{"title":"Social media adoption and reach: The case of the Lima’s local governments","authors":"G. Dias, M. Bruzza, M. Tupia","doi":"10.23919/cisti54924.2022.9820509","DOIUrl":"https://doi.org/10.23919/cisti54924.2022.9820509","url":null,"abstract":"This paper contributes to identify determinants of social media adoption by local governments and of the audience they reach through that channel, after adoption. The 43 districts of Lima, the capital city of Peru, were used as a case study. Primary data about the presence and audience of these local governments on Facebook, Twitter, and YouTube was collected to support the analyses. Main conclusions are that socioeconomic dynamism and previous experience in implementing e-government are relevant determinants of both adoption and audience; and that population size is a relevant determinant of audience but not a relevant determinant of adoption. These results contribute to the theory by further validating and complementing results that were previously obtained in other Latin-American countries and in other regions in the world.","PeriodicalId":187896,"journal":{"name":"2022 17th Iberian Conference on Information Systems and Technologies (CISTI)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121053147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Luz Maria Hernandez Cruz, Francisco Javier Barrera Lao, Diana Concepción Mex Alvarez, M. Castillo Téllez, Roberto Carlos Canto Canul, Josue Israel Solis May, Mayra Deyanira Flores Guerrero
{"title":"Use of the Hefesto v2.0 methodology to implement a Data warehouse: Case applied COVID-19","authors":"Luz Maria Hernandez Cruz, Francisco Javier Barrera Lao, Diana Concepción Mex Alvarez, M. Castillo Téllez, Roberto Carlos Canto Canul, Josue Israel Solis May, Mayra Deyanira Flores Guerrero","doi":"10.23919/cisti54924.2022.9820132","DOIUrl":"https://doi.org/10.23919/cisti54924.2022.9820132","url":null,"abstract":"The objective of this article is to present the proposal for the design and construction of a data repository with the intention of storing facts related to the current situation of COVID-19 and obtaining relevant and precise information for decision-making in the face of the latent risk of contagion. The motivation for this study arises from the need to centralize reliable and easily accessible information for monitoring cases in the face of the pandemic. Likewise, the use of the Hephaestus v2.0 methodology is proposed to guide the development of the Data warehouse step by step, which guarantees the success of the implementation. As an added value, the use of emerging technologies Microsoft SQL server 2019 and Visual Studio 2022 are integrated. The results presented will serve as an applied case study for information system administrators in the construction of data repositories and business intelligence solutions. Likewise, it contributes to the research line of scientific studies that integrate accepted and recognized methodologies or standards with emerging technologies.","PeriodicalId":187896,"journal":{"name":"2022 17th Iberian Conference on Information Systems and Technologies (CISTI)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122728132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. D'Amato, A. Rubiales, A. Perez, L. Dominguez, F. Stramana, N. Bennardo, M. Varny, L. Sarramone
{"title":"A new survillance architecture based on home cameras : A video streaming framework for handling distribute IP cameras through internet while keeping privacy","authors":"J. D'Amato, A. Rubiales, A. Perez, L. Dominguez, F. Stramana, N. Bennardo, M. Varny, L. Sarramone","doi":"10.23919/cisti54924.2022.9820064","DOIUrl":"https://doi.org/10.23919/cisti54924.2022.9820064","url":null,"abstract":"For being considered smart, cities must implement technology and innovation in each service that they should provide to citizens. One of those service is security, which is based on distributing cameras through the city and mounting monitoring centers with plenty of video-operators. Making such infrastructure expand could be impossible for many cities due to the high cost, so they need new ways for reaching that purpose. In this work, we propose a new surveillance infrastructure that take advantage of the already existent citizens cameras located in a public or semi-spaces: street, building gate, commercial location, among others. We describe the required software components for the implementation of such system. Preliminary studies are carried out, considering technical considerations to make this feasible, making a analysis of the computational effort and bandwidth requirements for such system.","PeriodicalId":187896,"journal":{"name":"2022 17th Iberian Conference on Information Systems and Technologies (CISTI)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125544847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Predict Churning Customers – An Explorative Study","authors":"Tomás Ferreira, Pedro Pita, I. Brito","doi":"10.23919/cisti54924.2022.9820260","DOIUrl":"https://doi.org/10.23919/cisti54924.2022.9820260","url":null,"abstract":"Some banks and business managers are facing the problem of customer credit card attrition. Therefore, it was necessary to identify new strategies for banks and business managers to keep their customers satisfied. In this paper, we analyze the data from a fictitious data source available on Kaggle, to find out the reason behind this and to predict customers who are likely to drop off so the banks and business managers can proactively provide them better services. To accomplish this, we used eight classification algorithms and the obtained results from some algorithms are very promising.","PeriodicalId":187896,"journal":{"name":"2022 17th Iberian Conference on Information Systems and Technologies (CISTI)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126381677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reaching better programming learning and teaching, categorizing students’ SWOT analysis","authors":"F. Correia, A. Gomes","doi":"10.23919/cisti54924.2022.9820323","DOIUrl":"https://doi.org/10.23919/cisti54924.2022.9820323","url":null,"abstract":"Learning to program for the first time is usually a problem worldwide. A variety of reasons, relatively well identified, have been pointed by several authors as the origin of this problem. Several tools, approaches and strategies have also been developed and applied over time. However, the problem remains. In this paper we tried to understand students’ points of view on the subject throughout the various topics exposed during the classes by a categorization and analysis of students SWOT analysis. The data was collected during classes and afterwards was analysed.","PeriodicalId":187896,"journal":{"name":"2022 17th Iberian Conference on Information Systems and Technologies (CISTI)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125908551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Facebook posts by Portuguese municipalities: a preliminary study","authors":"G. Dias","doi":"10.23919/cisti54924.2022.9820215","DOIUrl":"https://doi.org/10.23919/cisti54924.2022.9820215","url":null,"abstract":"This study addresses the contents published by local governments in social media and the volume of interactions with citizens they generate. Portugal was used as a case study: the Facebook pages of 84 Portuguese municipalities were analyzed during November 2021, making a total of 6,897 posts that generated 25,761 comments and 432,031 likes. Facebook posts were classified according to a set 18 content types. Most published content types and the content types that generate more interactions were analyzed, among other factors. Main conclusions are that the population explains 54% of the number of page likes; that the number of page likes explains 49% of the number of posts likes; that the number of page likes explains 44% of the number of posts comments; that most published topics relate to culture (31%) and health (11%); that there is no correlation between the most published topics and the ones that get the most likes and comments; and that more political topics stand out in the number of likes and, specially, the number of comments obtained. These conclusions contribute to both confirm and extend the extant knowledge on the subject, namely by showing that political topics generate more interactions than other content types.","PeriodicalId":187896,"journal":{"name":"2022 17th Iberian Conference on Information Systems and Technologies (CISTI)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129323965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Success evaluation model of E-government systems for tax administrations: Recognizing the public value from the taxpayer's perspective","authors":"Cindy Martinez, Beatriz Helena Diaz Pinzon","doi":"10.23919/cisti54924.2022.9820607","DOIUrl":"https://doi.org/10.23919/cisti54924.2022.9820607","url":null,"abstract":"Through the E-government systems, the tax administrations of the different levels of government interrelate with their target user, in this case the taxpayer, ensuring that the latter achieves compliance with its tax obligations in an agile, timely and efficient manner, promoting in turn, the construction of public values in this interested party. However, it is important to assess whether these information systems (IS) having the capabilities to meet the objectives pre-established by this type of organization, which have missions, interest groups, perspectives, contexts, factors and particular benefits compared to other government entities, and in which its success or failure, influences government finances and the development of a territory. Therefore, this document proposes the construction of a model for evaluating the success of E-government systems for tax administrations, which proposes a particular and not a general character, where the traditional factors of success theories must be complemented with relevant constructs to this context, such as: demographic considerations, the capacity for timely parameterization due to regulatory changes (flexibility), the digital gap, allowing to classify its benefits from social, economic, individual, organizational, environmental and public value aspects, developing in this way a holistic model for this type of government organization, seeking that the taxpayer and their intermediaries are the protagonists of this assessment.","PeriodicalId":187896,"journal":{"name":"2022 17th Iberian Conference on Information Systems and Technologies (CISTI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129717646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Leandro Meira Marinho Queiroz, Rogerio Eduardo Garcia, D. M. Eler, Ronaldo Celso Messias Correia
{"title":"Fireasy: a tool to aid security policy modeling, translation and understanding firewall configuration","authors":"Leandro Meira Marinho Queiroz, Rogerio Eduardo Garcia, D. M. Eler, Ronaldo Celso Messias Correia","doi":"10.23919/cisti54924.2022.9820578","DOIUrl":"https://doi.org/10.23919/cisti54924.2022.9820578","url":null,"abstract":"Companies store increasing amounts of data, requiring the implementation of mechanisms to protect them from malicious people. There are techniques and procedures that aim to increase the security of computer systems, such as network protection services, firewalls. They are intended to filter packets that enter and leave a network. Its settings depend on security policies, which consist of documents that describe what is allowed to travel on the network and what is prohibited. The transcription of security policies into rules, written in native firewall language, that represent them, is the main source of errors in firewall configurations. In this work, concepts related to security between networks and firewalls are presented. Related works on security policies and their translations into firewall rules are also referenced. Furthermore, the developed tool, named Fireasy, is presented, which allows the modeling of security policies through graphic elements, and the maintenance of rules written in native firewall language, also representing them in graphic elements. Finally, a controlled experiment was conducted to validate the approach, which indicated, in addition to the correct functioning of the tool, an improvement in the translation of security policies into firewall rules using the tool. In the task of understanding firewall rules, there was a homogenization of the participants' performance when they used the tool.","PeriodicalId":187896,"journal":{"name":"2022 17th Iberian Conference on Information Systems and Technologies (CISTI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129613201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance evaluation of an Asterisk PBX prototype Beaglebone Black based","authors":"R. Lara-Cueva, Santiago Pazmino, Freddy R. Acosta","doi":"10.23919/cisti54924.2022.9820514","DOIUrl":"https://doi.org/10.23919/cisti54924.2022.9820514","url":null,"abstract":"This paper presents the performance evaluation of an Asterisk IP telephone exchange, implemented on a low-cost development board called Beaglebone Black. To do that, first we implement the telephone exchange, followed by experimentally evaluating the prototype with the help of a SIP traffic generator, by obtaining the maximum number of simultaneous calls that the exchange supports, an analysis of the Quality of Service (QoS) metrics were performed with the help of Wireshark traffic analyzer. Finally, the evaluation was carried out under the MOS criteria, in order to qualify the Quality of Experience (QoE) metrics experimented by users. We identified the maximum value of simultaneous calls that was obtained with the SIPP traffic generator were 45 calls and in the real-time evaluation, 10 simultaneous calls were achieved with a MOS rating between Good and Excellent in 90% of the participants.","PeriodicalId":187896,"journal":{"name":"2022 17th Iberian Conference on Information Systems and Technologies (CISTI)","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128238054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cesar Humberto Ortiz Huaman, Nilcer Fernandez Fuster, Ademir Cuadros Luyo, Jimmy Armas-Aguirre
{"title":"Critical Data Security Model: Gap Security Identification and Risk Analysis In Financial Sector","authors":"Cesar Humberto Ortiz Huaman, Nilcer Fernandez Fuster, Ademir Cuadros Luyo, Jimmy Armas-Aguirre","doi":"10.23919/cisti54924.2022.9820547","DOIUrl":"https://doi.org/10.23919/cisti54924.2022.9820547","url":null,"abstract":"In this paper, we proposed a data security model of a big data analytical environment in the financial sector. Big Data can be seen as a trend in the advancement of technology that has opened the door to a new approach to understanding and decision making that is used to describe the vast amount of data (structured, unstructured and semi-structured) that is too time consuming and costly to load a relational database for analysis. The increase in cybercriminal attacks on an organization’s assets results in organizations beginning to invest in and care more about their cybersecurity points and controls. The management of business-critical data is an important point for which robust cybersecurity controls should be considered. The proposed model is applied in a datalake and allows the identification of security gaps on an analytical repository, a cybersecurity risk analysis, design of security components and an assessment of inherent risks on high criticality data in a repository of a regulated financial institution. The proposal was validated in financial entities in Lima, Peru. Proofs of concept of the model were carried out to measure the level of maturity focused on: leadership and commitment, risk management, protection control, event detection and risk management. Preliminary results allowed placing the entities in level 3 of the model, knowing their greatest weaknesses, strengths and how these can affect the fulfillment of business objectives.","PeriodicalId":187896,"journal":{"name":"2022 17th Iberian Conference on Information Systems and Technologies (CISTI)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128241755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}