his.sePublications
Change search
Link to record
Permanent link

Direct link
BETA
Amorim, Joni A.
Alternative names
Publications (4 of 4) Show all publications
Rego, I. d., Amorim, J. d., Gustavsson, P. M. & Andler, S. F. (2015). Multimedia production projects: Relevant issues and possible models for mobile learning. In: Mohamed Ally and Badrul H. Khan (Ed.), International Handbook of E-Learning Volume 2: Implementation and Case Studies (pp. 69-76). New York: Routledge
Open this publication in new window or tab >>Multimedia production projects: Relevant issues and possible models for mobile learning
2015 (English)In: International Handbook of E-Learning Volume 2: Implementation and Case Studies / [ed] Mohamed Ally and Badrul H. Khan, New York: Routledge, 2015, p. 69-76Chapter in book (Refereed)
Place, publisher, year, edition, pages
New York: Routledge, 2015
National Category
Computer Sciences Media and Communication Technology
Identifiers
urn:nbn:se:his:diva-13058 (URN)000383667900009 ()2-s2.0-84957403007 (Scopus ID)978-1-315-76090-2 (ISBN)978-1-138-79372-9 (ISBN)
Available from: 2016-10-27 Created: 2016-10-27 Last updated: 2018-01-14Bibliographically approved
Amorim, J. A., Yano, E. T., Åhlfeldt, R.-M., Andler, S. F. & Gustavsson, P. M. (2014). Awareness and training: Identification of relevant security skills and competencies. In: Claudio da Rocha Brito, Melany M. Ciampi (Ed.), Engineering Education in a Technology-Dependent World: Book of Abstracts. Paper presented at INTERTECH'2014 - XIII International Conference on Engineering and Technology Education, March 16-19, 2014, Guimarães, portugal (pp. 37). Guimarães: INTERTECH
Open this publication in new window or tab >>Awareness and training: Identification of relevant security skills and competencies
Show others...
2014 (English)In: Engineering Education in a Technology-Dependent World: Book of Abstracts / [ed] Claudio da Rocha Brito, Melany M. Ciampi, Guimarães: INTERTECH , 2014, , p. 57p. 37-Conference paper, Oral presentation with published abstract (Refereed)
Abstract [en]

In order to identify needed skills and competencies for privacy and security, we propose a systematic process that maps privacy and security threats to related controls that are required to prevent, detect or remove such threats. This work suggests how to apply the process, while discussing how games and simulations can be used both to develop the desired behavior and to monitor the current competency level.

Place, publisher, year, edition, pages
Guimarães: INTERTECH, 2014. p. 57
Series
Proceedings of International Conference on Engineering and Technology Education, ISSN 2317-4382 ; Vol 13
National Category
Information Systems
Research subject
Technology
Identifiers
urn:nbn:se:his:diva-9920 (URN)978-85-65992-28-2 (ISBN)978-85-66680-28-7 (ISBN)
Conference
INTERTECH'2014 - XIII International Conference on Engineering and Technology Education, March 16-19, 2014, Guimarães, portugal
Available from: 2014-09-09 Created: 2014-09-09 Last updated: 2018-01-11Bibliographically approved
Amorim, J. A., Hendrix, M., Andler, S. F., Llinas, J., Gustavsson, P. M. & Brodin, M. (2013). Cyber Security Training Perspectives. In: : . Paper presented at 2013 Annual Computer Security Applications Conference (ACSAC), New Orleans, December 9–13, 2013.
Open this publication in new window or tab >>Cyber Security Training Perspectives
Show others...
2013 (English)Conference paper, Poster (with or without abstract) (Refereed)
Abstract [en]

Building comprehensive cyber security strategies to protect people, infrastructure and assets demands research on methods and practices to reduce risks. Once the methods and practices are identified, there is a need to develop training for the manystakeholders involved, from security experts to the end user. In thispaper, we discuss new approaches for training, which includes the development of serious games for training on cyber security. The identification of the theoretical framework to be used for situation and threat assessment receives special consideration.

Keywords
Cyber Security, Information Fusion, Serious Games, Training
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:his:diva-10363 (URN)
Conference
2013 Annual Computer Security Applications Conference (ACSAC), New Orleans, December 9–13, 2013
Available from: 2014-12-09 Created: 2014-12-09 Last updated: 2018-01-11Bibliographically approved
Amorim, J. A., Åhlfeldt, R.-M., Gustavsson, P. M. & Andler, S. F. (2013). Privacy and Security in Cyberspace: Training Perspectives on the Personal Data Ecosystem. In: Joel Brynielsson and Fredrik Johansson (Ed.), European Intelligence and Security Informatics Conference (EISIC), Proceedings CD: . Paper presented at 4th European Intelligence and Security Informatics Conference (EISIC). August 12-14, 2013. Information Technology Center ITC at Uppsala University. Uppsala, Sweden (pp. 139-142). IEEE conference proceedings, Article ID 6657140.
Open this publication in new window or tab >>Privacy and Security in Cyberspace: Training Perspectives on the Personal Data Ecosystem
2013 (English)In: European Intelligence and Security Informatics Conference (EISIC), Proceedings CD / [ed] Joel Brynielsson and Fredrik Johansson, IEEE conference proceedings, 2013, p. 139-142, article id 6657140Conference paper, Published paper (Refereed)
Abstract [en]

There is a growing understanding that privacy is an essential component of security. In order to decrease the probability of having data breaches, the design of information systems,  processes  and  architectures  should  incorporate considerations  related  to  both  privacy  and  security.  This incorporation may benefit from the offering of appropriate training. In this way, this paper intends to discuss how to better offer training while considering new developments that involve both multimedia production and the “gamification” of training. The paper suggests the use in conjunction of two frameworks: the EduPMO Framework, useful for the management of large scale projects  that  may  involve  a  consortium  of  organizations developing multimedia for the offering of training, and the Game Development Framework, useful for the identification of the main components of the serious game for training on privacy by design to be developed as part of the training offering.

Place, publisher, year, edition, pages
IEEE conference proceedings, 2013
Keywords
big data, privacy, security, training
National Category
Computer and Information Sciences
Research subject
Technology
Identifiers
urn:nbn:se:his:diva-8558 (URN)10.1109/EISIC.2013.30 (DOI)2-s2.0-84892164943 (Scopus ID)978-0-7695-5062-6 (ISBN)
Conference
4th European Intelligence and Security Informatics Conference (EISIC). August 12-14, 2013. Information Technology Center ITC at Uppsala University. Uppsala, Sweden
Available from: 2013-10-21 Created: 2013-10-21 Last updated: 2018-01-11Bibliographically approved
Organisations

Search in DiVA

Show all publications