E.D. Canedo

E.D. Canedo
University of Brasília | UnB · Department of Computer Science

PhD

About

183
Publications
70,212
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
684
Citations
Additional affiliations
April 2010 - present
University of Brasília
Position
  • Professor
Description
  • I am a tenure track professor in the Department of Computer Science at the University of Brasilia, Brazil where I work since April 2010. I received my Ph.D. in Electrical Engineering from University of Brasilia (2012) in the Network Engineering group.
Education
July 2008 - August 2012

Publications

Publications (183)
Article
Full-text available
The innovations proposed by the mobile phone market have grown steadily in recent years, along with the increasing complexity of the hardware, operating systems and applications available in this market. These changes bring new usability-related challenges that need to be considered during the application development process, as new forms of user-a...
Conference Paper
A pandemia de COVID-19 tem alterado a rotina de profissionais da área de TIC, como demais áreas de indústria, mercado e academia. Este artigo investiga se tais mudanças variam por gênero, com atenção às mulheres. Assim, foi realizada uma pesquisa com 205 profissionais a qual permite averiguar os diferentes impactos em suas vidas. Para isso, aspecto...
Article
Full-text available
During the software development process and throughout the software lifecycle, organizations must guarantee users’ privacy by protecting personal data. There are several studies in the literature proposing methodologies, techniques, and tools for privacy requirements elicitation. These studies report that practitioners must use systematic approache...
Article
Full-text available
The process of identifying and managing Information and Communication Technology (ICT) risks has become a concern and a challenge for public and private organizations. In this context, risk management methodologies within the Brazilian Federal Public Administration organizations have become indispensable to help the managers of these organizations...
Article
Full-text available
The definition and prioritization of indicators is now a common reality and an integral part of the evolution of the strategic, technical and business processes of any organization, whether public or private. Purpose: This paper proposes a new model regarding the definition and prioritization of indicators. Herein, we also investigate the definitio...
Article
Full-text available
The microservice architectural style splits an application into small services, which are implemented independently, with their own deployment unit. This architecture can bring benefits, nevertheless, it also poses challenges, especially about security aspects. In this case, there are several microservices within a single system, it represents an i...
Article
Full-text available
A jurisprudence search system is a solution that makes available to its users a set of decisions made by public bodies on the recurring understanding as a way of understanding the law. In the similarity of legal decisions, jurisprudence seeks subsidies that provide stability, uniformity, and some predictability in the analysis of a case decided. Th...
Article
Full-text available
The software artifacts developed in the early stages of the development process describe the proposed solutions for the software. For this reason, these artifacts are commonly used to support communication among members of the development team. Miscommunication through software artifacts occurs because practitioners typically focus on their modelin...
Preprint
Full-text available
Context: The implementation of the Brazilian General Data Protection Law (LGPD) may impact activities carried out by the software development teams. It is necessary for developers to know the existing techniques and tools to carry out privacy requirements elicitation. Objectives: In this research, we investigated the perception of agile software de...
Article
Full-text available
Despite efforts to define productivity, there is no consensus in the software industry regarding what the term productivity means and, instead of having only one metric or factor that describes productivity, it is defined by a set of aspects. Our objective is to develop a tool that supports the productivity measurement of software development teams...
Chapter
Brazilian organizations must comply with the Brazilian General Data Protection Law (LGPD) and this need must be carried out in harmony with legacy systems and in the new systems developed and used by organizations. In this article we present an overview of the LGPD implementation process by public and private organizations in Brazil. We conducted a...
Article
Full-text available
The digital signature of documents and degrees is a topic widely discussed in the Federal Public Administration. Several laws and ordinances were created to standardize the issuance, validation and legal validity of digitally signed documents in national territory, such as the ordinances created by the Ministry of Education (MEC) to regulate the is...
Chapter
Full-text available
The development of a software application involves several challenges related to usability and these challenges need to be observed by the teams throughout the development process. The different forms of interaction, between users and the system, increasingly demand adaptation of human behavior. Thus, usability is an important issue, which depends...
Article
Full-text available
The management practicality and economy offered by the various technological solutions based on cloud computing have attracted many organizations, which have chosen to migrate services to the cloud, despite the numerous challenges arising from this migration. Cloud storage services are emerging as a relevant solution to meet the legal requirements...
Chapter
Full-text available
In a context in which privacy is increasingly demanded by citizens and by various institutions, reflected in protection laws, anonymity emerges as an essential tool. Both the General Data Protection Regulation (GDPR) in the EU and the Brazilian General Data Protection Law (LGPD) provide a softer regulation for anonymised data, compared to personal...
Conference Paper
Full-text available
This work presents a comprehensive research about the participationof men and women in the area of Information and CommunicationsTechnology (ICT) through data extracted from the last foureditions of Google Summer of Code (GSoC). The goal of this workis to find Association Rules between gender characteristics andcoding using the Apriori Algorithm. A...
Article
Full-text available
In order to guarantee the privacy of users’ data, the Brazilian government created the Brazilian General Data Protection Law (LGPD). This article made a diagnostic of Brazilian organizations in relation to their suitability for LGPD, based on the perception of Information Technology (IT) practitioners who work in these organizations. We used a surv...
Article
Full-text available
Background: Interest in Artificial Intelligence (AI) based systems has been gaining traction at a fast pace, both for software development teams and for society as a whole. This increased interest has lead to the employment of AI techniques such as Machine Learning and Deep Learning for diverse purposes, like medicine and surveillance systems, and...
Conference Paper
Full-text available
Investigar o conceito de experiência é uma atividade importante para os pesquisadores interessados na interseção entre a Educação e User Experience (UX), já que é um conceito importante para ambas as áreas. O objetivo desse trabalho e reportar como a UX tem sido investigada em trabalhos dá área da educação. Para isso usa de um método de bibliometri...
Conference Paper
Full-text available
Autism spectrum is a disorder that offers a lot of difficulties and challenges to people with it and related to. As for the learning process of these children, it is known that the use of consistent repetitions helps in the learning of people with autism and, in addition, that combinations of images with words are one of the main means of aid in le...
Conference Paper
Full-text available
This Innovative Practice Full Paper presents a model that includes ways to propose and construct software artifacts concerned with User Experience issues in Project-Based Learning (PBL) semesters long units. Project-Based Learning has been a trend in conducting teaching practices in modules related to software development. One of the cornerstones o...
Conference Paper
The development of systems using gamification in the educational context has shown significant improvements in student engagement levels in relation to the content covered during the classes. Therefore, it is important to understand the behavioral variations of users in educational environments, enabling the definition of game elements that stimula...
Conference Paper
This Research Full Paper studies the impact of using Calango language in the introductory learning of algorithms and computer programming by Brazilian engineering undergraduates. Calango is an educational multi-platform tool designed to facilitate algorithm learning and provide a simple syntax that enables developing advanced logic, so that student...
Article
Full-text available
Background: The Java programming language version eight introduced several features that encourage the functional style of programming, including the support for lambda expressions and the Stream API. Currently, there is common wisdom that refactoring legacy code to introduce lambda expressions, besides other potential benefits, simplifies the code...
Chapter
The Brazilian government has been discussing the topic of information security and the availability of information through digital media. Information made available in digital format must have the same protection as information in physical format. One of the solutions proposed in the educational area to make documents available in a secure digital...
Article
Full-text available
The correct classification of requirements has become an essential task within software engineering. This study shows a comparison among the text feature extraction techniques, and machine learning algorithms to the problem of requirements engineer classification to answer the two major questions "Which works best (Bag of Words (BoW) vs. Term Frequ...
Conference Paper
Full-text available
This paper presents a Systematic Literature Review (SLR) in order to find in the literature papers that use creativity and em-pathy techniques in privacy requirements elicitation. These techniques have been used in requirements elicitation in order to facilitate the understanding of the requirements and provide a collaborative interaction between t...
Preprint
Full-text available
The effect of gender diversity in open source communities has gained increasing attention from practitioners and researchers. For instance, organizations such as the Python Software Foundation and the OpenStack Foundation started actions to increase gender diversity and promote women to top positions in the communities. Although the general underre...
Chapter
Full-text available
Network growth through recent years reveals our continuous search for information. With the urge of consuming information, search engine popularity rises, becoming our browser’s primary function when typing in the navigation bar. The increasing information volume amplifies the demands of search refining with emphasizes on the concern about presenti...
Article
Full-text available
During software development activities, it is important for Information and Communication Technology (ICT) practitioners to know and understand practices and guidelines regarding information privacy, as software requirements must comply with data privacy laws and members of development teams should know current legislation related to the protection...
Article
Full-text available
Cyber red teams can be used by a wide range of organizations to test their defenses in a complete way. However, certain niches as in the case of military organizations have peculiarities that must be well understood before to implement a cyber red team. Although the term red team had been originated because of military activities, it is necessary t...
Article
Full-text available
The application of content only through lectures in an expository format may not be sufficient for the teaching of software engineering in this new era. Creating software products that take the user experience (UX) into account as an essential requirement in the software development process is a necessary activity for all information technology (IT...