Cookies Policy
The website need some cookies and similar means to function. If you permit us, we will use those means to collect data on your visits for aggregated statistics to improve our service. Find out More
Accept Reject
  • Menu
Publications

2024

The Role of Family Ownership on Internationalization Strategies

Authors
Costa, J; Barbosa, J;

Publication
ADMINISTRATIVE SCIENCES

Abstract
The present study examines the impact of family ownership and control on the internationalization strategies of Portuguese manufacturing firms. The study contributes to the existing literature by providing evidence that different forms of international market presence are asymmetrically influenced by family control and by underscoring the importance of innovative strategies. The analysis includes a sample of 25,533 firms observed from 2018 to 2021. Econometric models address the role of ownership in alternative internationalization endeavors, demonstrating that these firms differ from their non-family counterparts. By comparing the export propensity, intensity, and reach of family businesses to non-family businesses, the research sheds light on the challenges faced by family-owned firms and the significance of structural characteristics such as technological regimes and regional competitive advantages. The findings emphasize the negative impact of family presence on internationalization while highlighting the importance of innovation and ecosystem support. Additionally, the study contributes to the empirical refinement of firm classification by proposing a more reliable segmentation method. It also presents alternative econometric methods to appraise internationalization strategies better. Future research directions are suggested, particularly regarding the use of additional information related to innovation and human capital, offering insights for enhancing the global engagement of family businesses in global markets. This research provides valuable empirical evidence and practical implications for policymakers and practitioners seeking to support the required actions to promote the growth and internationalization of family businesses in the context of the Portuguese manufacturing industry.

2024

Large-scale agile security practices in software engineering

Authors
Ascençao, C; Teixeira, H; Gonçalves, J; Almeida, F;

Publication
INFORMATION AND COMPUTER SECURITY

Abstract
PurposeSecurity in large-scale agile is a crucial aspect that should be carefully addressed to ensure the protection of sensitive data, systems and user privacy. This study aims to identify and characterize the security practices that can be applied in managing large-scale agile projects.Design/methodology/approachA qualitative study is carried out through 18 interviews with 6 software development companies based in Portugal. Professionals who play the roles of Product Owner, Scrum Master and Scrum Member were interviewed. A thematic analysis was applied to identify deductive and inductive security practices.FindingsThe findings identified a total of 15 security practices, of which 8 are deductive themes and 7 are inductive. Most common security practices in large-scale agile include penetration testing, sensitive data management, automated testing, threat modeling and the implementation of a DevSecOps approach.Originality/valueThe results of this study extend the knowledge about large-scale security practices and offer relevant practical contributions for organizations that are migrating to large-scale agile environments. By incorporating security practices at every stage of the agile development lifecycle and fostering a security-conscious culture, organizations can effectively address security challenges in large-scale agile environments.

2024

Mitigating information asymmetry in 5G networks

Authors
Silva, HBGE; Santos, RMN; Ricardo, M;

Publication
INTERNET POLICY REVIEW

Abstract
The implementation of traffic differentiation measures by internet service providers (ISPs) has raised concerns regarding net neutrality, potentially leading to discriminatory practices that challenge existing regulatory frameworks. The complexity of this issue intensifies with the advent of 5G networks as they dynamically assemble elements of the physical infrastructure to create logically segregated domains customised to accommodate usage scenarios with specific requirements, resulting in the categorisation of users, applications, and services into distinct groups which possess the capacity to disrupt the non-discriminatory treatment of data flows. Within this context, a pivotal question arises: how can regulatory authorities effectively evaluate traffic differentiation in 5G networks? In response, this paper proposes an innovative application of the standardised network data analytics function (NWDAF) to facilitate the assessment of internet traffic differentiation. We introduce this novel concept and demonstrate its implementation through a proof -of -concept prototype. By leveraging the NWDAF, regulators may obtain direct and automatic access to performance metrics of 5G networks, enabling the analysis of the traffic management mechanisms employed by ISPs.

2024

Fair-OBNC: Correcting Label Noise for Fairer Datasets

Authors
Silva, IOe; Jesus, SM; Ferreira, HM; Saleiro, P; Sousa, I; Bizarro, P; Soares, C;

Publication
ECAI 2024 - 27th European Conference on Artificial Intelligence, 19-24 October 2024, Santiago de Compostela, Spain - Including 13th Conference on Prestigious Applications of Intelligent Systems (PAIS 2024)

Abstract

2024

Common Techniques, Success Attack Factors and Obstacles to Social Engineering: A Systematic Literature Review

Authors
Lopes, A; Mamede, S; Reis, L; Santos, A;

Publication
Emerging Science Journal

Abstract
Knowledge of Social Engineering is crucial to prevent potential attacks related to organizational Information Security. The objective of this paper aims to identify the most common social engineering techniques, success attack factors, and obstacles, as well as the good practices and frameworks that could be adopted concerning their mitigation. As an analysis methodology, a Systematic Literature Review was carried out. The findings revealed that the discussion about SE attacks has increased and that the most imminent threat is phishing. Exploiting human vulnerabilities is a growing threat when the attack is not carried out directly through technical means. There continue to be more technical attacks than non-technical attacks. Encouraging organizational security prevention, like training, education, technical controls, process development, defense in detail, and the development of security policies, should be considered mitigating factors for the negative impact of SE attacks. Most SE frameworks/models are focused on attack techniques and methods, mostly on technical components, decorating human factor. As a novelty, we found the opportunity to develop a new framework that could improve coverage of the gaps found, supported on security international standards, that could help and support researchers in developing their work, understanding open research topics, and providing a clearer understanding of this type of threat. © 2024 by the authors. Licensee ESJ, Italy.

2024

Immersive Creation of Virtual Reality Training Experiences

Authors
Coelho, H; Monteiro, P; Gonçalves, G; Melo, M; Bessa, M;

Publication
IEEE ACCESS

Abstract
Virtual reality (VR) for training helps minimize risks and costs by allowing more frequent and varied use of experiential training experiences, leading to active and improved learning. However, creating VR training experiences is costly and time-consuming, requiring software development experts. Additionally, current authoring tools are desktop-oriented, which detaches the process of creating the immersive experience from experiencing it in a situated context. This paper presents the development of an immersive authoring tool designed to create immersive virtual environments that can be used to train operatives. The authoring tool can record and replay animations of each action the user performed that can later be used to instruct other users how the task should be performed. Participants were divided into two groups, and the proposed authoring tool was evaluated using usability, satisfaction, presence and cybersickness. Between groups, Independent T-tests revealed that there were no significant differences between expert and non-expert groups in any of the studied variables. Also, the results showed that the authoring tool had high usability and satisfaction, average presence, and low probability of cybersickness symptoms.

  • 114
  • 3967