Management of Tourist Destinations – The Case of Guimarães
Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.
Authors
Paula Serra, Invited Teacher at ISTEC-Porto
Media
To cite this article
Paula Serra, Management of Tourist Destinations – The Case of Guimarães
DOI: 10.31112/kriativ-tech-2021-10-68
Abstract
Destination Management issue has evolved towards the multiple concepts adoption that allow a more efficient coordination of its diverse manifestations in terms of the business potential that can be generate for the territories.
Marketing Management, in its sense of market understanding, has been allowed to adjust the offers design in function of the demand most characteristic traits, so tourist's expectations and lived experiences will contribute to transform them in real clients that will return to visit the Destination.[4][5]
Given markets globalization, Destinations, on our days, competes strongly for market shares since the differentiation determinants are becoming smaller. Accordingly, Destination Management has sought through Brand policies to revive and revitalize many Destinations which are in decline. This research work aims to evaluate, under case analysis methodology, the particular case of Guimarães city, an average European city with sufficient resources and capacities to attract national and international tourists. Thus, we sought to identify and clarify: (1) attributes, beliefs and associated perceptions that issuing markets recognize and promote with their targets; (2) the process of deciding to choose to visit this destination under test; (3) the degree of perceived quality; (4) the intention to revisit as a measure of loyalty; (5) and the core and peripheral attributes of its Brand image. The obtained results, by the quantitative study conducted, suggest that understanding values, which describe positively city brand image, impact on intention to revisit of under test sample, as well as the understanding factors of Perceive Quality of Destination offer exert a positive impact in its functional evaluation and technical quality, as well as its Promotion Quality and Communication.
Keywords
Tourism Management; Brand Management; Brand Equity; Tourism Destinations; Covid-19
References
[1] Aguilar, A.G., Guillén, M.J.Y., & Roman, N.V., (2016). Destination Brand Personality: An Application to Spanish Tourism. International Journal of Tourism Research. Vol. 18, Issue 3, pp. 210 –219
[2] Anholt, S., (2003). Branding Places and Nations, Brands & Branding, pp.213-226, 14p
[3] Baker, B. (2019). Place Branding for Small Cities, Regions & Downtowns. Independently published
[4] Blumberg, K., (2005), Tourism Destination Marketing – A tool for destination management? A case study from Nelson/Tasman Region, New Zealand, Asia Pacific. Journal of Tourism Research, Volume 10, Number 1, March, pp. 45-57(13).
[5] Buhalis, D., (2000), Marketing the Competitive Destination of the Future. Tourism Management. No. 21, pag. 97-116.
[6] Campelo, A., Aitken, R., Thyne, M., & Gnoth, J. (2014). Sense of Place: The Importance for Destination Branding. Journal of Travel Research, Vol. 53(2), pp.154 –166.
[7] Chernatony, L., McDonald, M., Wallace, E., (2010). Creating Powerful Brands. The Amazon Book Review.
[8] Cooper, C., Volo, S., Gartner, W.C. & Scott N., (2018); Tourism Management. SAGE Publications Ltd
[9] Datta, H., Ailawadi, K.L., & Van Heerde, H.J., (2017); HowWell Does Consumer-Based Brand Equity Align with Sales-Based Brand Equity and Marketing-Mix. Journal of Marketing, Vol. 81, N. 3, pp. 1-20.
[10] Feldwick, P., (1996). Do We Really Need 'Brand Equity'? Journal of Brand Management, Vol. 4, Issue 1, pp 9-28.
[11] Fayez Ahmad, F., Guzmán, F., (2020). Brand equity, online reviews, and message trust: the moderating role of persuasion knowledge. Journal of Product & Brand Management. Emerald Publishing Limited.
[12] Fyall, A., & Garrod, B., (2004). Tourism Marketing: A Collaborative Approach. The Amazon Book Review.
[13] Inscha, G.S., McBride, J.B. (2004). The Impact of Country-of-Origin Cues on Consumer Perceptions of Product Quality: A Binational Test of the Decomposed Country-of-Origin Construct. Journal of Business Research, Vol. 57, pp. 256 265
[14] National Institute of Statistics (2016) ET 2015, INE, IP. 0377-2306 ISSN
[15] Kavaratzis, M., & Hatch, M.J. (2013). The dynamics of place brands. An Identity- Based - Approach to Place Branding Theory. Marketing Theory. Sage journals. Vol: 13 issues: 1, pp. 69-86.
[16] Kotler, P., Bowen, J. T. T. & Maken, J.C. (2003). Marketing for Hospitality and Tourism. Pearson Prentice Hall, 3rd edition, USA.
[17] Kotler, Ph., Bowen, J., Makens, J. (2006), Marketing for Hospitality and Tourism, Pearson: Prentice Hall.
[18] Kumar, R. (2016). Research Methodology. SAGE publications. Fourth edition.
[19] Morgan, N., A. Pritchard, R. Piggott (2002). "New Zealand, 100% Pure: The Creation of a Powerful Niche Destination Brand." Journal of Brand Management, Vol. 9 (4/5): pp.335–354
[20] Morgan, N., Pritchard, A., Pride, R. (2004), Destination Branding: Creating the Unique Destination Proposition (2nd ed.), Oxford: Butterworth-Heinemann.
[21] Narver, J.C., & Slater, S.F., (1990). The Effect of a Market Orientation on Business Profitability. Journal of Marketing, Vol. 54, No. 4, pp. 20-35.
[22] Kings, Elizabeth (2000); " Cluster Analysis and Applications to Business Sciences: a critical view of strategic group theory " in Quantitative Methods 1 ed. Elizabeth Reis and Manuel A Ferreira; Syllable Editions; Lisbon.
[23] Kings, Elizabeth (2001); Applied Multivariate Statistics; 2nd edition; Syllable Editions; Lisbon.
[24] Ryan, C. 1991, Tourism and Marketing – A symbiotic relationship, Tourism Management, Vol. 12(2), pp. 101-111 IN:
[25] Sangiorgi, D., Junginger S. (2015). Emerging Issues in Service Design. An International Journal for All Aspects of Design, Vol. 18, - Issue 2, pp. 165-170.
[26] Serra, E. et al (2020). Sales Force Management and Management. Ed. Economic Life.
E – References
[27] Ambitur (2020) (- https://www.ambitur.pt/omt-2020-foi-o-pior-ano-da-historia-do-turismo-com-mil-milhoes-a-menos-de-chegadas-internacionais/. Consulted on 26 De Fevereriro, 2021, 10 am.
[28] Gao, J., Kerstetter, D.L., Mowen, A.J., & Hickerson. B., (2017). Changes in Tourists, Retrieved May 9, 2017, 7:00 p.m.
[29] Hankinson, G. (2005). Destination Brand Images: A Business Tourism Perspective. Journal of Services Marketing. Vol. 19th Issue:1pp.24-32, (https://doi.org/10.1108/08876040510579361) Consulted April 3, 22 p.m.
[30] Lambin, JJ, & Rubén, C., (2000-2001). Market-Orientation and Corporate Performance. Emerging Issues in Management (symphonya.unimib.it), N. 2, pp.23-37 (http://dx.doi.org/10.4468/2001.2.03lambin.chumpitaz) Consulted on May 15, 21.30 pm
[31] From Nisco, A., Mainolfi, G., Marino, V. Napolitano, M.R. (2015). Tourism Satisfaction Effect on General Country Image, Destination Image, and Post-Visit Intentions. Journal of Vacation Marketing, Vol.21(4), pp.305-317,
[32] Perception of Well-Being based on their use of Emotion Regulation Strategies During Vacation. Journal of Travel & Tourism Marketing. http://dx.doi.org/10.1080/10548408.2017.1374908 Consulted on 15 May 2017, 10 am
[33] Pike, S., & Page, S.J. (2013). Destination Marketing: An Integrated Marketing Communication Approach Tourism Management, Elsevier. https://www.researchgate.net/publication/27469498_Destination_Marketing_an_integrated_marketing_communication_approach Consulted on 23 May, 5:00 pm.
[34] Seraphin, H., Zaman, M., Olver, S., Bourliataux-Lajoinie, S... 2018. Destination branding and overtourism. Journal of Hospitality and Tourism Management. https://www.researchgate.net/publication/329541505_Destination_branding_and_overtourism- Consulted on 03 February, 5:00 pm
[35] Think Digital Travel (2021) How are consumer attitudes shaping travel trends in 2021. https://www.thinkdigital.travel/opinion/how-are-consumer-attitudes-shaping-travel-trends-in-2021/. Consulted on 20 January, 16pm.
[36] TPBO (2021): https://placebrandobserver.com/how-covid-will-change-place-branding-priorities/. Consulted on 29 January, 3:00 pm
[37] U.S. Travel and Tourism Overview (2019) https://www.ustravel.org/research/travel-facts-and-figures, Retrieved 29 February 2021, 6:00 pm
[38] Kotler, P. "Branding: From Purpose to Beneficence"(2016). https://www.marketingjournal.org/brand-purpose-to-beneficence-philip-kotler/. Consulted on 30 February 2021, 7:00 pm
[39] Wallace, E., Buil, i., Chernatony, L., (2017) "Consumers' self-congruence with a "Liked" brand: Cognitive network influence and brand outcomes", European Journal of Marketing, Vol. 51Issue:2,pp.367-390. https://doi.org/10.1108/EJM-07-2015-0442 Consulted on June 14, 10 p.m.
[40] Wheeler, F., Frost, W., Weiler, B., 'Destination Brand Identity, Values, and Community: A case study from rural Victoria, Australia. Journal of Travel and Tourism Marketing, Vol. 28, No. 1, pp. 13-26. http://dx.doi.org/10.1080/10548408.2011.535441 On June 16, 11:00 pm
[41] Wijaya, B, S. (2013). Dimensions of Brand Image: A Conceptual Review from the Perspective of Brand Communication. https://www.researchgate.net/publication/258695231_Dimensions_of_Brand_Image_A_Conceptual_Review_from_the_Perspective_of_Brand_Communication Consulted on 04 February, 11:00 pm
[42] World Economic Forum (2015). The Travel & Tourism Competitiveness Report. Insight report. http://www3.weforum.org/docs/TT15/WEF_Global_Travel&Tourism_Report_2015.pdf Consulted on July 25, 2017, 4:00 pm
[43] Youn K. Na, Y. K., Kang, S., Jeong, H.Y., (2019). The Effect of Market Orientation on Performance of Sharing Economy Business: Focusing on Marketing Innovation and Sustainable Competitive Advantage.
he Effect of Culture in E-Business Implementation
Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.
Authors
Isabel Borges Alvarez, Coordinator Professor at ISTEC
Media
To cite this article
Isabel Borges Alvarez, The Effect of Culture in E-Business Implementation
DOI: 10.31112/kriativ-tech-2021-10-64
Abstract
The potential of the Internet as a channel for electronic business has been recognised across many industry sectors. It is likely that business to business and business to consumer communication will be increasingly conducted via the Internet. However, while the potential of the Internet is recognised, the conditions for successful electronic business using the Internet remain to be explored in many industry sectors and different parts of the world. Issues such as organizational readiness, the suitability of the industry sector, the nature of the transactions in terms of standardisation and security, the effect of culture and the requirements for changed organizational infrastructure must be addressed, considered and locally adapted. The scope of this paper is a rich description of the factors that need to be satisfied in order to achieve cultural alignment between the organizational culture and the culture accommodated by e-business uptake.
Keywords
E-Business, Culture, Organizational culture
References
[1] ALI, L., Towards Organizational Culture Alignment of Strategic Information Systems Planning (SISP) Methodologies, PhD Thesis, DeMontfort University (2000).
[2] WILLIAMS, A., DOBSON, P. AND WALTERS, M. , Changing Culture: New Organization’s Approaches , 2nd Edition, London, Institute of Personnel Management (1993).
[3] WALSHAM, G., Making a World of Difference – IT in a Global Context, 2001, Wiley & Sons.
[4] WEISINGER, J. AND TRAUTH, E., “Situating Culture in the Global Information Sector”, Information Technology & People, (Vol.15, n.4, 2002).
[5] WIENER, Y. , “Forms of Value Systems: A Focus on Organizational Effectiveness and Cultural Change and Maintenance”, Academy of Management Review , (Vol.13, No.4, pp.534-545, 1988).
[6] BICKERSTAFFE, G., “Culture Club: An Interview with Fons Trompenaars”, Business Strategy Review, (Vol.13, Issue 1, 2002).
[7] BROOKS, I. , Organizational Behaviour: Individuals, Groups and the Organization, (London, Pitman Publishing, 1999).
[8] BROWN, A., Organizational Culture, (London, Pitman Publishing, 1995).
[9] BROWN, A., Organizational Culture, (2nd.edition, London, Pitman Publishing, 1998).
[10] CLAVER, E., LLOPIS, J., GONZALEZ, M. AND GASCO, J., “The Performance of Information Systems Through Organizational Culture”, Information Technology & People, (Vol.14, No. 3, 2001).
[11] VECCHIO, R. P. , Organizational Behavior, (2nd Edition, London, The Drysden Press, 1995).
[12] COSTELLO, G. I. AND TUCHEN, J. H., “A Comparative Study of Business to Consumer Commerce within the Australian sector”, Journal of Information Technology, (13, pp.153-167, 1998).
[13] DAVISON, R. and MARTINSONS, M. G., “Empowerment or enslavement? – A case of process-based organizational change in Hong Kong”, Information Technology & People, (Vol.15, No.1, 2002)
[14] DEAL AND KENNEDY, Corporate Culture: The Rites and Rituals of Corporate Life (London, Penguin Group, 1988).
[15] DENISON, D., Corporate Culture and Organizational Effectiveness, (New York, John Wiley, 1990).
[16] DRENNAN, D., Transforming Company Culture: Getting your company from where you are now to where you want to be, (London, McGraw-Hill, 1992).
[17] EID, R. “A Cross-Industry Review of B2B Critical Success Factors”, Internet Research: Electronic Networking Applications and Policy, (Vol.12, n.2, 2002).
[18] GREENBERG, J. , Managing Behaviour in Organizations, 2nd Edition, New Jersey, Prentice-Hall, (1999).
[19] TURNER, B. A. , “Sociological Aspects Of Organization Symbolism”, Organizational Studies, (Vol. 7, pp.101-115, 1986).
[20] HANDY, C., Understanding Organizations, 4th Edition, London, Penguin (1993).
[21] TURBAN, E., LEE, J., KING, D. AND CHUNG, H. M., Electronic Commerce – A Managerial Perspective, Prentice Hall (2000).
[22] TUNG, L. L., QUADDUS, M.A., “Cultural Differences explaining the differences in results in GSS: implications for the next decade”, Decision Support Systems, (33, 177-199, 2002).
[23] HOFSTEDE, G., Culture’s Consequences: International Differences in Work-Related Values, London, SAGE Publications Inc. (1980).
[24] TROMPENAARS, F., HAMPDEN-TURNER, D., Riding the Waves of Cultures, (Brealey, London, 1998).
[25] HOFSTEDE, G., Cultures and Organizations: Software of the Mind, Intercultural Cooperation and its Importance for Survival, London, McGraw-Hill (1991)
[26] SHORE, B. AND VENKATACHALAM, A. R., “Role of National Culture in the Transfer of Information Technology”, Journal of Strategic Information Systems, (Vol.5, No.1, pp.19-35, 1996).
[27] SETHIA, N.K. AND VON GLINOW, M. A., “Arriving at Four Cultures by Managing the Reward System”, In: KILMANN, R. H., SAXTON, M. J. AND SERPA, R. (editors), Gaining Control of the Corporate Culture, (London, Jossey-Bass Publishers, pp.400-420) 1985.
[28] KALAKOTA, R. AND ROBINSON, M., e-Business 2.0, Addison-Wesley (2001).
[29] KREITNER, R., KINICKI, A. AND BUELENS, M., Organizational Behaviour, First European Edition, London, McGraw-Hill (1999)
[30] STRAUB, D., LOCH, K., AND HILL, C., “Transfer of Information Technology to the Arab World: A Test of Cultural Influence Modeling”, Jornal of Global Information Management, (6, Oct-Dec 2001).
[31] LESSEM, R., “Managing in Four Worlds – Culture, strategy and transformation”, Long Range Planning, (Vol.34, 9-32, 2001).
[32] LIEBOWITZ, J., A Look at Why Information Systems Fail, MCB Kybernetes, (Vol.28, 1, 1999).
[33] LITTLE, S. et al, “Calling up culture – Information spaces and information flows as the virtual dynamics of inclusion and exclusion”, Information Technology & People, Vol.14 (2001) No.4 pp 353-367
[34] LUTHANS, F. , Organizational Behaviour, 7th Edition, London, McGraw-Hill (1995).
[35] OUCHI, W. , Theory Z: How American Business Can Meet the Japanese Challenge, (Addison-Wesley, 1981).
[36] SALK, J., BRANNEN, M.Y., “National Culture, Networks, and Individual Influence in a Multinational Management Team”, Academy of Management Journal (Vol. 43, No.2, 191-202, 2000).
[37] SAUER, C., Why Information Systems Fail: A Case Study Approach, (Henley-on-Thames, Alfred Waller Limited, 1993)
[38] SCHEIN, E. H., Organizational Culture and Leadership, (2nd Edition, California, Jossey-Bass Inc.), 1985
[39] SCHOLZ, C., “Corporate Culture and Strategy: The Problem of Strategic Fit”, Long Range Planning, (Vol.20, No.4, pp.78-87, 1987).
IT Integration in Inclusive Education
Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.
Authors
Carla Sousa, Escola de Ciências e Tecnologia, Departamento de Engenharias Universidade de Trás-os-Montes e Alto Douro
Media
To cite this article
Carla Sousa, IT Integration in Inclusive Education
DOI: 10.31112/kriativ-tech-2021-10-65
Abstract
Promoting contextualised and meaningful learning is a peremptory issue in an inclusive school. The motivation for this study was based on the observation of the difficulties and adaptations of educational practice around children and young people with specific needs. It was verified the scarcity of free technological resources at national level, the need to use international software and the difficulties experienced by teachers and technicians in adapting educational models due the lack of training in the area of information and communication technologies. This study aims to identify the software and educational digital resources aimed at special education existing in three clusters, the difficulties experienced by teachers and technicians in adapting materials and the importance of new technologies in inclusive education. To this end, a survey was used as a research method in the School Groups of Entroncamento, Vila Nova da Barquinha and Torres Novas with the participation of special education groups and specialised technicians. Its access was made available to participants via email, the data gathered were subjected to a qualitative and quantitative analysis, with exploratory descriptive analysis in the objective questions and content analysis in the descriptive ones. Additionally, a literature review was conducted around technology and inclusive education based on articles published in the B-On scientific database. After the selection, 6 studies were considered as the final sample of the investigation. The main results of the research carried out, point to the importance of technological resources in optimizing inclusive education, particularly in students with specific needs. The scarcity of materials that allow the adaptability of content to the specificities of students and the lack of training of professionals in the area of ICT.
Keywords
Technology in Inclusive Education, Inclusion, Special Education.
References
1) Bardin, L. Analise de conteúdo. Lisboa: Editora 70,1977
2) Biazus. G. Ferreira; Rieder. C. Roberto Mello (2019), Uso da Tecnologia Assistiva na Educação Inclusiva no Ambiente Escolar: Revisão Sistemática, Revista Educação Especial. ISSN:1984-686X.
3) Carvalho. S; Campos. A; Moreira. A; Santos. P. (2019), ISSN: 1647-3582, Práticas educativas inclusivas mediadas pelas TIC, Indagatio Didactica, vol. 11 (3)
4) Despacho N. º 5291/2015, 21 maio. Diário da República, 2.ª serie — N. º 98 — 21 de maio de 2015. Disponível em :https://dre.pt/application/file/67271120. Acesso em: 12-07-2021
5) Direção-Geral da Educação (2012), Guia dos CRTIC e das Tecnologias de Apoio
6) Direção-Geral da Educação (2012), Educação Inclusiva. Disponível em: https://www.dge.mec.pt/educacaoinclusiva. Acesso em: 10-07-2021
7) Dorziat, A. (2014). O profissional da inclusão escolar. Cadernos de Pesquisa, 43(150), 986-1003.
8) Erdem, R. (2017). Students with special educational needs and assistive technologies: A literature review. Turkish Online Journal of Educational Technology TOJET, 16(1), 128-146
9) Gonçalves. J. Rita Domingues (2013), As T.I.C. Como Recurso a Inclusão de crianças com N.E.E. Escola Superior de Educação João de Deus, Lisboa
10) GLAT, Rosana (organização e edição), 2007, Educação Inclusiva: Cultura e Cotidiano Escolar, Questões atuais em Educação Especial, Rio de Janeiro, 7 Letras
11) Lima – Rodrigues, Luzia (coordenação); Ferreira, Ana Maria; Trindade, Ana Rosa; Rodrigues, David; Coloa, Joaquim; Nogueira, Jorge Humberto; Magalhães, Maria Bibi Ana, 2007, Percursos de Educação Inclusiva em Portugal, dez estudos de caso, Forum de Estudos de Educação Inclusiva/ Departamento de Educacão Especial e Reabilitação da faculdade de Motricidade Humana/ Universidade Técnica de Lisboa.
12) Matos, S. N., Mendes, E. G. (2015). Demandas de professores decorrentes da inclusão escolar. Revista Brasileira de Educação Especial, 21(1), 9-22.
13) Simoni Pires da Fonseca, Maria Madalena Moraes Sant’Anna, Paula Tatiana Cardoso, Solange Aparecida Tedesco (2018), ISSN 2526-8910. Detailing and reflections on occupational therapy in the process of school inclusion. Cad. Bras. Ter. Ocup., Sao Carlos, v. 26, n. 2, p. 381-397
14) Siqueira, I. M., Santana, C. D. S. (2010). Propostas de acessibilidade para a inclusão de pessoas com deficiências no ensino superior. Revista Brasileira de Educação Especial, 16(1), 127-136.
15) Revista Tecné, Episteme y Didaxis. A no 2018. Número Extraordinário. ISSN impreso: 0121-3814, ISSN web: 2323-0126 Memórias, Octavo Congreso Internacional de formación de Profesores de Ciências para la Construcción de Sociedades Sustentables. Octubre 10, 11 Y 12 de 2018, Bogotá
16) Trevisan, J. G.; Barba, P. C. S. D. Reflexões acerca da atuação do terapeuta ocupacional no processo de inclusão escolar de crianças com necessidades educacionais especiais. Cadernos de Terapia Ocupacional da UFSCar, São Carlos, v. 20, n. 1, p. 89-94, 2012. Disponível em: http://doi.editoracubo.com.br/10.4322/cto.2012.010, Acesso em: 07 julho 2021.
Security and Privacy in Cloud Computing: Simple Checklist to Virtualization
Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.
Authors
Dulce Mourato, Assistant Professor at ISTEC
Media
To cite this article
Dulce Mourato, Security and Privacy in Cloud Computing: Simple Checklist to Virtualization
DOI: 10.31112/kriativ-tech-2021-10-63
Abstract
With the COVID-19 Pandemic, Portuguese enterprises discover the crucial opportunity to make the difference worldwide with virtualization, using Cloud Computing technologies, however they are yet not fully convinced. Cloud security and privacy seems to be the main problems for organizations early adoption. It was possible to use a descriptive methodology, and an literature review approach to differentiate solutions, build on a simple checklist format and reveal essential arguments, that any small and medium-sized Portuguese company should take into account, before purchasing Cloud technologies adapted to its potential growth.
One of the major limitations of this study, was the inability to point out at real business environment, only using observation and scientific, technological and specialized level studies, presented here as potential result. The goal was verify if the applications or services implementation for protection and security scalability - really works.
Keywords
Security, Privacy, Cloud Computing, Virtualization, Checklist.
References
[1] IDC Portugal. Future Enterprise: Building Resiliency and Agility to Thrive in the Next Normal. IDC Futur Scape Portugal - Digital Event. Lisboa, 2021. https://idcportugal.com/solucoes/eventos/ [Accessed 2 11 2021].
[2] Aristova, S., Daradkeh Y. I. & Korolev, P. A General Systems Approach to Cloud Computing Security Issues. Intechopen, 2020. p. 4. https://www.intechopen.com/chapters/71961 [Accessed 2 11 2021].
[3] Zissis, D. and Lekkas, D. Addressing cloud computing security issues. Future Generation Computer Systems., pp. 583-592.,2012.http://www.sciencedirect.com/science/article/pii/S0167739X10002554http://dx.doi.org/10.1016/j.future.2010.12.006 [Accessed 2 11 2021].
[4] Bhandari B, Zheng J. A Preliminary Study On Emerging Cloud Computing Security Challenges., ACM, 2018. https://arxiv.org/pdf/1808.04143.pdf [Accessed 2 11 2021]
[5] Gonzalez, N., Miers, C., Redígolo, F., Simplício, M., Carvalho, T., Näslund, M. and PourzandI, M. A quantitative analysis of current security concerns and solutions for cloud computing., Journal of Cloud Computing,, pp. 1-18., 2012. https://journalofcloudcomputing.springeropen.com/articles/10.1186/2192-113X-1-11 [Accessed 2 11 2021]
[6] Alqahtani, H. A novel approach to providing secure data storage using multi cloud computing. University of Bedfordshire., London. England., 2019. [Accessed 2 10 2021]
[7] Ray, D. Cloud Adoption Decisions: Benefitting from an Integrated Perspective. The Electronic Journal Information Systems Evaluation. 2016. 19 (1), 3-21. https://academic-publishing.org/index.php/ejise/article/view/168 [Accessed 2 10 2021]
[8} Nagahawatta, R.; Warren, M.; Salzman S. and Lokuge S. Security and Privacy Factors Influencing the Adoption of Cloud Computing in Australian SMEs. PACIS 2021 Proceedings. 7., 2021.
[9] Gartner Group. Gartner Top Strategic Technology Trends for 2022. 20 10 2021. [Online]. Available: https://www.gartner.com/en/information-technology/insights/top-technology-trends. [Accessed 2 11 2021].
[10] Brandao, P. R. and Martins M. CyberSecurity - Risks of Telework. Kriativ-Tech, no. 9, p. 4, 26 October 2021. http://www.kriativ-tech.com/?p=66388
[11] Dalmazo, B. A Prediction-based Approach for Anomaly Detection in the Cloud, Coimbra: PhD Thesis, Department of Informatics Engineering Faculty of Sciences and Technology University of Coimbra, 2018. https://eg.uc.pt/bitstream/10316/81235/1/A%20Prediction-based%20Approach%20for%20Anomaly%20Detection%20in%20the%20Cloud.pdf
The Relevance and the Concerning Sides of the Distance Education
Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.
Authors
José Câmara, Assistant Professor at ISTEC
Media
To cite this article
José Câmara, The Relevance and the Concerning Sides of the Distance Education
DOI: 10.31112/kriativ-tech-2021-10-61
Abstract
Distance Education is becoming very popular and important nowadays, not only due to the pandemic moment that we are living, but also due to the several advantages it offers over the traditional teaching models and a need there is for it.
This article presents the main characteristics and concepts, as well as the relevance and the concerning sides of the Distance Education.
Keywords
Distance Education, Multimedia, Video Conference, Community of Inquiry, Cognitive Learning, Synchronous Learning, Asynchronous Learning.
References
[1] | Siemens, George, in edX Course: Pivoting to Online Teaching and Practitioner Perspectives (2020). Consultado em https://courses.edx.org/dashboard
|
[2] | Mirriahi, Negin, in edX Course: Pivoting to Online Teaching and Practitioner Perspectives (2020). Consultado em https://courses.edx.org/dashboard
|
[3] | Anderson, T., Rourke, L., Garrison, D. R., Archer, W. (2001). Assessing Teaching presence in a Computer Conference Environment. Consultado em https://coi.athabascau.ca/coi-model/ Journal of Asynchronous Learning Networks, 5(2), 1-17. Consultado em http://cde.athabascau.ca/coi_site/documents/Anderson_Rourke_Garrison_Archer_Teaching_Presence.pdf
|
[4] | In edX Course: Pivoting to Online Teaching and Practitioner Perspectives (2020) Consultado em
|
[5] | Crosslin, Matt. Consultado em https://mattcrosslin.com/ |
[6] | Kerketta, Susma, M. The Need and Importance of Distance Education in India. Higher Education Review. Consultado em https://www.thehighereducationreview.com/news/the-need-and-importance-of-distance-education-in-india-nid-867.html
|
[7] | Rigney, Lester-Irabinna. Consultado em https://people.unisa.edu.au/Lester.Rigney Defining culturally responsive digital education for classrooms: Writing from Oceania to build indigenous pacific futures. In E. A. McKinley & L. T. Smith (Eds.), Handbook of Indigenous Education (pp. 1–17). Springer Singapore. Consultado em https://doi.org/10.1007/978-981-10-1839-8_44-1 |
CyberSecurity - Risks of Telework
Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.
Authors
Pedro Ramos Brandao, Coordinator Professor at ISTEC
Manuel Martins, Master's student in Computing at ISTEC
Media
To cite this article
Pedro Ramos Brandao, Manuel Martins, CyberSecurity - Risks of Telework
DOI: 10.31112/kriativ-tech-2021-10-60
Abstract
Nowadays, telework is increasingly seen as an issue that must be addressed importantly and that solutions are found to enhance and strengthen it. As a result, organizations are increasingly relying on hybrid models of telework and presential work. The purpose of this paper is to assess whether an objective approach in the correlation between the tools made available and employee training and awareness for good use practices will reduce the risks associated with telework.
Keywords
Telework, Cybersecurity, Professional Qualification
References
[1] "Work from Home Cyber Risks – CyberExperts.com." [Online]. Available: https://cyberexperts.com/work-from-home-cyber-risks/. [Accessed: 19-Jul-2021].
[2] D. Dahlberg, "Identifying Unique Risks Of Work From Home-Remote Office Networks," p. 6, 2020.
[3] GundechaPritam, BarbierGeoffrey, TangJiliang, and LiuHuan, "User Vulnerability and Its Reduction on a Social Networking Site," ACM Trans. Knowl. Discov. from Data, vol. 9, no. 2, Sep. 2014, doi: 10.1145/2630421.
[4] L. Marinos and M. Lourenço, ENISA Threat Landscape Report 2018 15 Top Cyberthreats and Trends, no. January. 2018.
[5] “CyberEdge 2020 Cyberthreat Defense Report Infographic | CyberEdge Group.” [Online]. Available: https://cyber-edge.com/resources/cyberedge-2020-cyberthreat-defense-report-infographic/. [Accessed: 31-Jul-2021].
[6] " What's a honeypot? How do honeypots improve security | Kaspersky.” [Online]. Available: https://www.kaspersky.com.br/resource-center/threats/what-is-a-honeypot. [Accessed: 21-Jul-2021].
[7] L. Bonacini, G. Gallo, and S. Scicchitano, "Working from home and income inequality: risks of a 'new normal' with COVID-19," J. Popul. Econ. 2020 341, vol. 34, no. 1, pp. 303–360, Sep. 2020, doi: 10.1007/S00148-020-00800-7.
[8] “IT Management Software & Remote Monitoring Tools | SolarWinds.” [Online]. Available: https://www.solarwinds.com/. [Accessed: 21-Jul-2021].
Next-Generation Firewalls: Concept, Features, and Their Benefits
Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.
Authors
Pedro Ramos Brandao, Coordinator Professor at ISTEC
José Almeida, Master's student in Computing at ISTEC
Media
To cite this article
Pedro Ramos Brandao, José Almeida, Next-Generation Firewalls: Concept, Features, and Their Benefits
DOI: 10.31112/kriativ-tech-2021-10-59
Abstract
A firewall is a solution for securing computer networks; it can be a software program or a hardware device that allows or inhibits access to or from a system. Firewalls are used regularly to prevent untrusted Internet-originating traffic from accessing private systems and networks. All connection requests and packets that intend to pass through the firewall are analyzed according to the configured security criteria and denied or allowed. By rule, firewalls are designed to protect against unauthorized and abusive access. This paper is intended to provide a historical background on the technological evolution of firewalls and present the concept, functionalities, benefits of use, and aspects to be taken into account when choosing and setting firewalls.
Keywords
Firewall, next-generation firewall, information security, protection, technological evolution.
References
[1] SÊMOLA, Marcos. Gestão da Segurança da Informação, uma visão Executiva. (Information Security Management, an Executive View). Rio de Janeiro: Elsevier,2003
[2] ABNT NBR ISO/IEC 27001:2013 – Tecnologia da Informação – Técnicas de Segurança – Sistemas de gestão da segurança da informação — Requisitos. (Information Technology - Security Techniques - Information Security Management Systems - Requirements).
[3] BEAL, Adriana. Segurança da Informação: princípios e melhores práticas para a proteção dos ativos de informação nas organizações (Information Security: principles and best practices for the protection of information assets within organizations) – São Paulo: Atlas, 2005.
[4] ABNT NBR ISO/IEC 27002:2013 – Tecnologia da Informação – Técnicas de Segurança – Código de prática para controles de segurança da informação. (Information Technology - Security Techniques - Code of practice for information security controls).
[5] KUROSE James F., ROSS, Keith W. (2010), Redes de Computadores e a Internet 5a. Edição. (Computer Networks and the Internet 5th Edition). 2010. Pearson Publishing.
[6] CHAURE, Rupali. An Implementation of Anomaly Detection Mechanism for Centralized and Distributed Firewalls. NRI Institute of Information Science and Technology. 2010. Bhopal, India.
[7] Tanenbaum, Andrew S. Redes de Computadores - Tradução da 4ª Edição. (Computer Networks - Translation of the 4th Edition). 2003. Editora Campus / Elsevier (Campus / Elsevier Publisher)
[8] Kagermann H., Wahlster, W., & Helbig, J. Recommendations for implementing the strategic initiative Industrie 4.0, Final report of the Industrie 4.0 Working Group. 2013
[9] Ashibani, Y. & Mahmoud, H. M. Cyber-physical systems security: Analysis, challenges, and solutions. Computers & Security. 2017
[10] Ahram, T., Arman, S., Saman, S., Daniels, J., & Amaba, B. Blockchain Technology Innovations. Conference: IEEE-Technology-and-Engineering-Management-Society Conference. 2017
[11] Babiceanu, R. F., & Seker, R. Cybersecurity and resilience modeling for software-defined networks-based manufacturing application. In: Service Orientation in Holonic and Multi-Agent Manufacturing. Studies in Computational Intelligence. Springer, Cham. 2017
[12] Corallo, A., Lazo, i M., & Lezzi, M. Cybersecurity in the context of industry 4.0: A structured classification of critical assets and business impacts. Science Direct, Elsevier, Computers in Industry. 2020
[13] Dimase, D., Collier, Z.A., Heffner, K., et al. Systems engineering framework for cyber-physical security and resilience. 2015
[14] European Union Agency for Network and Information Security (ENISA). Good Practice for Security of Internet of Things in the Context of Smart Manufacturing, ENISA. 2018
[15] Greitzer, F. L., J., Purl, Y. M., & Leong P. J. S. Positioning your organization to respond to insider threats. IEEE Engineering Management Review. 2019
[16] Industrial Control Systems Cyber Emergency Response Team ICS-CERT. Annual Assessment Report. National Cybersecurity and Communications Integration Center (NCCIC). 2016
[17] Kaplan J., Weinberg, A., & Sharma, S. Meeting the cybersecurity challenge. Digit. McKinsey. 2011
[18] Liu, Y., &Xu, X. Industry 4.0 and cloud manufacturing: A comparative analysis. Journal of Manufacturing Science and Engineering. 2017
[19] Lu, T., Lin J., Zhao, L., Li, Y., & Peng, Y. A security architecture in cyber-physical systems: security theories, analysis simulation, and application fields. 2015
[20] National Security & Defense. Memorandum on Space Policy Directive 5 –Cybersecurity. https://www.whitehouse.gov/presidential-actions/memorandum-space-policy-directive-5-cybersecurity-principles-space-systems. 2020
[21] Zhu, Q., Craig, R., & Basar, T. A hierarchical security architecture for cyber-physical systems. In: 2011 4th International Symposium on Resilient Control Systems. 2011
[22] Theron, P., & Lazari, A. The IACS Cybersecurity Certification Framework (ICCF). Lessons from the 2017 study of state of the art., EUR 29237 EN, Publications Office of the European Union, Luxembourg, ISBN 978-92-79-85968-7, 10.2760/856808, JRC111611. 2018
[23] Stouffer, K., Pillitteri, V., Lightman, S., Abrams, M., & Hahn, A. NIST Special Publication 800-82. Guide to Industrial Control Systems (ICS) Security. National Institute of Standard and Technology (NIST). 2015
[24] Fortinet the Next Step in Enterprise Firewall Evolution. https://www.fortinet.com/blog/industry-trends/the-next-step-in-enterprise-firewall-evolution
[25] Gartner. Available at: http://www.gartner.com/it-glossary/next-generationfirewalls-ngfws. 2015
[26] MANECA, Miguel António Moreira Boavida. Firewalls: A Próxima Geração, 2018. (The Next Generation, 2018).
[27]. Shinder T.W., Shimonski R.J., Shinder D.L., 2003, The Best Damn Firewall Book Period" Syngress Publishing, Rockland.
[28] Y. Yongxin, 2011, The comparative study on network firewalls performance, 2011 IEEE 3rd International Conference on Communication Software and Networks.
[29] GARTNER Global Research and Advisory Company. www.gartner.com
[30] GARTNER Peer Insights. https://www.gartner.com/reviews/market/network-firewalls
[31] Palo Alto Networks. https://www.paloaltonetworks.com/resources/datasheets/pa-7000-series
[32] Fortinet. https://www.fortinet.com/content/dam/fortinet/assets/data-sheets/FortiGate_7000_Series_Bundle.pdf
Extended Detection and Response Importance of Events Context
Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.
Authors
Pedro Ramos Brandao, Coordinator Professor at Instituto Superior de Tecnologias Avançadas
João Nunes, Master Degree Student at Instituto Superior de Tecnologias Avançadas
Media
To cite this article
Pedro Ramos Brandao, João Nunes, Extended Detection and Response Importance of Events Context
DOI: 10.31112/kriativ-tech-2021-10-58
Abstract
In an increasingly dynamic and unpredictable world regarding IT security, it's essential to use adequate solutions that boost infrastructures protection, whether local, in the cloud, or hybrid. This article contextualizes the challenges of the new reality of remote work with traditional security solutions. Furthermore, it explains the importance of implementing a solution that has a holistic view of the infrastructure and correlates all suspicious or attack events. Thus, it enhances an improved and updated security to the current reality.
Keywords
XDR, EDR, SIEM, Correlation, Context, Cybersecurity
References
[1] Kaspersky, "How COVID-19 changed the way people work," 2020.
[2] W. U. Hassan, A. Bates, and D. Marino, "Tactical provenance analysis for endpoint detection and response systems," Proc. - IEEE Symp. Secur. Priv., vol. 2020-May, pp. 1172–1189, 2020, doi: 10.1109/SP40000.2020.00096.
[3] G. Karantzas and C. Patsakis, "An Empirical Assessment of Endpoint Detection and Response Systems against Advanced Persistent Threats Attack Vectors," pp. 387–421, 2021, doi: 10.3390/jcp1030021.
[4] S. Slate, "Endpoint Security: An Overview and a Look into the Future," Lat. Am. Polit. Hist., 2018, doi: 10.4324/9780429499340-15.
[5] G. González-granadillo, S. González-zarzosa, and R. Diaz, “Trends, and Usage in Critical Infrastructures,” 2021.
[6] M. Chopra and C. Mahapatra, "Significance of security information and event management (SIEM) in modern organizations," Int. J. Innov. Technol. Explor. Eng., vol. 8, no. 7, pp. 432–435, 2019.
[7] M. Vielberth and G. Pernul, "A Security Information and Event Management Pattern," Fed. Minist. Educ. Res., vol. 1, no. November 2018, pp. 1–12, 2018.
[8] H. Jauhiainen, "Designing End User Area Cybersecurity for Cloud-based Organization," no. February 2021.
[9] A. Chuvakin, "Gartner Blog Network," 2013. https://blogs.gartner.com/anton-chuvakin/2013/07/26/named-endpoint-threat-detection-response/ (accessed July 2021).
[10] Mcafee, "What is Endpoint Detection and Response (EDR)? " 2021.
[11] "Endpoint Detection and Response - Global Market Outlook (2017-2026)," Stratistics Market Research Consulting, 2018. https://www.marketresearch.com/Stratistics-Market-Research-Consulting-v4058/Endpoint-Detection-Response-Global-Outlook-12066121/ (accessed July 2021).
[12] L. Neely and A. Torres, "Endpoint Protection and Response: A SANS Survey," SANS Inst., no. June, p. 16, 2018.
[13] J. Petters, "What is SIEM? A Complete Beginner's Guide - Varonis," 2020. https://www.varonis.com/blog/what-is-siem/ (accessed July 2021).
[14] Cisco, “What is XDR? - Extended Detection and Response - Cisco,” 2021. https://www.cisco.com/c/en/us/products/security/what-is-xdr.html (accessed July 2021).
[15] Mcafee, "What Is XDR? Extended Detection and Response l McAfee," 2021. https://www.mcafee.com/enterprise/en-us/security-awareness/endpoint/what-is-xdr.html (accessed July 2021).
[16] "Endpoint Detection and Response (EDR): o caso do contexto | Security Report," 2019. https://www.securityreport.com.br/overview/endpoint-detection-and-response-edr-o-caso-do-contexto/#.YPc5kRNKj0p (accessed July 2021).
Detection and Prevention of TCP SYN Flood DoS Attacks: Concepts
Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.
Authors
Pedro Ramos Brandao, Coordinator Professor at Instituto Superior de Tecnologias Avançadas
Jeremias Tavares, Master Degree Student at Instituto Superior de Tecnologias Avançadas
Media
To cite this article
Pedro Ramos Brandao, Jeremias Tavares, Detection and Prevention of TCP SYN Flood DoS Attacks: Concepts
DOI: 10.31112/kriativ-tech-2021-10-57
Abstract
Internet security is a topic of high importance, and in recent years it has gained greater popularity with the growing wave of DoS attacks perpetuated through TCP SYN Flood. This kind of attack has several types of motivation: political, unfair competition, human evil. It is intended to deepen the concepts related to this type of attack architecture and which vulnerabilities are exploited that possibly facilitate the success of the SYN Flood. The central attack prevention systems, IDS and IPS, are presented conceptually. A simulation of the attack in a virtually recreated environment is depicted as proof of concept and execution. In contrast, there is evidence of the greater demand and growing sophistication of the means of detection and prevention using modern technologies.
Keywords
Cybersecurity, IDS, IPS, SYN Flood, DoS
References
[1] A. Verma, R. Saha, G. Kumar, and T. Kim, "The Security Perspectives of Vehicular Networks: A Taxonomical Analysis of Attacks and Solutions", Appl. Sci., vol. 11, no. 10, 2021, doi: 10.3390/app11104682.
[2] A. E. Ibor, F. A. Oladeji, O. B. Okunoye, and O. O. Ekabua, "Conceptualisation of Cyberattack prediction with deep learning", Cybersecurity, vol. 3, no. 1, 2020, doi: 10.1186/s42400-020-00053-7.
[3] Y. Shen, E. Mariconti, P. A. Vervier, and G. Stringhini, "Tiresias: Predicting Security Events Through Deep Learning", in Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018, pp. 592–605, doi: 10.1145/3243734.3243811.
[4] K. K. Nguyen, D. T. Hoang, D. Niyato, P. Wang, D. Nguyen, E. Dutkiewicz, "Cyberattack detection in mobile cloud computing: A deep learning approach", 2018 IEEE Wireless Communications and Networking Conference (WCNC), Barcelona, pp. 1-6 2018, http://hdl.handle.net/10453/131928.
[5] Q. Zhang, K. Liu, Y. Xia, & A. Ma, "Optimal Stealthy Deception Attack Against Cyber-Physical Systems", IEEE transactions on cybernetics, 50(9), 2019, 3963–3972. https://doi.org/10.1109/TCYB.2019.2912622
[6] M. Al-Qatf, Y. Lasheng, M. Al-Habib, K. Al-Sabahi, "Deep learning approach combining sparse autoencoder with SVM for network intrusion detection", IEEE Access 6, pp. 843–856, 2018.
[7] B. Bouyeddou, B. Kadri, F. Harrou, Y. Sun, "DDOS-attacks detection using an efficient measurement-based statistical mechanism", Eng. Sci. Technol. an Int. J., vol. 23, no. 4, pp. 870–878, 2020, doi: 10.1016/j.jestch.2020.05.002.
[8] S. Shin, V. Yegneswaran, P. Porras, G. Gu, "AVANT-GUARD: Scalable and Vigilant Switch Flow Management in Software-Defined Networks", in Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, 2013, pp. 413–424, doi: 10.1145/2508859.2516684.
[9] M. Junaid et al., "An Indigenous Solution for SYN Flooding", Rev. GEINTEC-GESTAO Inov. E Tecnol., vol. 11, no. 4, pp. 2998–3022, 2021
[10] M. Rahouti, K. Xiong, N. Ghani, F. Shaikh, "SYNGuard: Dynamic threshold-based SYN flood attack detection and mitigation in software-defined networks", IET Networks, vol. 10, no. 2, pp. 76–87, 2021, doi: https://doi.org/10.1049/ntw2.12009.
[11] N. McKeown et al., "OpenFlow: Enabling innovation in campus networks", Comput. Commun. Rev., vol. 38, pp. 69-74, 2008, doi: 10.1145/1355734.1355746.
[12] E. Grimit, T. Gneiting, V. Berrocal, N.A. Johnson, "The continuously ranked probability score for circular variables and its application to mesoscale forecast ensemble verification", Quart. J. R. Meteorol. Soc. 132 (621C) 2006, https://doi.org/10.1256/qj.05.235.
[13] J. Matheson, R. Winkler, "Scoring rules for continuous probability distributions", Manage. Sci. 22 (10) 1087–1096, 1976, https://doi.org/10.1287/mnsc.22.10.1087.
[14] S. Fichera, L. Galluccio, S. Grancagnolo, G. Morabito, S. Palazzo, "Operetta: An OpenFlow-based remedy to mitigate TCP synflood attacks against web servers", Computer Networks, 92:89–100, 2015.
[15] R. Mohammadi, R. Javidan, M. Conti. "Slicots: An sdn-based lightweight countermeasure for TCP syn flooding attacks", IEEE Transactions on Network and Service Management, 2017.
[16] B. A. Khalaf et al., "A simulation study of syn flood attack in a cloud computing environment," AUS J., vol. 26, no. 1, pp. 188–197, 2019.
Technology, Empowerment and Economic Development
Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.
Authors
João Gonçalves, Assistant Professor at ISTEC
Media
To cite this article
João Gonçalves, Technology, Empowerment and Economic Development
DOI: 10.31112/kriativ-tech-2021-10-50
Abstract
This article is based on a research whose objective was to identify and analyze, in the current context of technological development related to new forms of production and organization of working times, the main impacts that are expected regarding the future of labor, the adequacy of resource qualification, and the challenges of society and economic activity.
The research has shown that technological progress, being fundamental to the sustainability of business and economy, requires adjustments at the level of resources, society and companies' empowerment, the State's crucial role in supporting and creating the conditions through public policies for development and economic recovery.
Keywords
Technology, empowerment, economic development, public policy
References
[1] Ferreira, Joana (2019). Which are the most demanded jobs by the employers in Portugal?
Eco online. August 13th - available at https://eco.sapo.pt/2019/08/13/quais-as-funcoes- mais-procuradas-pelos-empregadores-em-portugal/; accessed on 04-07-2021
[2] Nuñez, Jesus (2021). Digitalization: a path of opportunity or an inequality factor? Eco online. July 8 - available at
https://eco.sapo.pt/opiniao/digitalizacao-um-caminho-de-oportunidades-ou-um-fator-de-desigualdade/; accessed on10-07-2021
[3] European Court of Auditors (2020). European Industry Digitization: an ambitious initiative whose success depends on the continued commitment of the EU, governments, and companies. Luxembourg. EU Publications Services
[4] Teixeira, Sebastião (2013). Organizations Management. Escolar editora, 3rd edition, Lisbon
[5] Page, Michael (2021). The impact of robots on employment. Available at
https://www.michaelpage.pt/not%C3%ADcias-estudos/estudos/fw-o-trabalho-do-futuro/o-impacto-dos-rob%C3%B4s-no-emprego; accessed on 04.07.2021
[6] Mills, Corinne (2021). Fluid skills. In Michael Page. Available at https://www.michaelpage.pt/not%C3%ADcias-estudos/estudos/fw-o-trabalho-do-futuro/compet%C3%AAncias-flu%C3%ADdas; accessed on 11-07-2021
[7] OECD (2019). OECD Employment Outlook 2019: The Future of Work, OECD Publishing, Paris
[8] Portuguese Republic (2021). Green Paper on the Future of Work. Working draft, CPCS discussion
[9] Ministry of Planning (2021). Portugal 2030 Strategy. Strategic Framework Document
[10] International group that gathers the world's most ambitious digital governments, with the common goal of using digital capabilities to improve businesses and citizens' lives
[11] Informal group, created on October 5, 2020, gathering those European countries considered leaders in digital transformation
[12] D9+ members include Denmark, Finland, Sweden, the Netherlands, Luxembourg, Belgium, the United Kingdom, Ireland, and Estonia, joined by the Czech Republic, Poland, and Portugal
[13] European Commission (2020), Digital Economy and Society Index (DESI) 2020
[14] RCM no. 98/2020, of November 13
[15] Decree Law No. 13/2015, of January 26 - Article 3, paragraph 2, a)
[16] Moura, João (1986). Labor Economics. Oliveira Martins Foundation, Labor Studies collection