publicações selecionadas
-
artigo académico
- Semantic and Syntactic Rules for the Specification of Information Systems and Technology Competencies. International Journal on Computer Science and Information Systems. 2022
- Devising Information Systems and Technology Evolutionary Paths with IT-CMF. International Journal on Computer Science and Information Systems. 2021
- Institutionalization of Information Systems Security Policies Adoption: Factors and Guidelines. International Journal on Computer Science and Information Systems. 2014
- Computer Programming: Fail Fast to Learn Sooner. Communications in Computer and Information Science. 2010
-
artigo de conferência
- Governance Models for Non-Profit Organizations: A Literature Review 2023
- A Grammar for Information Systems and Technology Competencies 2022
- A Network Analysis of IT-CMF 2021
- IT-CMF and BPM Critical Capability: Improving Software Development Lab on Academic Context 2021
- A Generic Proposal for Competence Mapping: A Case Study from Information Systems Discipline 2020
- An IoT Application Case Study to Optimize Electricity Consumption in the Government Sector 2020
- Cloud Computing Adoption in the Government Sector in Brazil: An Exploratory Study with Recommendations from IT Managers. Computational Methods in Applied Sciences. 2019
- Analyzing e-Governance Assessment Initiatives: An Exploratory Study 2018
- Key Issues for the Successful Adoption of Cloud Computing. Procedia Computer Science. 2017
- A Comparison of Methods for Forecasting Emergency Department Crowding 2015
- Evaluation of Information Systems Resilience 2015
- Information Systems and Business Alignment Auditing 2015
- E-Government interoperability frameworks: a worldwide inventory. Information Processing Letters. 2014
- Information Systems Security Management Key Issues in Local Government 2014
- Information Systems Security Policies Adoption: An Institutional Theory View 2014
- A Revised Framework of Information Security Principles 2013
- Applying Action Research in the Adoption of Information Systems Security Policies 2013
- Key Issues in Information Systems Security Management 2013
- Secure Outsourcing: An Investigation of the Fit between Clients and Providers. IFIP Advances in Information and Communication Technology. 2013
- Trust Factors in the Adoption of National Electronic Health Records 2013
- Information Security Policies: A Content Analysis 2012
- Information Systems Security Outsourcing Key Issues: A Service Providers' Perspective 2012
- Supporting Intense Needs of Assessment in Computer Programming Disciplines 2012
- Trust in e-Voting Systems: A Case Study. Lecture Notes in Business Information Processing. 2012
- Information Systems Security Policies: A Survey in Portuguese Public Administration 2010
- Interpreting Legislative Controls of DNA Databases 2010
-
artigo de revista
- Assessment of Forecasting Models for Patients Arrival at Emergency Department. Operations Research for Health Care. 2018
- Information Security Concerns in IT Outsourcing: Identifying (In)congruence between Clients and Vendors. Information & Management. 2017
- A catalog of information systems outsourcing risks. International Journal of Information Systems and Project Management. 2014
- Assessment Frequency in Introductory Computer Programming Disciplines. Computers in Human Behavior. 2014
-
capítulo de livro
- Modelling and Analysing Product Development Processes in the Textile and Clothing Industry 2023
- Information Systems - A Reflection on the Nature of the Scientific Area of Information Systems: From Scientific Research to Professional Practice 2022
- Authenticity Challenges of Wearable Technologies 2018
-
documento
- Management of Information Systems 2022
- Fundamentals of Information Systems 2021
- Information Systems Auditing 2020
- Information Systems Security Management 2020
- programmingscheme - Adaptive maintenance of programmingscheme 2017
- programmingscheme - Specification, analysis, design, coding and testing of programmingscheme 2009
- Social, Organizational and Economic Impact of IT 2007
- Social and Ethical Impact of Technology 2006
- Issues in Protecting Intangible Organizational Assets 2005
- Algorithmic Language - L.A. 1998
- Algorithms - Problems Set 1998
- CONUM - Numerical Computation Application 1995
- JISSec Electronic Payments System - Redesign, coding and testing of JISSec electronic payments system
- JISSec Electronic Payments System - Specification, analysis, design, coding and testing of JISSec electronic payments system
- JISSec Peer Review Management System - Extension of JISSec peer review management system
- JISSec Peer Review Management System - Redesign, coding and testing of JISSec peer review management system
- Site JISSec - Redesign, coding and testing of JISSec site
- Site JISSec - Specification, analysis, design, coding and testing of Journal of Information System Security (JISSec) site
-
livro
-
teses