Security from Caesar to Vigenère

Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.

Authors

António Santos, Assistant Professor at ISTEC

Media

PDF

To cite this article

António Santos, Security from Caesar to Vigenère
DOI: 10.31112/kriativ-tech-2022-06-74

Abstract

Cryptography has accompanied the human being for centuries, starting with being used only by kings and emperors to communicate with their governors and military until now when its use is in all information transfers carried out digitally. The Caesar cipher was one of the first to appear and served for Roman emperors to communicate with their generals and provincial governors. It is a simple substitution number, and as such it has some limitations which, at the time it was used, were not relevant because of the illiteracy of the populations. While the Vigenère cipher brought much more security, filling the vulnerabilities of the Caeser cipher, transforming the Caeser cipher into a polyalphabetic substitution cipher. In this study we will compare the figures: Caeser, Shift and Vigenère; regarding your safety. It is also intended to make some modifications in order to improve and optimize the code without changing the original cipher.

Keywords

Encryption, substitution method, Caesar cipher, Shift cipher, Vigenère cipher.

References

[1] Jain, A., Dedhia, R. and Patil, A. (2015) “Enhancing the Security of Caesar Cipher Substitution Method using a Randomized Approach for more Secure Communication”, International Journal of Computer Applications, Vol. 129 No.13, pp: 144-150,
[2] Saraswat, A., Khatria, C., Sudhakara, Thakrala, P., Biswasa, P.. ( 2016 ) An Extended Hybridization of Vigenere and Caesar Cipher Techniques for Secure Communication, 2nd International Conference on Intelligent Computing, Communication & Convergence (ICCC-2016), Procedia Computer Science 92 pp 355 – 360.
[3] Balogun, A.O. , Sadiku, P. O., Mojeed, H. A., Raifu, H. A. (2017) Multiple Caesar Cypher Encryption Algorithm. ABACUS, (Mathematics Science Series) Vol. 44, No 2. pp 250-258.
[4] Kahate, Atul (2003). Cryptography and network security, Tata McGraw-Hill, New Delhi.
[5] Paar, Christof\ and Pelzl, Jan (2010). Understanding Cryptography: A Textbook for Students and Practitioners. Springer-Verlag, Berlin.
[6] Stinson, D.R. and Paterson, M. B. (2018) Cryptography: Theory and Practice, Fourth Edition. Textbooks in Mathemátics, CRC Press.
[7] Katz, Jonathan and Lindell, Yehuda (2015). Introduction to Modern Cryptography. Second Edition, Taylor & Francis Group, LLC, CRC Press.
[8] Aggarwal, Surabhi (2016). A Review on Enhancing Caesar Cipher, International Journal of Research Science & Management, 3(6).
[9] Stallings, William (2017). Cryptography and network security: Principles and Practice, Fifth Edition, Prentice Hall, New York.
[10] Shrivastava, M., Jain, M, and Singh, P. (2016) Content Based Symmetric Key Algorithm, International Conference on Computational Modeling and Security, Procedia Computer Science 85, pp. 222 – 227.
[11] Singh, Simon (1999).The Code Book, Anchor Books: The Science of Secrecy from Ancient Egypt to Quantum Cryptography. Anchor Boks. New York.
[12] Stamp, Mark and Low, Richard M.(2007). Applied Cryptanalysis - Breaking Ciphers in the Real World. Wiley-Interscience, John Wiley & Sons, Inc..
[13] Holden, Joshua (2017), The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption, Princeton University Press, New Jersey.
[14] Kumari, Sarita (2017) A research Paper on Cryptography Encryption and Compression Techniques, International Journal Of Engineering And Computer Science. Volume 6 Issue 4Page No. 20915-20919. DOI: 10.18535/ijecs/v6i4.20.
[15] Luciano, D. and Priche,, G. Cryptology: From Caesar Ciphers to Public-Key Cryptosystems, The College Mathematics Journal, Vol. 18, No. 1 (Jan., 1987), pp. 2-17
[16] Omolara O.E., Oludare A.I. and Abdulahi S.E..( 2014) Developing a Modified Hybrid Caesar Cipher and Vigenere Cipher for Secure Data Communication, Computer Engineering and Intelligent Systems Vol.5, No.5, pp 34- 47
[17] Singh, Pooja and Sen, Pintu (2017). Enhancing Security of Caesar Cipher Using Divide and Conquer Approach, International Journal of Advance Research in Science and Enginheering, Volume 6, special issue (02).
[18] Sinkov, Abraham (1966), Elementary Cryptanalysis - A Mathematical Approach, Fifth Printing, The Mathematical Association of America. Washington, USA.
[19] Mollin, Richard A. (2007) An Introduction to Cryptography, Second Edition. Discrete Mathematics and its Applications, Chapman & Hall/CRC, California.
[20] Santos, Antonio and Vasconcelos Junior, Renato (2021). Improving Caesar Cipher for greater security. kriativ-tech (9) ,DOI: 10.31112/kriativ-tech-2021-10-54.
[21] Stinson, Douglas and Paterson, Maura. (2018) Cryptography: Theory and Practice fourth edition. CRC Press, CRC Press LLC. Florida.
[22] Musa, Sarhan M. (2018). Network Security and Cryptography: A Self-teaching Introduction. Mercury Learning & Information. Virgínia.
[23] Stallings, William (2017). Cryptography and network security: Principles and Practice, Seventh Edition. Pearson. Essex.
[24] Schneier, Bruce (1996). Applied Cryptography, Second Edition. John Wiley & Sons.


Geographic Information Systems

Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.

Authors

Luísa Orvalho , Professor Coordinator at ISTEC Porto
João Morais, Undergraduate in Computer Engineering at ISTEC Porto
Carlos Teixeira , Undergraduate in Computer Engineering at ISTEC Porto

Media

PDF

To cite this article

Luísa Orvalho, João Morais, Carlos Teixeira, Geographic Information Systems
DOI: 10.31112/kriativ-tech-2022-06-76

Abstract

With this article we intend to review the state of the art regarding Geographic Information Systems (GIS) and recognize the great technological evolution of the last decades. Identifying the objectives of GIS, describing its components, its main uses, functions and characterizing the available software of this technology are the main objectives of this investigation.

Keywords

Geographic Information Systems, Uses, Functions, Components, Desktop GIS Applications, Web GIS Applications, Explore Porto Application

References

[1] ArcGIS (2022). ArcGIS https://www.esri-portugal.pt/pt-pt/arcgis/produtos/arcgis-pro/overview
[2] BOLFE, E., & M. FERREIRA. (2008). Sistemas de Informação Geográfica: uma abordagem contextualizada na história. GEOGRAFIA, Rio Claro, v. 33, n. 1, p. 40-45, jan./abr. file:///Downloads/1775-Texto%20do%20artigo-38395-2-10-20200821%20(3).pdf
[3] CÂMARA, G. & J. MEDEIROS. (2003). Tendências de evolução do geoprocessamento. In: ASSAD, E. D.; SANO, E. (Org.) Sistemas de Informações Geográficas. 2. ed. Brasília, DF: Embrapa, cap. XX, p. 411-424. file:////Downloads/1775-Texto%20do%20artigo-38395-2-10-20200821%20(1).pdf
[4] CARTER, J. (1989). On defining the geographic information system. In: Ripple W J (ed.) Fundamentals of Geographic Information Systems: a compendium. ASPRS/ACSM, Falls Church Virginia. http://lidecc.cs.uns.edu.ar/~nbb/ccm/downloads/Literatura/OVERVIEW%20AND%20DEFINITION%20OF%20GIS.pdf
[5] Explore Porto. (2022). Explore Porto https://explore.porto.pt/
[6] GRASS (2022). GRASS. https://grass.osgeo.org/
[7] gvSIG (2022). gvSIG. http://www.gvsig.com/pt/produtos/gvsig-desktop
[8] Intergraph. (2022). Intergraph. https://www.intergraph.com/
[9] MACHADO, J. A. R. (2000). A emergência dos Sistemas e Informação Geográfica na análise e organização do espaço; Fundação Calouste Gulbenkian. http://koha-bmc.ubi.pt/cgi-bin/koha/opac-detail.pl?biblionumber=16377
[10] Map Server. (2022). Map Server https://www.mapserver.org/
[11] Mapinfo. (2022). Mapinfo http://www.geobis.com/mapinfo-gis-software/
[12] Landsat. (2022). https://en.wikipedia.org/wiki/Landsat_program
[13] OpenJUMP. (2022). OpenJump http://www.openjump.org/
[14] QGIS. (2022). QGIS https://www.qgis.org/en/site/


Applications of Artificial Intelligence in Neuroscience Research: an Overview

Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.

Authors

João Emílio Almeida, Assistant Professor at ISTEC Porto
Carlos Teixeira, Student at ISTEC-Porto
João Morais, Student at ISTEC-Porto
Ernesto Oliveira, Student at ISTEC-Porto
Luís Couto, Student at ISTEC-Porto

Media

PDF

To cite this article

João Emílio Almeida, Carlos Teixeira, João Morais, Ernesto Oliveira, Luís Couto, Applications of Artificial Intelligence in Neuroscience Research: an Overview

DOI: 10.31112/kriativ-tech-2022-06-75

Abstract

This article presents a review of how artificial intelligence (AI) supports neuroscience investigations and explores a case study where it is applied. AI has an important role to play in research, because it focuses on the mechanisms that generate intelligence and cognition. Neuroscience benefits from AI techniques and increased computing power to improve the interpretation of brain behaviors, having focused on the reciprocal importance that both areas have on research & development. In the future, it is expected that both neuroscience and AI will increase their results of research and empirical advances, accelerating the knowledge of these areas of research and science.

Keywords

Artificial Intelligence, Neuroscience Research, Applied AI.

References

[1] McCarthy, J. & Minsky, M., (2006). A Proposal for the Dartmouth Summer Research Project on Artificial Intelligence. AI Magazine. 27(4), 12-14.
[2] Built In. (2021) 32 Examples of AI in healthcare that will make you feel Better About the Future, https://builtin.com/artificial-intelligence/artificial-intelligence-healthcare
[3] Human Brain Project. (2020) Discover EBRAINS A key enabler to advance brain science, https://www.humanbrainproject.eu/en/
[4] J. Frye, R. Ananthanarayanan, and D. S. Modha. (2007) Towards real-time, mouse-scale cortical simulations, IBM Research Report RJ10404
[5] Goldman, J.S., Kusch, L., Yalcinkaya, B.H., Depannemaecker, D., Nghiem, T-A., Jirsa, V. and Destexhe, A., (2020). Brain-scale emergence of slow-wave synchrony and highly responsive asynchronous states based on biologically realistic population models simulated in The Virtual Brain. bioRxiv.
https://doi.org/10.1101/2020.12.28.424574
[6] V. Braitenberg and A. Schuz. (1991) Anatomy of the Cortex: Statistics and Geometry. Springer.
[7] H. Markram. (2006) The blue brain project. Nature Reviews Neuroscience, 7 (2), 153–160.
[8] Gonzalez, R.T., Riascos, J.A., Barone, D.A.C. (2017) How Artificial Intelligence is Supporting Neuroscience Research: A Discussion About Foundations, Methods and Applications. In: Barone D., Teles E., Brackmann C. (eds) Computational Neuroscience. LAWCN 2017. Communications in Computer and Information Science, vol 720. Springer.
[9] SAS Institute Inc. (2021) Deep Learning https://doi.org/10.1 007/978-3-319-71011-2_6
[10] Hassabis D, Kumaran D, Summerfield C, Botvinick M. (2017) Neuroscience-Inspired Artificial Intelligence, Neuron, 95(2). https://doi.org/10.1016/j.neuron.2017.06.011
[11] Marblestone H, Wayne G, Kording KP. (2016). Toward an integration of deep learning and neuroscience. Front. Comput. Neurosci., 10, p. 94
[12] Ribeiro, J. (2021) Neuroética e Inteligência Artificial, Jornal Público, (in Portuguese). https://www.publico.pt/2021/02/11/opiniao/noticia/neuroetica-inteligencia-artificial-1950013 consulted on May 7, 2022.
[13] Parlamento Europeu (2020) Parlamento na vanguarda das normas europeias sobre inteligência artificial, (in Portuguese) https://www.europarl.europa.eu/news/pt/press-room/20201016IPR89544/parlamento-na-vanguarda-das-normas-europeias-sobre-inteligencia-artificial consulted on May 7, 2022.
[14] Antunes, J. (2010, Janeiro, 18) Neurociências, os Avanços e os Desafios que se Colocam, VI Conferência da Indústria Farmacêutica, Lisboa. (in Portuguese) https://www.medicina.ulisboa.pt/newsfmul-artigo/11/vi-conferencia-da-industria-farmaceutica consulted on May 7, 2022.


Honeypot - a weapon for cyber combat

Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.

Authors

Paulo V. Monteiro, Assistant Professor at ISTEC Porto
João Emílio Almeida, Assistant Professor at ISTEC Porto
Diogo Cunha, Student at ISTEC-Porto
Diana Rodrigues, Student at ISTEC-Porto

Media

PDF

To cite this article

Paulo V. Monteiro,João Emílio Almeida, Diogo Cunha e Diana Rodrigues, CHoneypot - a weapon for cyber combat

DOI: 10.31112/kriativ-tech-2022-06-71

Abstract

In this article the honeypot concept is presented, starting with its features, advantages, and disadvantages. High and low interactivity honeypot types are detailed and compared. An open implementation is provided by means of an example, showing how honeypots can be used as an asset defending against cyberattacks.

Keywords

Honeypot; Hacker; Computer Security; Cybersecurity; Countermeasures; Open code; T-Pot.

References

[1] Misa, Thomas J. (2016). "Computer Security Discourse at RAND, SDC, and NSA (1958-1970)". IEEE Annals of the History of Computing. 38 (4): 12–25. doi:10.1109/MAHC.2016.48. S2CID 17609542.
[2] The Portuguese News (2022). “Hospital target of cyberattack”. https://www.theportugalnews.com/news/2022-04-26/hospital-target-of-cyberattack/66614 consulted on May 7, 2022.
[3] Silicon Republic (2022). “Targeted cyberattack takes out Vodafone Portugal”. https://www.siliconrepublic.com/enterprise/vodafone-portugal-cyberattack, consulted on May 7, 2022.
[4] Cybernews (2022). “Major Portuguese media conglomerate hit by ransomware”. https://cybernews.com/news/major-portuguese-media-conglomerate-hit-by-ransomware/, , consulted on January 15, 2022.
[5] Reuters (2022). “Portugal's largest retailer's websites, some services hit by hackers”. https://www.reuters.com/technology/portugals-largest-retailers-websites-some-services-hit-by-hackers-2022-03-30/, consulted on May 7, 2022.
[6] Szor,Peter.The Art Of Computer Virus Research. Addison Wesley Professional,2005.
[7] Cheswick, Bill (1992). "An Evening with BerferdIn Which a Cracker is Lured, Endured, and Studied" (PDF). http://cheswick.com/ches/papers/berferd.pdf Retrieved 3 Feb 2022.
[8] Singh, R. K., & Ramajujam, P. (2009). Intrusion Detection System Using Advanced Honeypots. arXiv preprint arXiv:0906.5031.
[9] Nicomette, V., Kaâniche, M., Alata, E., & Herrb, M. (2011). Set-up and deployment of a high-interaction honeypot: experiment and lessons learned. Journal in computer virology, 7(2), 143-157.
[10] Mokube, I., & Adams, M. (2007, March). Honeypots: concepts, approaches, and challenges. In Proceedings of the 45th annual southeast regional conference (pp. 321-326).


Celebration of the 5th Centenary of Fernão de Magalhães´s circumnavigation voyage

Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.

Authors

Luísa Orvalho,Professor Coordinator at ISTEC Porto
João Sousa, Undergraduate in Multimedia Engineering at ISTEC Porto
Lucas Brito, Undergraduate in Multimedia Engineering at ISTEC Porto

Media

PDF

To cite this article

Luísa Orvalho, João Sousa e Lucas Brito, Celebration of the 5th Centenary of Fernão de Magalhães´s circumnavigation voyage

DOI: 10.31112/kriativ-tech-2022-06-72

Abstract

In this article we intend to demonstrate the importance of the circumnavigation voyage for the advancement of science and technology in the 16th century, the research and innovation projects carried out within the scope of the 5th Centenary celebrations, project the “Magalhães feat in the future, as pillars of a new international agenda” and to compare the globalization produced at the time of the Discoveries with globalization as a modern phenomenon that emerged with the evolution of the new means of communication.

Keywords

Circumnavigation of Fernão Magalhães, Celebration of the 5th centenary, Impacts of the voyage in science and tecnology, I&I Projects, Globalization of Society.

References

[1] Carlos Fiolhais e Décio Martins (2010). Breve História da Ciência em Portugal. Gradiva
[2] Castro.M.J(n.d).Fernão de Magalhães.FSCH.http://www.fcsh.unl.pt/artravel/pdf/TS-42.pdf
[3] Lusa.(2020,outubro).V Centenário Magalhães. Oito projetos de investigação financiados com 2,3 milhões de euros.Observador.https://observador.pt/2020/10/21/v-centenario-magalhaes-oito-projetos-de-investigacao-financiados-com-23-milhoes-de-euros/
[4] Lusa.(2018,setembro). Talvez ainda haja coisas para descobrir sobre a viagem de Fernão de Magalhães.Diário De Notícias. https://www.dn.pt/vida-e-futuro/talvez-ainda-haja-coisas-para-descobrir-sobre-a-viagem-de-magalhaes----biografo-9894643.html
[5] República Portuguesa.Defesa Nacional.(2019,janeiro).Comemorações dos 500 anos da circum-navegação de Fernão de Magalhães.https://www.defesa.gov.pt/pt/comunicacao/noticias/Paginas/Comemorações-dos-500-anos-da-circum-navegação-de-Fernão-de-Magalhães.
[6] República Portuguesa.Governo Português.(2021,novembro)Relato da viagem de circum-navegação de Fernão de Magalhães candidato à Memória do Mundo da UNESCO.https://www.portugal.gov.pt/pt/gc22/comunicacao/noticia?i=documentos-da-viagem-de-fernao-de-magalhaes-candidatos-a-memoria-da-unesco
[7] República Portuguesa.Marinha Portuguesa.(2019,setembro). Efeméride | início da viagem de circum navegação.https://ccm.marinha.pt/pt/museumarinha_web/multimedia_web/Paginas/efemeride-inicio-viagem-circumnavegacao-magalhaes---20set19.aspx
[8] República Portuguesa.Marinha Portuguesa .(n.d.).Magalhães 500 anos da circum-navegação.https://www.marinha.pt/pt/magalhaes500anos
[9] Vieira.N.(2019,agosto). Como as navegações de Fernão de Magalhães há 500 anos impactaram a humanidade.CanalTech. https://canaltech.com.br/ciencia/como-as-navegacoes-de-fernao-de-magalhaes-ha-500-anos-impactaram-a-humanidade-145871/
[10] Silva.A.S.(2019,abril).A Viagem de Circum-Navegação como inspiração para agir hoje.Portal Diplomatico.https://portaldiplomatico.mne.gov.pt/images/noticias/2019/A_Viagem_de_Circum-Navegação_como_inspiração_para_agir_hoje.pdf
[11] Wikipedia.(2017,abril).Globalização.Wikipedia.[Webpage].https://pt.wikipedia.org/wiki/Globalização#Teorias_da_Globalização


Environmental Sustainability in Companies: The Circular

Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.

Authors

Luísa Orvalho,Professor Coordinator at ISTEC Porto
Diogo Oliveira, Undergraduate in Multimedia Engineering at ISTEC Porto
Pedro Silva, Undergraduate in Multimedia Engineering at ISTEC Porto

Media

PDF

To cite this article

Luísa Orvalho, Diogo Oliveira e Pedro Silva, Environmental Sustainability in Companies: The Circular Economy

DOI: 10.31112/kriativ-tech-2022-06-73

Abstract

It is increasingly essential to raise awareness and to understand the Circular Economy and the 17 Sustainable Development Goals of the United Nations 2030 Agenda for Sustainable Development at the individual and organizational levels of society. The scope of this article comprises the main concepts derived from sustainable development, such as a Circular Economy model, based on the 2030 Agenda; covers the way they are applied and presented to society, focusing on different types of eco-innovation to promote competitiveness; covers the impact of the Coronavirus pandemic on the goals set by governments; and presents the case of the application of the model in the city of Porto, making it a city that moves towards the Circular Economy.

Keywords

2030 Agenda for Sustainable Development; Circular Economy; Environmental Sustainability; Eco-innovation and its types; Review of the 2030 Agenda post Covid-19.

References

1] Organização das Nações Unidas. (maio 2022). Objetivos de Desenvolvimento Sustentável.
https://unric.org/pt/Objetivos-de-Desenvolvimento-Sustentavel/
[2] Fundação Ellen MacArthur. (maio, 2022). Economia Circular. https://archive.ellenmacarthurfoundation.org/pt/economia-circular/diagrama-sistemico
[3] Fundação Ellen MacArthur. (2021). Objetivos universais de políticas para economia circular. (pp. 35).
[4] apud, p. 46.
[5] apud, p. 53.
[6] Kemp, R. Pearson, P. (2007) Measuring Eco-Innovation. OECD.
[7] Comissão Europeia. (maio, 2022) Eco inovação: o segredo da competitividade futura da europa. (pp. 3).
[8] ZERO – Associação Sistema Terrestre Sustentável. (maio, 2022). 7 de maio: Portugal aciona cartão de crédito ambiental cada vez mais cedo. https://zero.ong/7-de-maio-portugal-aciona-cartao-de-credito-ambiental-cada-vez-mais-cedo/
[9] Resolução n.º 190-A/2017 do Conselho de Ministros (2017). Diário da República: I Série, 2º Suplemento. https://dre.pt/dre/detalhe/resolucao-conselho-ministros/190-a-2017

[10]Câmara Municipal do Porto. (2017). Roadmap para um Porto Circular. (pp. 11).

[11]Porto. (dezembro, 2021). Invicta incentiva outras cidades rumo à economia circular. https://www.porto.pt/pt/noticia/invicta-incentiva-outras-cidades-rumo-a-economia-circular

[12] Fundação Ellen MacArthur. (maio, 2022). Economia Circular. https://archive.ellenmacarthurfoundation.org/pt/economia-circular/diagrama-sistemico


Relation of Data Visualization Techniques with the phases of Cybersecurity Incidents Response process

Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.

Authors

Ivo Ricardo Dias Rosa,Invited Assistant Professor at ISTEC

Media

PDF

To cite this article

Ivo Ricardo Dias Rosa, elation of Data Visualization Techniques with the phases of Cybersecurity Incidents Response process

DOI: 10.31112/kriativ-tech-2021-10-70

Abstract

Globally for nations and organizations (also due to the impositions and response needs imposed by security and privacy regulations) it is increasingly relevant to strengthen the ability of organizations to anticipate and detect possible security events in a timely manner, even when it is not possible to contain the threat it is necessary that incident response teams are able to tell and explain what happened.
This article provides a review was made concerning Cybersecurity, in particular the importance and relevance of the security incident response process, which may have operational and reputational impacts, and the identification and mapping of the purposes of applying data visualization techniques to give meaning or explain the typical phases of the security incident response process.

Keywords

Cybersecurity, cybersecurity incidents, incident response process, data visualization

References

DADOS - A Nova Jóia da Coroa. September 04, 2017. Available online: https://dataprivacy-on.com/comunicacao/2017/11/9/dados-a-nova-joia-da-coroa. Accessed on 25-02-2022.
Bravo, R. (2020). Segurança da informação e Cibersegurança: aspetos práticos e legislação. Segurança Da Informação e Cibersegurança: Aspetos Práticos e Legislação.
Diakun-Thibault, Nadia. (2014). Defining Cybersecurity. Technology Innovation Management Review. 2014.
ISO/IEC 27001 - INFORMATION SECURITY MANAGEMEN. Available online: https://www.iso.org/isoiec-27001-information-security.html. Accessed on 25-02-2022
ISO/IEC 27701:2019 Security techniques — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management — Requirements and guidelines. Available online: https://www.iso.org/standard/71670.html. Accessed on 25-02-2022
World Economic Forum. The Global Risks Report 2021 16th Edition - INSIGHT REPORT. In partnership with Marsh McLennan, SK Group and Zurich Insurance Group published by the World Economic Forum. 2021. Available online: http://www3.weforum.org/docs/WEF_The_Global_Risks_Report_2021.pdf. Accessed on 12-03-2022
World Economic Forum. The Global Risks Report 2022 17th Edition - INSIGHT REPORT. In partnership with Marsh McLennan, SK Group and Zurich Insurance Group published by the World Economic Forum. 2022. Available online: http://www3.weforum.org/docs/WEF_The_Global_Risks_Report_2022.pdf. Accessed on 12-03-2022
Incident Response Steps and Frameworks for SANS and NIST. 3 de Janeiro de 2020. Available online: https://cybersecurity.att.com/blogs/security-essentials/incident-response-steps-comparison-guide. Accessed on 10-03-2022
ENISA. 2018. “Reference Incident Classification Taxonomy Task Force Status and Way Forward.” European Union Agency For Network and Information Security.
Marty, R. (2008). Applied Security Visualization. Addison Wesley Professional Indianapolis, Indiana, ISBN-10:0-321-51010-0.
Ricardo, André & Grégio, André & Pereira, Benício & Filho, Carvalho & Montes, Antonio & Santos, Rafael. (2009). Capítulo 5 Técnicas de Visualização de Dados aplicadas à Segurança da Informação. Available online: https://www.researchgate.net/publication/268397430_Capitulo_5_Tecnicas_de_Visualizacao_de_Dados_aplicadas_a_Seguranca_da_Informacao. Accessed on 10-03-2022
Tufte, Edward R.. The Visual Display of Quantitative Information. Graphic Press, 2nd edition, 2001.
Data visualization techniques for cyber security analysts — Guest Blog by Cambridge Intelligence. Department for International Trade The Netherlands. February 13, 2020. Available online: https://medium.com/cfs2020/data-visualization-techniques-for-cyber-security-analysts-guest-blog-by-cambridge-intelligence-1b3d8ddbfc56. Accessed on 12-03-2022.


Managing difficulties of learning Technical English

Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.

Authors

Ana Cristina Guerra, Assistant Professor at ISTEC

Media

PDF

To cite this article

Ana Cristina Guerra, Managing difficulties of learning Technical English

DOI:10.31112/kriativ-tech-2021-10-69

Abstract

The difficulties of learning Technical English. The particularities presented in the pedagogical process. Expectations of students in this type of scientific area. Special Grammar Issues

Keywords

English, Teaching English, Technical English, English and Pedagogical Issues.

References

[1] E. Koenig, “Developing English

Language Competence for Global Engineers”, IEEE Global, 2020.

[2] S. Pazoki, “Engineering Students Motivation to Learn Techical English in ESP Courses”, RELC Journal, 2020.

[3] O. Chugai, “Teaching Technical English: Corrective Feedback Based on Students’ and Teachers’ Beliefs”, Multidisciplinary Journal for Education Social and Technological Sciences, 2021.

[4] X. Xue, “Using a SPOC-based flipped classrroom instructional mode to teach English pronunciation”, Computer Assisted Language Learning, 2021.

[5] M. Karas, “What level of proficiency to teachers need to teach English”, TELSL-EJ, 2020.

[6] V. Dronjic, “How (Not) to Teach English Vocabulary”, The Catesol Journal, 2019.


Procedural generation: diversification algorithms for level generation in an RPG video game

Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.

Authors

Ricardo Baptista, Assistant Professor at ISTEC-Porto/ CITECA
Renato Santos, Computer Degree at ISTEC-Porto

Media

PDF

To cite this article

Ricardo Baptista, Renato Santos, Procedural generation: diversification algorithms for level generation in an RPG video game

DOI: 10.31112/kriativ-tech-2021-10-66

Abstract

It is necessary to provide some gameplay diversity to nurture a growing desire to play again when it comes to simple video games. To this end, we can focus on one of the most prominent components, the videogame environment itself.
Procedural generation algorithms assist both the developer in the development process and the player by providing new experiences each time he plays. However, studying and choosing the correct algorithm for the desired video game style is essential for success since if the algorithm does not fit the intended purpose, the feeling when playing will not be the same.
This article intends to approach some of the videogame genres and present a procedural level generation algorithms study, followed by the analysis of the algorithm implemented in a videogame developed as a personal project.

Keywords

Procedural generation, videogames, RPG, development, algorithm

References

Adamatzky, A. (2010). Game of Life Cellular Automata. Springer.

Adams, E., & Rollings, A. (2006). Fundamentals of game design. New Riders. p. 67

Apperley, T. H. (2006). Genre and game studies: Toward a critical approach to video game genres. Simulation & Gaming, 37(1), 6–23. https://doi.org/10.1177/1046878105282278

Atari 2600 VCS catalog - Atari (USA) - 1981 - English. (n.d.). Www.atarimania.com. Retrieved March 22, 2021, from http://www.atarimania.com/catalog-atari-atari-usa-co16725-rev-d_3_2.html

Baptista, R. J. V. (2017). Jogos Sérios para Treino e Certificação de Competências. Repositorio-Aberto.up.pt. https://repositorio-aberto.up.pt/handle/10216/110820
Barton, M. (2007, February 23). The History of Computer Role-Playing Games Part 1: The Early Years (1980-1983). Www.gamasutra.com. https://www.gamasutra.com/view/feature/3623/the_history_of_computer_.php

Barton, M., & Stacks, S. (2019). Dungeons and desktops: the history of computer role-playing games. Crc Press.

Baron, J. R. (2017). Procedural Dungeon Generation Analysis and Adaptation. In Proceedings of the Southeast Conference (ACM SE '17). ACM, New York, NY, USA, 168–171. DOI: https://doi.org/10.1145/3077286.3077566

Bateman, C. (2014, August 13). Meet Bertie the Brain, the world’s first arcade game, built in Toronto - Spacing Toronto. Spacing Toronto. http://spacing.ca/toronto/2014/08/13/meet-bertie-brain-worlds-first-arcade-game-built-toronto/

Donovan, T. (2010). Replay: The History of Video Games. Yellow Ant.

Dungeon generation using BSP trees | eskerda.com. (2013, December 22). Eskerda. https://eskerda.com/bsp-dungeon-generation/

Edwards, B. (2012, May 27). Inside the Magnavox Odyssey, the First Video Game Console. PCWorld. https://www.pcworld.com/article/464739/inside_the_magnavox_odyssey_the_first_video_game_console.html

Esposito, N. (2005). A short and simple definition of what a videogame is. In Proceedings of the 2005 DiGRA International Conference: Changing Views: Worlds in Play (DiGRA’05), (3). http://www.digra.org/digital-library/publications/a-short-and-simple-definition-of-what-a-videogame-is/

Esquerda, L. (2013). Dungeon generation using BSP trees. https://eskerda.com/bsp-dungeon-generation/

Greene, G. (2015, November 28). The art and legacy of the ’90s console war. Venture Beat. https://venturebeat.com/2015/11/28/the-art-and-legacy-of-the-90s-console-war/

History.com Editors. (2019, June 10). Video Game History. HISTORY; A&E Television Networks. https://www.history.com/topics/inventions/history-of-video-games

Jogo eletrônico. (2021). Britannica.com.br. https://escola.britannica.com.br/artigo/jogo-eletr%C3%B4nico/481214

Matthews, V. (2018, April 12). The Many Different Types of Video Games & Their Subgenres [Review of The Many Different Types of Video Games & Their Subgenres]. https://www.idtech.com/blog/different-types-of-video-game-genres

McMillen, E. (2012, November 28). Postmortem: McMillen and Himsl’s The Binding of Isaac. Game Developer. https://www.gamedeveloper.com/business/postmortem-mcmillen-and-himsl-s-i-the-binding-of-isaac-i-

Nazgum. (2019). Procedural generation with Godot: Creating caves with Cellular Automata. Abitawake.com. https://abitawake.com/news/articles/procedural-generation-with-godot-creating-caves-with-cellular-automata

Nintendo. (1987). The Official Nintendo Player’s Guide (1987). In Internet Archive. https://archive.org/details/The_Official_Nintendo_Players_Guide_1987/page/n151/mode/2up

Pearson, D. (2013, December 31). Where I’m @: A Brief Look At The Resurgence of Roguelikes [Review of Where I’m @: A Brief Look At The Resurgence of Roguelikes]. GamesIndustry.biz. https://www.gamesindustry.biz/articles/2013-01-30-where-im-a-brief-look-at-the-resurgence-of-roguelikes

Powell, K. (2019, March 10). What electronic games can teach us. Knowable Magazine. https://knowablemagazine.org/article/mind/2019/video-games-educational-benefits

Schiff, J. L. (2011). Cellular automata: A discrete view of the world. (Vol.45). John Wiley & Sons.

Valtchanov, V. & Brown, J. A. (2012). Evolving Dungeon Crawler Level With Relative Placement. In Proceedings of the Fifth International C* Conference on Computer Science and Software Engineering (C3S2E '12). Association for Computing Machinery, New York, NY, USA, 27–35. DOI: https://doi.org/10.1145/2347583.2347587

van der Linden, R., Lopes, R., & Bidarra, R. (2014). Procedural Generation of Dungeons. IEEE Transactions on Computational Intelligence and AI in Games, 6(1), 78–89. https://doi.org/10.1109/tciaig.2013.2290371

Yee, N. (2006). The Demographics, Motivations, and Derived Experiences of Users of Massively Multi-User Online Graphical Environments. Presence: Teleoperators and Virtual Environments 2006; 15 (3), 309–329. DOI: https://doi.org/10.1162/pres.15.3.309


BYOD – Impact in Architecture and Information Security Corporate Policy

Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.

Authors

Nuno Miguel Carvalho Galego, Assistent Professor – ISTEC Lisbon

Media

PDF

To cite this article

Nuno Miguel Carvalho Galego, BYOD – Impact in Architecture and Information Security Corporate Policy

DOI: 10.31112/kriativ-tech-2021-10-67

Abstract

BYOD is a new business trend where employees are using their own devices for work purposes. This phenomenon has created new challenges in information security. Thus, organizations should adapt information security corporate strategy in order to address this new reality. This paper tries to identify and explore the optimal way to do this rearrangement, evaluating BYOD environment and measuring all relevant factors.

Keywords

BYOD; Mobility; Threat; Risk; Information Security; Corporate Strategy

References

Astani, M., Ready, K., & Tessema, M. (2013). BYOD ISSUES AND STRATEGIES IN ORGANIZATIONS. Issues in Information Systems, 195-201.
Dedeche, A., Liu, F., Le, M., & Lajami , S. (2013). Emergent BYOD Security Challenges. Melbourne, Australia: University of Melbourne.
Disterer, G., & Kleiner, C. (2013). BYOD Bring Your Own Device. CENTERIS 2013 - Conference on ENTERprise Information Systems / ProjMAN 2013 - (pp. 43 – 53). Procedia Technology.
International Organization for Standardization. (2008, 06 15). ISO/IEC 27005. (I. C. Office, Ed.) Retrieved 02 06, 2014
ISACA. (2008). Glossary of Items. Retrieved 02 06, 2014, from ISACA: http://www.isaca.org/Knowledge-Center/ Documents/Glossary/glossary.pdf
Nicolai, F. J. (1997). Resources Firms and Strategies. In A Reader in the Resource-based Perspective. Oxford.
Risk. (n.d.). Retrieved 02 06, 2014, from Wikipedia: http://en.wikipedia.org/wiki/Risk
Singh, N. (2012). B.Y.O.D. Genie Is Out Of the Bottle – “Devil Or Angel”. Journal of Business Management & Social Sciences Research (JBM&SSR), 1, 3.