Top co-authors See all
86 shared publications
University of East London
30 shared publications
University of Westminster
29 shared publications
22 shared publications
Sérgio Tenreiro de Magalhães
19 shared publications
Universidade do Minho Department of Information SystemsCampus de Azurem
Distribution of Articles published per year
(1970 - 2012)
(1970 - 2012)
Total number of journals
Publications See all
BOOK-CHAPTER 1 Read 0 Citations A Probabilistic Knowledge-Based Information System for Environmental Policy Modeling and Decision Making Published: 01 January 2012
IFIP Advances in Information and Communication Technology, doi: 10.1007/978-3-642-33409-2_15
Decision making for setting new policies is a challenging process as the current policy making system is utterly flawed. A policy is introduced by the decision maker when the problem domain was fully consulted by experts in the field. Not always all the consultants and advisers agree on details or even basics of such a course of action. The need for an intelligent predictive system is emerging. Policy making on environmental issues are even shoddier as the environmental systems are habitually complex, and adaptive; and introduction of new technologies can easily affect the guiding strategies already taken. This paper outlines the principles of Knowledge Management Systems. It then reflects on Influence Diagrams’ suitability for construction of such an information system through the use of the London Plan case study. An application of such a system is outlined by means of a probabilistic knowledge based IS which is developed by Influence Diagrams and can be utilized as an Environmental policy modeler and/or DSS.
BOOK-CHAPTER 0 Reads 1 Citation Financial Assessment of London Plan Policy 4A.2 by Probabilistic Inference and Influence Diagrams Published: 01 January 2011
IFIP Advances in Information and Communication Technology, doi: 10.1007/978-3-642-23960-1_7
London Plan is the London mayor’s Spatial Development Strategy. This strategic long-term plan comprises of proposals for different aspects of change within the London boundary. Furthermore, the proposals include chapters outlining adjustments in each facet. Policy 4A.2 reflects the Climate Change Mitigation scheme. Some consultations and research works have been performed to this point, but an extensive cost assessment has not been done. This paper reflects a financial assessment by means of Influence Diagrams based upon the London Plan policies 4A.X.
BOOK-CHAPTER 0 Reads 1 Citation The People’s Republic of China – The Emerging Cyberpower Published: 01 January 2009
Highlights of Practical Applications of Agents, Multi-Agent Systems, and Complexity: The PAAMS Collection, doi: 10.1007/978-3-642-04062-7_15
The People’s Republic of China (PRC) has a long tradition on military strategy. In the end of the 20th century this was one of the first nations to prepare itself for the new emerging concept of war that includes the combat in cyberspace, both with the intention to obtain privileged information (espionage), to reduce the enemy attack and/or military capability or even to create casualties. This paper presents an overview on the known facts on this issue, concluding on an urgent need to improve the security technologies and policies of the digital systems used by the governments, namely in what concerns to authentication processes and the need for occidental countries to prepare personnel with knowledge on the culture, on the language and on the thought of the PRC, so that they can be ready for the next steps of this (re)emerging nation.
BOOK-CHAPTER 0 Reads 0 Citations Information Systems Security and Its Affiliation to Information Technology Risk Management Published: 01 January 2009
Highlights of Practical Applications of Agents, Multi-Agent Systems, and Complexity: The PAAMS Collection, doi: 10.1007/978-3-642-04062-7_22
The Information security is considered a risk management strategy. Risk management has always been an integral part of an Information Security programme. Hence, security should be addressed as one of the many key risk areas. Incorporation of information security within an It risk management programme elevates the importance of it and ties its practice together with other key IT risks. The Securities and Exchange Commission requires a formal risk assessment to evaluate the factors that impact an organization’s performance, because IT risk management and information security’s role is critical. The performance of risk assessments are a key component of good information security, mainly risk identification. In addition to return-on security-Investment strategy, the other trend is developing a culture of shared accountability. The reason being- the security is supposed to educate the business leader about threats, costs and consequences on the organization and the effectiveness of the possible remedies. This paper will report on an ongoing research to identify the function of Information systems security and its affiliation to Information technology risk management.
BOOK-CHAPTER 0 Reads 0 Citations The Georgia’s Cyberwar Published: 01 January 2009
Highlights of Practical Applications of Agents, Multi-Agent Systems, and Complexity: The PAAMS Collection, doi: 10.1007/978-3-642-04062-7_5
The evolution of the technology and the changes in the organization and control of the critical infrastructures of the nations are creating a new combat front. The case studied in this paper refers to the attack to the information systems of the Georgian organizations that occurred at the same time as the conventional military operation executed by the Russian army in the South Ossetia in August 2008. The data collected and presented in this paper showed the existence of a poorly organized network, related to Russian criminal organizations, raising the possibility of this case being an instance of the Maoist concept of the “People’s war”. This paper will also show that, despite the unsophisticated resources used in the attacks and to promote them, the damages in the selected targets were considerable.
Article 0 Reads 1 Citation Cultivating trust – an electronic-government development model for addressing the needs of developing countries Published: 01 January 2008
International Journal of Electronic Security and Digital Forensics, doi: 10.1504/ijesdf.2008.020942