute Inc. (2021) Deep Learning https://doi.org/10.1 007/978-3-319-71011-2_6
[10] Hassabis D, Kumaran D, Summerfield C, Botvinick M. (2017) Neuroscience-Inspired Artificial Intelligence, Neuron, 95(2). https://doi.org/10.1016/j.neuron.2017.06.011
[11] Marblestone H, Wayne G, Kording KP. (2016). Toward an integration of deep learning and neuroscience. Front. Comput. Neurosci., 10, p. 94
[12] Ribeiro, J. (2021) Neuroética e Inteligência Artificial, Jornal Público, (in Portuguese). https://www.publico.pt/2021/02/11/opiniao/noticia/neuroetica-inteligencia-artificial-1950013 consulted on May 7, 2022.
[13] Parlamento Europeu (2020) Parlamento na vanguarda das normas europeias sobre inteligência artificial, (in Portuguese) https://www.europarl.europa.eu/news/pt/press-room/20201016IPR89544/parlamento-na-vanguarda-das-normas-europeias-sobre-inteligencia-artificial consulted on May 7, 2022.
[14] Antunes, J. (2010, Janeiro, 18) Neurociências, os Avanços e os Desafios que se Colocam, VI Conferência da Indústria Farmacêutica, Lisboa. (in Portuguese) https://www.medicina.ulisboa.pt/newsfmul-artigo/11/vi-conferencia-da-industria-farmaceutica consulted on May 7, 2022.
Honeypot - a weapon for cyber combat
Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.
Authors
Paulo V. Monteiro, Assistant Professor at ISTEC Porto
João Emílio Almeida, Assistant Professor at ISTEC Porto
Diogo Cunha, Student at ISTEC-Porto
Diana Rodrigues, Student at ISTEC-Porto
Media
To cite this article
Paulo V. Monteiro,João Emílio Almeida, Diogo Cunha e Diana Rodrigues, CHoneypot - a weapon for cyber combat
DOI: 10.31112/kriativ-tech-2022-06-71
Abstract
In this article the honeypot concept is presented, starting with its features, advantages, and disadvantages. High and low interactivity honeypot types are detailed and compared. An open implementation is provided by means of an example, showing how honeypots can be used as an asset defending against cyberattacks.
Keywords
Honeypot; Hacker; Computer Security; Cybersecurity; Countermeasures; Open code; T-Pot.
References
[1] Misa, Thomas J. (2016). "Computer Security Discourse at RAND, SDC, and NSA (1958-1970)". IEEE Annals of the History of Computing. 38 (4): 12–25. doi:10.1109/MAHC.2016.48. S2CID 17609542.
[2] The Portuguese News (2022). “Hospital target of cyberattack”. https://www.theportugalnews.com/news/2022-04-26/hospital-target-of-cyberattack/66614 consulted on May 7, 2022.
[3] Silicon Republic (2022). “Targeted cyberattack takes out Vodafone Portugal”. https://www.siliconrepublic.com/enterprise/vodafone-portugal-cyberattack, consulted on May 7, 2022.
[4] Cybernews (2022). “Major Portuguese media conglomerate hit by ransomware”. https://cybernews.com/news/major-portuguese-media-conglomerate-hit-by-ransomware/, , consulted on January 15, 2022.
[5] Reuters (2022). “Portugal's largest retailer's websites, some services hit by hackers”. https://www.reuters.com/technology/portugals-largest-retailers-websites-some-services-hit-by-hackers-2022-03-30/, consulted on May 7, 2022.
[6] Szor,Peter.The Art Of Computer Virus Research. Addison Wesley Professional,2005.
[7] Cheswick, Bill (1992). "An Evening with BerferdIn Which a Cracker is Lured, Endured, and Studied" (PDF). http://cheswick.com/ches/papers/berferd.pdf Retrieved 3 Feb 2022.
[8] Singh, R. K., & Ramajujam, P. (2009). Intrusion Detection System Using Advanced Honeypots. arXiv preprint arXiv:0906.5031.
[9] Nicomette, V., Kaâniche, M., Alata, E., & Herrb, M. (2011). Set-up and deployment of a high-interaction honeypot: experiment and lessons learned. Journal in computer virology, 7(2), 143-157.
[10] Mokube, I., & Adams, M. (2007, March). Honeypots: concepts, approaches, and challenges. In Proceedings of the 45th annual southeast regional conference (pp. 321-326).
Celebration of the 5th Centenary of Fernão de Magalhães´s circumnavigation voyage
Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.
Authors
Luísa Orvalho,Professor Coordinator at ISTEC Porto
João Sousa, Undergraduate in Multimedia Engineering at ISTEC Porto
Lucas Brito, Undergraduate in Multimedia Engineering at ISTEC Porto
Media
To cite this article
Luísa Orvalho, João Sousa e Lucas Brito, Celebration of the 5th Centenary of Fernão de Magalhães´s circumnavigation voyage
DOI: 10.31112/kriativ-tech-2022-06-72
Abstract
Keywords
References
[1] Carlos Fiolhais e Décio Martins (2010). Breve História da Ciência em Portugal. Gradiva
[2] Castro.M.J(n.d).Fernão de Magalhães.FSCH.http://www.fcsh.unl.pt/artravel/pdf/TS-42.pdf
[3] Lusa.(2020,outubro).V Centenário Magalhães. Oito projetos de investigação financiados com 2,3 milhões de euros.Observador.https://observador.pt/2020/10/21/v-centenario-magalhaes-oito-projetos-de-investigacao-financiados-com-23-milhoes-de-euros/
[4] Lusa.(2018,setembro). Talvez ainda haja coisas para descobrir sobre a viagem de Fernão de Magalhães.Diário De Notícias. https://www.dn.pt/vida-e-futuro/talvez-ainda-haja-coisas-para-descobrir-sobre-a-viagem-de-magalhaes----biografo-9894643.html
[5] República Portuguesa.Defesa Nacional.(2019,janeiro).Comemorações dos 500 anos da circum-navegação de Fernão de Magalhães.https://www.defesa.gov.pt/pt/comunicacao/noticias/Paginas/Comemorações-dos-500-anos-da-circum-navegação-de-Fernão-de-Magalhães.
[6] República Portuguesa.Governo Português.(2021,novembro)Relato da viagem de circum-navegação de Fernão de Magalhães candidato à Memória do Mundo da UNESCO.https://www.portugal.gov.pt/pt/gc22/comunicacao/noticia?i=documentos-da-viagem-de-fernao-de-magalhaes-candidatos-a-memoria-da-unesco
[7] República Portuguesa.Marinha Portuguesa.(2019,setembro). Efeméride | início da viagem de circum navegação.https://ccm.marinha.pt/pt/museumarinha_web/multimedia_web/Paginas/efemeride-inicio-viagem-circumnavegacao-magalhaes---20set19.aspx
[8] República Portuguesa.Marinha Portuguesa .(n.d.).Magalhães 500 anos da circum-navegação.https://www.marinha.pt/pt/magalhaes500anos
[9] Vieira.N.(2019,agosto). Como as navegações de Fernão de Magalhães há 500 anos impactaram a humanidade.CanalTech. https://canaltech.com.br/ciencia/como-as-navegacoes-de-fernao-de-magalhaes-ha-500-anos-impactaram-a-humanidade-145871/
[10] Silva.A.S.(2019,abril).A Viagem de Circum-Navegação como inspiração para agir hoje.Portal Diplomatico.https://portaldiplomatico.mne.gov.pt/images/noticias/2019/A_Viagem_de_Circum-Navegação_como_inspiração_para_agir_hoje.pdf
[11] Wikipedia.(2017,abril).Globalização.Wikipedia.[Webpage].https://pt.wikipedia.org/wiki/Globalização#Teorias_da_Globalização
Environmental Sustainability in Companies: The Circular
Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.
Authors
Luísa Orvalho,Professor Coordinator at ISTEC Porto
Diogo Oliveira, Undergraduate in Multimedia Engineering at ISTEC Porto
Pedro Silva, Undergraduate in Multimedia Engineering at ISTEC Porto
Media
To cite this article
Luísa Orvalho, Diogo Oliveira e Pedro Silva, Environmental Sustainability in Companies: The Circular Economy
DOI: 10.31112/kriativ-tech-2022-06-73
Abstract
Keywords
References
1] Organização das Nações Unidas. (maio 2022). Objetivos de Desenvolvimento Sustentável.
https://unric.org/pt/Objetivos-de-Desenvolvimento-Sustentavel/
[2] Fundação Ellen MacArthur. (maio, 2022). Economia Circular. https://archive.ellenmacarthurfoundation.org/pt/economia-circular/diagrama-sistemico
[3] Fundação Ellen MacArthur. (2021). Objetivos universais de políticas para economia circular. (pp. 35).
[4] apud, p. 46.
[5] apud, p. 53.
[6] Kemp, R. Pearson, P. (2007) Measuring Eco-Innovation. OECD.
[7] Comissão Europeia. (maio, 2022) Eco inovação: o segredo da competitividade futura da europa. (pp. 3).
[8] ZERO – Associação Sistema Terrestre Sustentável. (maio, 2022). 7 de maio: Portugal aciona cartão de crédito ambiental cada vez mais cedo. https://zero.ong/7-de-maio-portugal-aciona-cartao-de-credito-ambiental-cada-vez-mais-cedo/
[9] Resolução n.º 190-A/2017 do Conselho de Ministros (2017). Diário da República: I Série, 2º Suplemento. https://dre.pt/dre/detalhe/resolucao-conselho-ministros/190-a-2017
[10]Câmara Municipal do Porto. (2017). Roadmap para um Porto Circular. (pp. 11).
[11]Porto. (dezembro, 2021). Invicta incentiva outras cidades rumo à economia circular. https://www.porto.pt/pt/noticia/invicta-incentiva-outras-cidades-rumo-a-economia-circular
[12] Fundação Ellen MacArthur. (maio, 2022). Economia Circular. https://archive.ellenmacarthurfoundation.org/pt/economia-circular/diagrama-sistemico
Relation of Data Visualization Techniques with the phases of Cybersecurity Incidents Response process
Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.
Authors
Ivo Ricardo Dias Rosa,Invited Assistant Professor at ISTEC
Media
To cite this article
Ivo Ricardo Dias Rosa, elation of Data Visualization Techniques with the phases of Cybersecurity Incidents Response process
DOI: 10.31112/kriativ-tech-2021-10-70
Abstract
Globally for nations and organizations (also due to the impositions and response needs imposed by security and privacy regulations) it is increasingly relevant to strengthen the ability of organizations to anticipate and detect possible security events in a timely manner, even when it is not possible to contain the threat it is necessary that incident response teams are able to tell and explain what happened.
This article provides a review was made concerning Cybersecurity, in particular the importance and relevance of the security incident response process, which may have operational and reputational impacts, and the identification and mapping of the purposes of applying data visualization techniques to give meaning or explain the typical phases of the security incident response process.
Keywords
Cybersecurity, cybersecurity incidents, incident response process, data visualization
References
DADOS - A Nova Jóia da Coroa. September 04, 2017. Available online: https://dataprivacy-on.com/comunicacao/2017/11/9/dados-a-nova-joia-da-coroa. Accessed on 25-02-2022.
Bravo, R. (2020). Segurança da informação e Cibersegurança: aspetos práticos e legislação. Segurança Da Informação e Cibersegurança: Aspetos Práticos e Legislação.
Diakun-Thibault, Nadia. (2014). Defining Cybersecurity. Technology Innovation Management Review. 2014.
ISO/IEC 27001 - INFORMATION SECURITY MANAGEMEN. Available online: https://www.iso.org/isoiec-27001-information-security.html. Accessed on 25-02-2022
ISO/IEC 27701:2019 Security techniques — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management — Requirements and guidelines. Available online: https://www.iso.org/standard/71670.html. Accessed on 25-02-2022
World Economic Forum. The Global Risks Report 2021 16th Edition - INSIGHT REPORT. In partnership with Marsh McLennan, SK Group and Zurich Insurance Group published by the World Economic Forum. 2021. Available online: http://www3.weforum.org/docs/WEF_The_Global_Risks_Report_2021.pdf. Accessed on 12-03-2022
World Economic Forum. The Global Risks Report 2022 17th Edition - INSIGHT REPORT. In partnership with Marsh McLennan, SK Group and Zurich Insurance Group published by the World Economic Forum. 2022. Available online: http://www3.weforum.org/docs/WEF_The_Global_Risks_Report_2022.pdf. Accessed on 12-03-2022
Incident Response Steps and Frameworks for SANS and NIST. 3 de Janeiro de 2020. Available online: https://cybersecurity.att.com/blogs/security-essentials/incident-response-steps-comparison-guide. Accessed on 10-03-2022
ENISA. 2018. “Reference Incident Classification Taxonomy Task Force Status and Way Forward.” European Union Agency For Network and Information Security.
Marty, R. (2008). Applied Security Visualization. Addison Wesley Professional Indianapolis, Indiana, ISBN-10:0-321-51010-0.
Ricardo, André & Grégio, André & Pereira, Benício & Filho, Carvalho & Montes, Antonio & Santos, Rafael. (2009). Capítulo 5 Técnicas de Visualização de Dados aplicadas à Segurança da Informação. Available online: https://www.researchgate.net/publication/268397430_Capitulo_5_Tecnicas_de_Visualizacao_de_Dados_aplicadas_a_Seguranca_da_Informacao. Accessed on 10-03-2022
Tufte, Edward R.. The Visual Display of Quantitative Information. Graphic Press, 2nd edition, 2001.
Data visualization techniques for cyber security analysts — Guest Blog by Cambridge Intelligence. Department for International Trade The Netherlands. February 13, 2020. Available online: https://medium.com/cfs2020/data-visualization-techniques-for-cyber-security-analysts-guest-blog-by-cambridge-intelligence-1b3d8ddbfc56. Accessed on 12-03-2022.
Managing difficulties of learning Technical English
Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.
Authors
Ana Cristina Guerra, Assistant Professor at ISTEC
Media
To cite this article
Ana Cristina Guerra, Managing difficulties of learning Technical English
DOI:10.31112/kriativ-tech-2021-10-69
Abstract
The difficulties of learning Technical English. The particularities presented in the pedagogical process. Expectations of students in this type of scientific area. Special Grammar Issues
Keywords
English, Teaching English, Technical English, English and Pedagogical Issues.
References
[1] E. Koenig, “Developing English
Language Competence for Global Engineers”, IEEE Global, 2020.
[2] S. Pazoki, “Engineering Students Motivation to Learn Techical English in ESP Courses”, RELC Journal, 2020.
[3] O. Chugai, “Teaching Technical English: Corrective Feedback Based on Students’ and Teachers’ Beliefs”, Multidisciplinary Journal for Education Social and Technological Sciences, 2021.
[4] X. Xue, “Using a SPOC-based flipped classrroom instructional mode to teach English pronunciation”, Computer Assisted Language Learning, 2021.
[5] M. Karas, “What level of proficiency to teachers need to teach English”, TELSL-EJ, 2020.
[6] V. Dronjic, “How (Not) to Teach English Vocabulary”, The Catesol Journal, 2019.
Procedural generation: diversification algorithms for level generation in an RPG video game
Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.
Authors
Ricardo Baptista, Assistant Professor at ISTEC-Porto/ CITECA
Renato Santos, Computer Degree at ISTEC-Porto
Media
To cite this article
Ricardo Baptista, Renato Santos, Procedural generation: diversification algorithms for level generation in an RPG video game
DOI: 10.31112/kriativ-tech-2021-10-66
Abstract
It is necessary to provide some gameplay diversity to nurture a growing desire to play again when it comes to simple video games. To this end, we can focus on one of the most prominent components, the videogame environment itself.
Procedural generation algorithms assist both the developer in the development process and the player by providing new experiences each time he plays. However, studying and choosing the correct algorithm for the desired video game style is essential for success since if the algorithm does not fit the intended purpose, the feeling when playing will not be the same.
This article intends to approach some of the videogame genres and present a procedural level generation algorithms study, followed by the analysis of the algorithm implemented in a videogame developed as a personal project.
Keywords
Procedural generation, videogames, RPG, development, algorithm
References
Adamatzky, A. (2010). Game of Life Cellular Automata. Springer.
Adams, E., & Rollings, A. (2006). Fundamentals of game design. New Riders. p. 67
Apperley, T. H. (2006). Genre and game studies: Toward a critical approach to video game genres. Simulation & Gaming, 37(1), 6–23. https://doi.org/10.1177/1046878105282278
Atari 2600 VCS catalog - Atari (USA) - 1981 - English. (n.d.). Www.atarimania.com. Retrieved March 22, 2021, from http://www.atarimania.com/catalog-atari-atari-usa-co16725-rev-d_3_2.html
Baptista, R. J. V. (2017). Jogos Sérios para Treino e Certificação de Competências. Repositorio-Aberto.up.pt. https://repositorio-aberto.up.pt/handle/10216/110820
Barton, M., & Stacks, S. (2019). Dungeons and desktops: the history of computer role-playing games. Crc Press.
Baron, J. R. (2017). Procedural Dungeon Generation Analysis and Adaptation. In Proceedings of the Southeast Conference (ACM SE '17). ACM, New York, NY, USA, 168–171. DOI: https://doi.org/10.1145/3077286.3077566
Bateman, C. (2014, August 13). Meet Bertie the Brain, the world’s first arcade game, built in Toronto - Spacing Toronto. Spacing Toronto. http://spacing.ca/toronto/2014/08/13/meet-bertie-brain-worlds-first-arcade-game-built-toronto/
Donovan, T. (2010). Replay: The History of Video Games. Yellow Ant.
Dungeon generation using BSP trees | eskerda.com. (2013, December 22). Eskerda. https://eskerda.com/bsp-dungeon-generation/
Edwards, B. (2012, May 27). Inside the Magnavox Odyssey, the First Video Game Console. PCWorld. https://www.pcworld.com/article/464739/inside_the_magnavox_odyssey_the_first_video_game_console.html
Esposito, N. (2005). A short and simple definition of what a videogame is. In Proceedings of the 2005 DiGRA International Conference: Changing Views: Worlds in Play (DiGRA’05), (3). http://www.digra.org/digital-library/publications/a-short-and-simple-definition-of-what-a-videogame-is/
Esquerda, L. (2013). Dungeon generation using BSP trees. https://eskerda.com/bsp-dungeon-generation/
Greene, G. (2015, November 28). The art and legacy of the ’90s console war. Venture Beat. https://venturebeat.com/2015/11/28/the-art-and-legacy-of-the-90s-console-war/
History.com Editors. (2019, June 10). Video Game History. HISTORY; A&E Television Networks. https://www.history.com/topics/inventions/history-of-video-games
Jogo eletrônico. (2021). Britannica.com.br. https://escola.britannica.com.br/artigo/jogo-eletr%C3%B4nico/481214
Matthews, V. (2018, April 12). The Many Different Types of Video Games & Their Subgenres [Review of The Many Different Types of Video Games & Their Subgenres]. https://www.idtech.com/blog/different-types-of-video-game-genres
McMillen, E. (2012, November 28). Postmortem: McMillen and Himsl’s The Binding of Isaac. Game Developer. https://www.gamedeveloper.com/business/postmortem-mcmillen-and-himsl-s-i-the-binding-of-isaac-i-
Nazgum. (2019). Procedural generation with Godot: Creating caves with Cellular Automata. Abitawake.com. https://abitawake.com/news/articles/procedural-generation-with-godot-creating-caves-with-cellular-automata
Nintendo. (1987). The Official Nintendo Player’s Guide (1987). In Internet Archive. https://archive.org/details/The_Official_Nintendo_Players_Guide_1987/page/n151/mode/2up
Pearson, D. (2013, December 31). Where I’m @: A Brief Look At The Resurgence of Roguelikes [Review of Where I’m @: A Brief Look At The Resurgence of Roguelikes]. GamesIndustry.biz. https://www.gamesindustry.biz/articles/2013-01-30-where-im-a-brief-look-at-the-resurgence-of-roguelikes
Powell, K. (2019, March 10). What electronic games can teach us. Knowable Magazine. https://knowablemagazine.org/article/mind/2019/video-games-educational-benefits
Schiff, J. L. (2011). Cellular automata: A discrete view of the world. (Vol.45). John Wiley & Sons.
Valtchanov, V. & Brown, J. A. (2012). Evolving Dungeon Crawler Level With Relative Placement. In Proceedings of the Fifth International C* Conference on Computer Science and Software Engineering (C3S2E '12). Association for Computing Machinery, New York, NY, USA, 27–35. DOI: https://doi.org/10.1145/2347583.2347587
van der Linden, R., Lopes, R., & Bidarra, R. (2014). Procedural Generation of Dungeons. IEEE Transactions on Computational Intelligence and AI in Games, 6(1), 78–89. https://doi.org/10.1109/tciaig.2013.2290371
Yee, N. (2006). The Demographics, Motivations, and Derived Experiences of Users of Massively Multi-User Online Graphical Environments. Presence: Teleoperators and Virtual Environments 2006; 15 (3), 309–329. DOI: https://doi.org/10.1162/pres.15.3.309
BYOD – Impact in Architecture and Information Security Corporate Policy
Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.
Authors
Nuno Miguel Carvalho Galego, Assistent Professor – ISTEC Lisbon
Media
To cite this article
Nuno Miguel Carvalho Galego, BYOD – Impact in Architecture and Information Security Corporate Policy
DOI: 10.31112/kriativ-tech-2021-10-67
Abstract
BYOD is a new business trend where employees are using their own devices for work purposes. This phenomenon has created new challenges in information security. Thus, organizations should adapt information security corporate strategy in order to address this new reality. This paper tries to identify and explore the optimal way to do this rearrangement, evaluating BYOD environment and measuring all relevant factors.
Keywords
BYOD; Mobility; Threat; Risk; Information Security; Corporate Strategy
References
Astani, M., Ready, K., & Tessema, M. (2013). BYOD ISSUES AND STRATEGIES IN ORGANIZATIONS. Issues in Information Systems, 195-201.
Dedeche, A., Liu, F., Le, M., & Lajami , S. (2013). Emergent BYOD Security Challenges. Melbourne, Australia: University of Melbourne.
Disterer, G., & Kleiner, C. (2013). BYOD Bring Your Own Device. CENTERIS 2013 - Conference on ENTERprise Information Systems / ProjMAN 2013 - (pp. 43 – 53). Procedia Technology.
International Organization for Standardization. (2008, 06 15). ISO/IEC 27005. (I. C. Office, Ed.) Retrieved 02 06, 2014
ISACA. (2008). Glossary of Items. Retrieved 02 06, 2014, from ISACA: http://www.isaca.org/Knowledge-Center/ Documents/Glossary/glossary.pdf
Nicolai, F. J. (1997). Resources Firms and Strategies. In A Reader in the Resource-based Perspective. Oxford.
Risk. (n.d.). Retrieved 02 06, 2014, from Wikipedia: http://en.wikipedia.org/wiki/Risk
Singh, N. (2012). B.Y.O.D. Genie Is Out Of the Bottle – “Devil Or Angel”. Journal of Business Management & Social Sciences Research (JBM&SSR), 1, 3.
Management of Tourist Destinations – The Case of Guimarães
Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.
Authors
Paula Serra, Invited Teacher at ISTEC-Porto
Media
To cite this article
Paula Serra, Management of Tourist Destinations – The Case of Guimarães
DOI: 10.31112/kriativ-tech-2021-10-68
Abstract
Destination Management issue has evolved towards the multiple concepts adoption that allow a more efficient coordination of its diverse manifestations in terms of the business potential that can be generate for the territories.
Marketing Management, in its sense of market understanding, has been allowed to adjust the offers design in function of the demand most characteristic traits, so tourist's expectations and lived experiences will contribute to transform them in real clients that will return to visit the Destination.[4][5]
Given markets globalization, Destinations, on our days, competes strongly for market shares since the differentiation determinants are becoming smaller. Accordingly, Destination Management has sought through Brand policies to revive and revitalize many Destinations which are in decline. This research work aims to evaluate, under case analysis methodology, the particular case of Guimarães city, an average European city with sufficient resources and capacities to attract national and international tourists. Thus, we sought to identify and clarify: (1) attributes, beliefs and associated perceptions that issuing markets recognize and promote with their targets; (2) the process of deciding to choose to visit this destination under test; (3) the degree of perceived quality; (4) the intention to revisit as a measure of loyalty; (5) and the core and peripheral attributes of its Brand image. The obtained results, by the quantitative study conducted, suggest that understanding values, which describe positively city brand image, impact on intention to revisit of under test sample, as well as the understanding factors of Perceive Quality of Destination offer exert a positive impact in its functional evaluation and technical quality, as well as its Promotion Quality and Communication.
Keywords
Tourism Management; Brand Management; Brand Equity; Tourism Destinations; Covid-19
References
[1] Aguilar, A.G., Guillén, M.J.Y., & Roman, N.V., (2016). Destination Brand Personality: An Application to Spanish Tourism. International Journal of Tourism Research. Vol. 18, Issue 3, pp. 210 –219
[2] Anholt, S., (2003). Branding Places and Nations, Brands & Branding, pp.213-226, 14p
[3] Baker, B. (2019). Place Branding for Small Cities, Regions & Downtowns. Independently published
[4] Blumberg, K., (2005), Tourism Destination Marketing – A tool for destination management? A case study from Nelson/Tasman Region, New Zealand, Asia Pacific. Journal of Tourism Research, Volume 10, Number 1, March, pp. 45-57(13).
[5] Buhalis, D., (2000), Marketing the Competitive Destination of the Future. Tourism Management. No. 21, pag. 97-116.
[6] Campelo, A., Aitken, R., Thyne, M., & Gnoth, J. (2014). Sense of Place: The Importance for Destination Branding. Journal of Travel Research, Vol. 53(2), pp.154 –166.
[7] Chernatony, L., McDonald, M., Wallace, E., (2010). Creating Powerful Brands. The Amazon Book Review.
[8] Cooper, C., Volo, S., Gartner, W.C. & Scott N., (2018); Tourism Management. SAGE Publications Ltd
[9] Datta, H., Ailawadi, K.L., & Van Heerde, H.J., (2017); HowWell Does Consumer-Based Brand Equity Align with Sales-Based Brand Equity and Marketing-Mix. Journal of Marketing, Vol. 81, N. 3, pp. 1-20.
[10] Feldwick, P., (1996). Do We Really Need 'Brand Equity'? Journal of Brand Management, Vol. 4, Issue 1, pp 9-28.
[11] Fayez Ahmad, F., Guzmán, F., (2020). Brand equity, online reviews, and message trust: the moderating role of persuasion knowledge. Journal of Product & Brand Management. Emerald Publishing Limited.
[12] Fyall, A., & Garrod, B., (2004). Tourism Marketing: A Collaborative Approach. The Amazon Book Review.
[13] Inscha, G.S., McBride, J.B. (2004). The Impact of Country-of-Origin Cues on Consumer Perceptions of Product Quality: A Binational Test of the Decomposed Country-of-Origin Construct. Journal of Business Research, Vol. 57, pp. 256 265
[14] National Institute of Statistics (2016) ET 2015, INE, IP. 0377-2306 ISSN
[15] Kavaratzis, M., & Hatch, M.J. (2013). The dynamics of place brands. An Identity- Based - Approach to Place Branding Theory. Marketing Theory. Sage journals. Vol: 13 issues: 1, pp. 69-86.
[16] Kotler, P., Bowen, J. T. T. & Maken, J.C. (2003). Marketing for Hospitality and Tourism. Pearson Prentice Hall, 3rd edition, USA.
[17] Kotler, Ph., Bowen, J., Makens, J. (2006), Marketing for Hospitality and Tourism, Pearson: Prentice Hall.
[18] Kumar, R. (2016). Research Methodology. SAGE publications. Fourth edition.
[19] Morgan, N., A. Pritchard, R. Piggott (2002). "New Zealand, 100% Pure: The Creation of a Powerful Niche Destination Brand." Journal of Brand Management, Vol. 9 (4/5): pp.335–354
[20] Morgan, N., Pritchard, A., Pride, R. (2004), Destination Branding: Creating the Unique Destination Proposition (2nd ed.), Oxford: Butterworth-Heinemann.
[21] Narver, J.C., & Slater, S.F., (1990). The Effect of a Market Orientation on Business Profitability. Journal of Marketing, Vol. 54, No. 4, pp. 20-35.
[22] Kings, Elizabeth (2000); " Cluster Analysis and Applications to Business Sciences: a critical view of strategic group theory " in Quantitative Methods 1 ed. Elizabeth Reis and Manuel A Ferreira; Syllable Editions; Lisbon.
[23] Kings, Elizabeth (2001); Applied Multivariate Statistics; 2nd edition; Syllable Editions; Lisbon.
[24] Ryan, C. 1991, Tourism and Marketing – A symbiotic relationship, Tourism Management, Vol. 12(2), pp. 101-111 IN:
[25] Sangiorgi, D., Junginger S. (2015). Emerging Issues in Service Design. An International Journal for All Aspects of Design, Vol. 18, - Issue 2, pp. 165-170.
[26] Serra, E. et al (2020). Sales Force Management and Management. Ed. Economic Life.
E – References
[27] Ambitur (2020) (- https://www.ambitur.pt/omt-2020-foi-o-pior-ano-da-historia-do-turismo-com-mil-milhoes-a-menos-de-chegadas-internacionais/. Consulted on 26 De Fevereriro, 2021, 10 am.
[28] Gao, J., Kerstetter, D.L., Mowen, A.J., & Hickerson. B., (2017). Changes in Tourists, Retrieved May 9, 2017, 7:00 p.m.
[29] Hankinson, G. (2005). Destination Brand Images: A Business Tourism Perspective. Journal of Services Marketing. Vol. 19th Issue:1pp.24-32, (https://doi.org/10.1108/08876040510579361) Consulted April 3, 22 p.m.
[30] Lambin, JJ, & Rubén, C., (2000-2001). Market-Orientation and Corporate Performance. Emerging Issues in Management (symphonya.unimib.it), N. 2, pp.23-37 (http://dx.doi.org/10.4468/2001.2.03lambin.chumpitaz) Consulted on May 15, 21.30 pm
[31] From Nisco, A., Mainolfi, G., Marino, V. Napolitano, M.R. (2015). Tourism Satisfaction Effect on General Country Image, Destination Image, and Post-Visit Intentions. Journal of Vacation Marketing, Vol.21(4), pp.305-317,
[32] Perception of Well-Being based on their use of Emotion Regulation Strategies During Vacation. Journal of Travel & Tourism Marketing. http://dx.doi.org/10.1080/10548408.2017.1374908 Consulted on 15 May 2017, 10 am
[33] Pike, S., & Page, S.J. (2013). Destination Marketing: An Integrated Marketing Communication Approach Tourism Management, Elsevier. https://www.researchgate.net/publication/27469498_Destination_Marketing_an_integrated_marketing_communication_approach Consulted on 23 May, 5:00 pm.
[34] Seraphin, H., Zaman, M., Olver, S., Bourliataux-Lajoinie, S... 2018. Destination branding and overtourism. Journal of Hospitality and Tourism Management. https://www.researchgate.net/publication/329541505_Destination_branding_and_overtourism- Consulted on 03 February, 5:00 pm
[35] Think Digital Travel (2021) How are consumer attitudes shaping travel trends in 2021. https://www.thinkdigital.travel/opinion/how-are-consumer-attitudes-shaping-travel-trends-in-2021/. Consulted on 20 January, 16pm.
[36] TPBO (2021): https://placebrandobserver.com/how-covid-will-change-place-branding-priorities/. Consulted on 29 January, 3:00 pm
[37] U.S. Travel and Tourism Overview (2019) https://www.ustravel.org/research/travel-facts-and-figures, Retrieved 29 February 2021, 6:00 pm
[38] Kotler, P. "Branding: From Purpose to Beneficence"(2016). https://www.marketingjournal.org/brand-purpose-to-beneficence-philip-kotler/. Consulted on 30 February 2021, 7:00 pm
[39] Wallace, E., Buil, i., Chernatony, L., (2017) "Consumers' self-congruence with a "Liked" brand: Cognitive network influence and brand outcomes", European Journal of Marketing, Vol. 51Issue:2,pp.367-390. https://doi.org/10.1108/EJM-07-2015-0442 Consulted on June 14, 10 p.m.
[40] Wheeler, F., Frost, W., Weiler, B., 'Destination Brand Identity, Values, and Community: A case study from rural Victoria, Australia. Journal of Travel and Tourism Marketing, Vol. 28, No. 1, pp. 13-26. http://dx.doi.org/10.1080/10548408.2011.535441 On June 16, 11:00 pm
[41] Wijaya, B, S. (2013). Dimensions of Brand Image: A Conceptual Review from the Perspective of Brand Communication. https://www.researchgate.net/publication/258695231_Dimensions_of_Brand_Image_A_Conceptual_Review_from_the_Perspective_of_Brand_Communication Consulted on 04 February, 11:00 pm
[42] World Economic Forum (2015). The Travel & Tourism Competitiveness Report. Insight report. http://www3.weforum.org/docs/TT15/WEF_Global_Travel&Tourism_Report_2015.pdf Consulted on July 25, 2017, 4:00 pm
[43] Youn K. Na, Y. K., Kang, S., Jeong, H.Y., (2019). The Effect of Market Orientation on Performance of Sharing Economy Business: Focusing on Marketing Innovation and Sustainable Competitive Advantage.
he Effect of Culture in E-Business Implementation
Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.
Authors
Isabel Borges Alvarez, Coordinator Professor at ISTEC
Media
To cite this article
Isabel Borges Alvarez, The Effect of Culture in E-Business Implementation
DOI: 10.31112/kriativ-tech-2021-10-64
Abstract
The potential of the Internet as a channel for electronic business has been recognised across many industry sectors. It is likely that business to business and business to consumer communication will be increasingly conducted via the Internet. However, while the potential of the Internet is recognised, the conditions for successful electronic business using the Internet remain to be explored in many industry sectors and different parts of the world. Issues such as organizational readiness, the suitability of the industry sector, the nature of the transactions in terms of standardisation and security, the effect of culture and the requirements for changed organizational infrastructure must be addressed, considered and locally adapted. The scope of this paper is a rich description of the factors that need to be satisfied in order to achieve cultural alignment between the organizational culture and the culture accommodated by e-business uptake.
Keywords
E-Business, Culture, Organizational culture
References
[1] ALI, L., Towards Organizational Culture Alignment of Strategic Information Systems Planning (SISP) Methodologies, PhD Thesis, DeMontfort University (2000).
[2] WILLIAMS, A., DOBSON, P. AND WALTERS, M. , Changing Culture: New Organization’s Approaches , 2nd Edition, London, Institute of Personnel Management (1993).
[3] WALSHAM, G., Making a World of Difference – IT in a Global Context, 2001, Wiley & Sons.
[4] WEISINGER, J. AND TRAUTH, E., “Situating Culture in the Global Information Sector”, Information Technology & People, (Vol.15, n.4, 2002).
[5] WIENER, Y. , “Forms of Value Systems: A Focus on Organizational Effectiveness and Cultural Change and Maintenance”, Academy of Management Review , (Vol.13, No.4, pp.534-545, 1988).
[6] BICKERSTAFFE, G., “Culture Club: An Interview with Fons Trompenaars”, Business Strategy Review, (Vol.13, Issue 1, 2002).
[7] BROOKS, I. , Organizational Behaviour: Individuals, Groups and the Organization, (London, Pitman Publishing, 1999).
[8] BROWN, A., Organizational Culture, (London, Pitman Publishing, 1995).
[9] BROWN, A., Organizational Culture, (2nd.edition, London, Pitman Publishing, 1998).
[10] CLAVER, E., LLOPIS, J., GONZALEZ, M. AND GASCO, J., “The Performance of Information Systems Through Organizational Culture”, Information Technology & People, (Vol.14, No. 3, 2001).
[11] VECCHIO, R. P. , Organizational Behavior, (2nd Edition, London, The Drysden Press, 1995).
[12] COSTELLO, G. I. AND TUCHEN, J. H., “A Comparative Study of Business to Consumer Commerce within the Australian sector”, Journal of Information Technology, (13, pp.153-167, 1998).
[13] DAVISON, R. and MARTINSONS, M. G., “Empowerment or enslavement? – A case of process-based organizational change in Hong Kong”, Information Technology & People, (Vol.15, No.1, 2002)
[14] DEAL AND KENNEDY, Corporate Culture: The Rites and Rituals of Corporate Life (London, Penguin Group, 1988).
[15] DENISON, D., Corporate Culture and Organizational Effectiveness, (New York, John Wiley, 1990).
[16] DRENNAN, D., Transforming Company Culture: Getting your company from where you are now to where you want to be, (London, McGraw-Hill, 1992).
[17] EID, R. “A Cross-Industry Review of B2B Critical Success Factors”, Internet Research: Electronic Networking Applications and Policy, (Vol.12, n.2, 2002).
[18] GREENBERG, J. , Managing Behaviour in Organizations, 2nd Edition, New Jersey, Prentice-Hall, (1999).
[19] TURNER, B. A. , “Sociological Aspects Of Organization Symbolism”, Organizational Studies, (Vol. 7, pp.101-115, 1986).
[20] HANDY, C., Understanding Organizations, 4th Edition, London, Penguin (1993).
[21] TURBAN, E., LEE, J., KING, D. AND CHUNG, H. M., Electronic Commerce – A Managerial Perspective, Prentice Hall (2000).
[22] TUNG, L. L., QUADDUS, M.A., “Cultural Differences explaining the differences in results in GSS: implications for the next decade”, Decision Support Systems, (33, 177-199, 2002).
[23] HOFSTEDE, G., Culture’s Consequences: International Differences in Work-Related Values, London, SAGE Publications Inc. (1980).
[24] TROMPENAARS, F., HAMPDEN-TURNER, D., Riding the Waves of Cultures, (Brealey, London, 1998).
[25] HOFSTEDE, G., Cultures and Organizations: Software of the Mind, Intercultural Cooperation and its Importance for Survival, London, McGraw-Hill (1991)
[26] SHORE, B. AND VENKATACHALAM, A. R., “Role of National Culture in the Transfer of Information Technology”, Journal of Strategic Information Systems, (Vol.5, No.1, pp.19-35, 1996).
[27] SETHIA, N.K. AND VON GLINOW, M. A., “Arriving at Four Cultures by Managing the Reward System”, In: KILMANN, R. H., SAXTON, M. J. AND SERPA, R. (editors), Gaining Control of the Corporate Culture, (London, Jossey-Bass Publishers, pp.400-420) 1985.
[28] KALAKOTA, R. AND ROBINSON, M., e-Business 2.0, Addison-Wesley (2001).
[29] KREITNER, R., KINICKI, A. AND BUELENS, M., Organizational Behaviour, First European Edition, London, McGraw-Hill (1999)
[30] STRAUB, D., LOCH, K., AND HILL, C., “Transfer of Information Technology to the Arab World: A Test of Cultural Influence Modeling”, Jornal of Global Information Management, (6, Oct-Dec 2001).
[31] LESSEM, R., “Managing in Four Worlds – Culture, strategy and transformation”, Long Range Planning, (Vol.34, 9-32, 2001).
[32] LIEBOWITZ, J., A Look at Why Information Systems Fail, MCB Kybernetes, (Vol.28, 1, 1999).
[33] LITTLE, S. et al, “Calling up culture – Information spaces and information flows as the virtual dynamics of inclusion and exclusion”, Information Technology & People, Vol.14 (2001) No.4 pp 353-367
[34] LUTHANS, F. , Organizational Behaviour, 7th Edition, London, McGraw-Hill (1995).
[35] OUCHI, W. , Theory Z: How American Business Can Meet the Japanese Challenge, (Addison-Wesley, 1981).
[36] SALK, J., BRANNEN, M.Y., “National Culture, Networks, and Individual Influence in a Multinational Management Team”, Academy of Management Journal (Vol. 43, No.2, 191-202, 2000).
[37] SAUER, C., Why Information Systems Fail: A Case Study Approach, (Henley-on-Thames, Alfred Waller Limited, 1993)
[38] SCHEIN, E. H., Organizational Culture and Leadership, (2nd Edition, California, Jossey-Bass Inc.), 1985
[39] SCHOLZ, C., “Corporate Culture and Strategy: The Problem of Strategic Fit”, Long Range Planning, (Vol.20, No.4, pp.78-87, 1987).