his.sePublications
Change search
Link to record
Permanent link

Direct link
BETA
Amorim, Joni A.
Alternative names
Publications (5 of 5) Show all publications
Rego, I. d., Amorim, J. d., Gustavsson, P. M. & Andler, S. F. (2015). Multimedia production projects: Relevant issues and possible models for mobile learning. In: Mohamed Ally and Badrul H. Khan (Ed.), International Handbook of E-Learning Volume 2: Implementation and Case Studies (pp. 69-76). New York: Routledge
Open this publication in new window or tab >>Multimedia production projects: Relevant issues and possible models for mobile learning
2015 (English)In: International Handbook of E-Learning Volume 2: Implementation and Case Studies / [ed] Mohamed Ally and Badrul H. Khan, New York: Routledge, 2015, p. 69-76Chapter in book (Refereed)
Place, publisher, year, edition, pages
New York: Routledge, 2015
National Category
Computer Sciences Media and Communication Technology
Research subject
Distributed Real-Time Systems
Identifiers
urn:nbn:se:his:diva-13058 (URN)000383667900009 ()2-s2.0-84957403007 (Scopus ID)978-1-315-76090-2 (ISBN)978-1-138-79372-9 (ISBN)
Available from: 2016-10-27 Created: 2016-10-27 Last updated: 2019-01-22Bibliographically approved
Amorim, J. A., Yano, E. T., Åhlfeldt, R.-M., Andler, S. F. & Gustavsson, P. M. (2014). Awareness and training: Identification of relevant security skills and competencies. In: Claudio da Rocha Brito, Melany M. Ciampi (Ed.), Engineering Education in a Technology-Dependent World: Book of Abstracts. Paper presented at INTERTECH'2014 - XIII International Conference on Engineering and Technology Education, March 16-19, 2014, Guimarães, portugal (pp. 37). Guimarães: INTERTECH
Open this publication in new window or tab >>Awareness and training: Identification of relevant security skills and competencies
Show others...
2014 (English)In: Engineering Education in a Technology-Dependent World: Book of Abstracts / [ed] Claudio da Rocha Brito, Melany M. Ciampi, Guimarães: INTERTECH , 2014, , p. 57p. 37-Conference paper, Oral presentation with published abstract (Refereed)
Abstract [en]

In order to identify needed skills and competencies for privacy and security, we propose a systematic process that maps privacy and security threats to related controls that are required to prevent, detect or remove such threats. This work suggests how to apply the process, while discussing how games and simulations can be used both to develop the desired behavior and to monitor the current competency level.

Place, publisher, year, edition, pages
Guimarães: INTERTECH, 2014. p. 57
Series
Proceedings of International Conference on Engineering and Technology Education, ISSN 2317-4382 ; Vol 13
National Category
Information Systems
Research subject
Technology; Information Systems
Identifiers
urn:nbn:se:his:diva-9920 (URN)978-85-65992-28-2 (ISBN)978-85-66680-28-7 (ISBN)
Conference
INTERTECH'2014 - XIII International Conference on Engineering and Technology Education, March 16-19, 2014, Guimarães, portugal
Available from: 2014-09-09 Created: 2014-09-09 Last updated: 2019-01-22Bibliographically approved
Pozzer, C., Amorim, J. A., Gustavsson, P. M., Mellin, J., Heldal, I. & Azevedo, A. T. (2014). Imprecise Computation as an Enabler for Complex and Time Critical HLA Simulation Networks. In: Proceedings of Simulation Interoperability Workshop: . Paper presented at Fall Simulation Interoperability Workshop, 2014 Fall SIW; Orlando; United States; 8 September 2014 through 12 September 2014 (pp. 171-179).
Open this publication in new window or tab >>Imprecise Computation as an Enabler for Complex and Time Critical HLA Simulation Networks
Show others...
2014 (English)In: Proceedings of Simulation Interoperability Workshop, 2014, p. 171-179Conference paper, Published paper (Refereed)
Abstract [en]

A trend over the past years is that simulation systems for training are being connected in simulationnetworks, allowing the interaction of teams spread in distributed sites. By combining interconnected simulation systemsthe simulation complexity increases and may affect time-critical simulation tasks in a negative way. As a consequence,the training simulation objectives may not be met. The same problem may occur when performing, for example, missionrehearsal on site, since available computation resources are usually very limited in this scenario, or for a joint firesscenario, where the large and complex functional chain (including intelligence, C2, forward observer, pilots, etc.) mayoverload existing resources. In this work, the technique of imprecise computation in real-time systems (ICRS) topreserve time-critical simulation tasks is presented. The ICRS technique allows time-critical tasks to produce quickersolutions for approximate results and saves computational resources. This paper discusses the main advantages of theICRS technique by a review of the commonly used optimization concepts built upon imprecise computation field. Thepaper ends with presenting a work-in-progress: an architectural solution for aligning ICRS with the High LevelArchitecture (HLA), standardized as the IEEE 1516-series.

Keywords
scheduling for imprecise computation, HLA, simulation, joint fires, real-time systems, integration
National Category
Computer Systems
Research subject
Technology; Distributed Real-Time Systems; Interaction Lab (ILAB)
Identifiers
urn:nbn:se:his:diva-9891 (URN)2-s2.0-84910115603 (Scopus ID)9781634393898 (ISBN)
Conference
Fall Simulation Interoperability Workshop, 2014 Fall SIW; Orlando; United States; 8 September 2014 through 12 September 2014
Projects
Agent-orient large-scale complex virtual environments
Available from: 2014-09-04 Created: 2014-09-04 Last updated: 2019-02-19Bibliographically approved
Amorim, J. A., Hendrix, M., Andler, S. F., Llinas, J., Gustavsson, P. M. & Brodin, M. (2013). Cyber Security Training Perspectives. In: : . Paper presented at 2013 Annual Computer Security Applications Conference (ACSAC), New Orleans, December 9–13, 2013.
Open this publication in new window or tab >>Cyber Security Training Perspectives
Show others...
2013 (English)Conference paper, Poster (with or without abstract) (Refereed)
Abstract [en]

Building comprehensive cyber security strategies to protect people, infrastructure and assets demands research on methods and practices to reduce risks. Once the methods and practices are identified, there is a need to develop training for the manystakeholders involved, from security experts to the end user. In thispaper, we discuss new approaches for training, which includes the development of serious games for training on cyber security. The identification of the theoretical framework to be used for situation and threat assessment receives special consideration.

Keywords
Cyber Security, Information Fusion, Serious Games, Training
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:his:diva-10363 (URN)
Conference
2013 Annual Computer Security Applications Conference (ACSAC), New Orleans, December 9–13, 2013
Available from: 2014-12-09 Created: 2014-12-09 Last updated: 2018-01-11Bibliographically approved
Amorim, J. A., Åhlfeldt, R.-M., Gustavsson, P. M. & Andler, S. F. (2013). Privacy and Security in Cyberspace: Training Perspectives on the Personal Data Ecosystem. In: Joel Brynielsson and Fredrik Johansson (Ed.), European Intelligence and Security Informatics Conference (EISIC), Proceedings CD: . Paper presented at 4th European Intelligence and Security Informatics Conference (EISIC). August 12-14, 2013. Information Technology Center ITC at Uppsala University. Uppsala, Sweden (pp. 139-142). IEEE conference proceedings, Article ID 6657140.
Open this publication in new window or tab >>Privacy and Security in Cyberspace: Training Perspectives on the Personal Data Ecosystem
2013 (English)In: European Intelligence and Security Informatics Conference (EISIC), Proceedings CD / [ed] Joel Brynielsson and Fredrik Johansson, IEEE conference proceedings, 2013, p. 139-142, article id 6657140Conference paper, Published paper (Refereed)
Abstract [en]

There is a growing understanding that privacy is an essential component of security. In order to decrease the probability of having data breaches, the design of information systems,  processes  and  architectures  should  incorporate considerations  related  to  both  privacy  and  security.  This incorporation may benefit from the offering of appropriate training. In this way, this paper intends to discuss how to better offer training while considering new developments that involve both multimedia production and the “gamification” of training. The paper suggests the use in conjunction of two frameworks: the EduPMO Framework, useful for the management of large scale projects  that  may  involve  a  consortium  of  organizations developing multimedia for the offering of training, and the Game Development Framework, useful for the identification of the main components of the serious game for training on privacy by design to be developed as part of the training offering.

Place, publisher, year, edition, pages
IEEE conference proceedings, 2013
Keywords
big data, privacy, security, training
National Category
Computer and Information Sciences
Research subject
Technology
Identifiers
urn:nbn:se:his:diva-8558 (URN)10.1109/EISIC.2013.30 (DOI)2-s2.0-84892164943 (Scopus ID)978-0-7695-5062-6 (ISBN)
Conference
4th European Intelligence and Security Informatics Conference (EISIC). August 12-14, 2013. Information Technology Center ITC at Uppsala University. Uppsala, Sweden
Available from: 2013-10-21 Created: 2013-10-21 Last updated: 2018-01-11Bibliographically approved
Organisations

Search in DiVA

Show all publications