About
153
Publications
73,148
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
639
Citations
Introduction
Teresa Guarda received her Ph.D. in Systems and Information Technologies in 2015 from Minho University. She is a Collaborating Researcher at ALGORITMI Research Centre; is a member and responsible for Conferences and International Relations of the research group BITrum, Spain; Vice President for Communication of the International Society for the Study of Information, Austria; researcher of GSIS. She was the Director of the CIST Research Center, UPSE, Ecuador (18 Oct 2019 - 3 Fev 2023).
Current institution
Publications
Publications (153)
This paper presents an insightful analysis of the trilogy of data-driven techniques, artificial intelligence (AI), and blockchain technology as a power structure that contributes to an efficient, agile, and secure decision-making process based on the analysis of large datasets is further enhanced by the integration of more receptive AI techniques,...
E-Government is considered like the use of information and
communication technologies with the aim to facilitate and improving the efficiency, accessibility, and transparency of the public services; allowing an easily and faster interaction without having to move physically between citizens and enterprises
with the government more easily, without h...
Cognitive computing emerged from a mixture of cognitive science and computer science. Although cognitive computing is seen as a challenge for companies, it is an opportunity that raises the bar for the services provided, allowing companies that are committed to investing in innovation, and in this particular case in the travel and tourism sector, b...
Currently, the use of biometric sensors in physical activity has received considerable interest from academics and industry. Biometric sensors such as heart rate monitors, accelerometers and GPS trackers will provide immediate data on physiological responses, movement patterns and performance metrics. This paper intends to examine the impact of bio...
Digital transformation is a change of mindset within the industry, which companies go through with the aim of becoming more modern and keeping up with technological advances. Blockchain and RPA are two disruptive technologies. Being Robotic Process Automation (RPA) itself a driver of digital transformation. RPA is one of the emerging tools which is...
In recent years, simulators have emerged as powerful knowledge transfer tools in medicine, aviation, engineering, and many other industries. Simulators provide an immersive and interactive learning environment, and it allows users to gain practical experience and gain critical skills without requiring real-world resources or exposure to potential r...
Despite being an emerging phenomenon, the literature on how ICT impact the adoption of sustainable agriculture has aroused growing interest on the part of farmers, scientific and business communities and policy makers. Therefore, the main objective of this study was to investigate the state-of-the-art of ICT use in agriculture with an impact on the...
The expectation created around 5G is great. Major changes are foreseen, in very different areas, which will have a great impact on people’s daily lives. It is expected that smart cities will be more efficient, more sustainable and safer, with significant impacts on the people who inhabit them and also on the people who visit them. 5G technology is...
Smart Cities promote a great improvement in urban environments in terms of sustainability, leveraged by the use of technologies that allow the optimization and monitoring of different systems, from waste management systems to public safety. There are several technologies that can play a key role in this process, highlighting augmented computing, au...
When the discussion on sixth-generation (6G) mobile communication networks begins in Portugal, the implementation of 5G on the ground is taking its first steps. Portugal is one of the European Union (EU) countries that is most behind in the implementation of this technology, although the European Commission considers its implementation essential fo...
The purpose of this work is to publicize the impact of the 5G mobile phone network on organizations. And clarify why 5G is not a danger, but rather an important technological advance within society. Explaining that non-ionizing signals do not have a harmful impact on human health, since radio signals, microwaves, including infrared, are included in...
Business intelligence (BI) and analytics are a set of techniques, methodologies, and tools used in the analysis of business data, which allow users (decision makers) to have a clearer view of the market, leveraging the decision-making process, allowing timely business decisions. Usually BI refers to Extract Transform and Load processes (ETL), Data...
The objective of this research is to analyze the necessary conditions of cooperative security that contribute to the purposes of the states’ maritime strategy. The maritime strategy is part of the national strategy of a state, and its purpose is to create, maintain, and use maritime power to promote and protect maritime interests, which derive from...
The dropout of higher education students is a worldwide problem, which has been studied for several decades. Initially, the investigations focused on psychological and individual aspects of the student, but later they began to include variables from the context of the academy. With the expansion of this phenomenon in higher education institutions,...
If on the one hand the world population is increasing rapidly, on the other hand, the area of arable land is increasingly smaller, the climatic conditions are increasingly unstable, water resources are scarce, and diseases and pests are less controllable. This research work refers to different techniques for automating agricultural processes based...
Scientific research constitutes the basis for developing new knowledge. Thus, a bibliometric study was conducted to describe the scientific production in the field of digital economy and to group the existing literature into thematic clusters. To achieve these objectives, a search was carried out in Scopus and the Web of Science (WoS) databases. Su...
This book presents a selection of chapters accepted for publication in the book Technology, Business, Innovation, and Entrepreneurship in Industry 4.0, which is part of EAI/Springer Innovations in Communication and Computing series that discusses recent innovations, trends, challenges, results, experiences, and concerns in the several perspectives...
The pandemic that hit the world in 2020 created a transition period from classes to an e-learning environment. In this type of teaching, a lot of data is generated about different topics that can help improve the class’s daily routine. This paper presents an online case study performed during the 1st semester of the 2020/2021 school year. Online da...
This work performs a series of analysis of allocation and subsequent recovery of information through File Carving techniques to solid state storage devices (SSD), in several scenarios of loss of information, both accidental and intentional, and based on these experimental results it is proposed a protocol that seeks to contribute to the work of the...
One of the sectors with the greatest contribution to energy consumption and global CO2 emissions is construction. The typology of buildings and the technologies used to increase energy efficiency in use are becoming increasingly important. Global energy consumption is estimated to increase significantly. According the International Energy Agency (I...
Information is one of the most important assets for organizations. In the current scenario of a stagnant economy and fierce competition, it is imperative for organizations to be proactive, and for this to be possible, it is necessary to have timely access to the necessary information, so that it supports the decision-making process, thus allowing a...
The use of smart and connected devices, such as Android and Internet of Things (IoT) have increased exponentially. In the last 10 years, mobiles and IoT devices have surpassed PC’s utilization. Android hosts an array of connected sensors like IoT. It has transformed a simple gadget into a hub of mobile phone with IoT. With a high number of clients...
The emergence of the COVID-19 pandemic led several organizations around the world and in the most varied areas of activity, to move from the intention to implement a digital transformation in the medium/long-term, to an instant obligation to apply the digital transformation. The organizations’ ability to adapt immediately meant their survival and e...
This book presents and discusses the most recent innovations, trends, challenges, results, experiences, and concerns in the several perspectives of technologies, business, innovation, and entrepreneurship in Industry 4.0. Due to its broad impact in many fields, it has rapidly gained global attention from academia, government, industry, cities, and...
New technologies emerge every day, and existing ones are improving. Due to this improvement, chatbots with artificial intelligence appeared. A chatbot is a robot (bot), built through rules defined by a conversational flow and/or Artificial Intelligence, which meets a certain demand of the person who is chatting with it and delivers pre-defined resp...
Despite the fact that data science continues in a constant evolution, there are still many problems that are still impossible to solve due to processing issues, either due to the exorbitant amount of data collected, or related to the different types of data to be processed. Quantum computing in the last decade has experienced a significant boom whi...
Pages: 137-148 Resumen: El desarrollo económico viene siendo impulsado por las grandes innovaciones tecnológicas, las empresas tratan de aprovechar la revolución de la tecnología para crear o innovar modelos de negocios. Aprendizaje automático es un subcampo de la ciencia de la computación y una rama de la inteligencia artificial que tiene como fin...
In the begin cloud computing was seen as a thing of “startup” and visionary users, but nowadays it is a reality in organizations of any sector, type and size. Investments in data centers are replaced by the consumption of IT resources from a cloud provider. There are several types of virtualization, and that essentially means the abstraction of com...
As we have discussed in previous works, glossaLAB project is devoted to the integration of an extensive encyclopedic corpus into a system of interdisciplinary glossaries -whose concept has been described thoroughly-. By that means, glossaLAB intends to offer a platform for the co-creation of interdisciplinary and transdisciplinary knowledge that re...
Artificial neural networks in an effort to emulate the operation of the human brain from the point of view of learning and adaptation, have evolved in such a way that different statistical and mathematical models have inspired biological models, example you have to nerve cells or better known as neurons; the same ones that are composed of dendrites...
The rapid and disorganized growth of cities, generates urban expansion and produces a new urban aesthetic, which becomes the expression of economic, social and political transformations. In this current and future development scenario, the idea of smart cities is developed, cities capable of solving, or at least preventing, urban problems with the...
The correct management of information systems security is often overlooked in technological measures and management efforts, and although there are now many tools to address security threats, the human aspect has been neglected. This paper discusses the human factors that could potentially lead to intrusions with social engineering. Social engineer...
This book provides readers with an insight into information and knowledge in the Internet of Things, in particular an investigation of data management and processing, information extraction, technology, knowledge management, knowledge sharing, knowledge co-creation, knowledge integration, and the development of new intelligent services available an...
Mobile technologies have undergone a great evolution in a short space of time. This rapid evolution was not limited to smartphones but also extended to a variety of smart devices that allow to easily receive and transmit data, as well as to connect to the IoT. The mobile devices together with the growing worldwide adoption of social media sites by...
A small number of individuals infected within a community can lead to the rapid spread of the disease throughout that community, leading to an epidemic outbreak. This is even more true for highly contagious diseases such as COVID-19, known to be caused by the new coronavirus SARS-CoV-2. Mathematical models of epidemics allow estimating several impa...
This paper proposes the automation of the information retrieval process in solid-state storage devices - SSD, through an application that has been named as Carvers Suite, which is supported by recovery techniques and methodologies (File Carving); by the affectation factors, whether physical, human or environmental, and developed in the most common...
Today, advances in technology bring changes to people’s lifestyles, and challenging organizations to accompany these advances. Organizational managers and those responsible for the Information Technology (IT) department must evaluate current trends in innovation, and determine how they can boost business, creating new business models, and promoting...
The article describes the approach of applying the cybersubsidiarity model, based on Stafford Beer's Viable System Model, to the management of a project oriented to the setting up of a sustainable platform for interdisciplinary knowledge co-creation. The application to this project is shown as a case study for the institution of sustainable organiz...
IoT represents the expansion of technology in all aspects of everyday life. There are various initiatives according to the needs of the people. In this sense, visual impairment constitutes a greater difficulty for mobilization in unfamiliar environments. The obstacles present in the environments increase the risks and damage to the physical integri...
In today’s digital age, transactions are made increasingly in the virtual universe. Some do all financial transactions online, but some do not even want to think about this possibility since the consideration is unreliable. To make online financial transactions more reliable, many technologies have already been tested. Since passwords, tokens, phys...
This book is composed by the papers written in English and accepted for presentation and discussion at The 2021 International Conference on Information Technology & Systems (ICITS 21), held at the Universidad Estatal Península de Santa Elena, in Libertad, Ecuador, between the 10th and the 12th of February 2021.
ICITS is a global forum for research...
This book is composed by the papers written in English and accepted for presentation and discussion at The 2021 International Conference on Information Technology & Systems (ICITS 21), held at the Universidad Estatal Península de Santa Elena, in Libertad, Ecuador, between the 10th and the 12th of February 2021.
ICITS is a global forum for researche...
This book constitutes the refereed proceedings of the First International Conference on Advanced Research in Technologies, Information, Innovation and Sustainability, ARTIIS 2021, held in La Libertad, Ecuador, in November 2021.
The 53 full papers and 2 short contributions were carefully reviewed and selected from 155 submissions. The volume covers...
This study aimed to analyze the impact of brand loyalty and impulse buying online on the consumer’s attitude towards the brand. For this, a crosssectional, quantitative and analytical study was carried out, based on a nonprobabilistic sample of 890 young people living in Portugal. The data were collected through a digital questionnaire from October...
A small number of people infected with a contagious disease in a large community can lead to the rapid spread of the disease by many of the people in that community, leading to an epidemic. Mathematical models of epidemics allow estimating several impacts on the population, such as the total and maximum number of people infected, as well as the dur...
3D technology is currently used in many areas; these technologies provide simulators, modeling, and personalization tools for printing in a totally innovative way. For years, financial restrictions imposed on the public sector have created difficulties in carrying out Navy missions, which, due to their high value and specificity, already have, by t...
Modern marketing practices have evolved to become a dynamic meeting point for technology practitioners and business professionals. Digital technologies have added a new paradigm to the way businesses are projected, communicated, and developed through their marketing activities, from message delivery to content production.
Digital Marketing Strateg...
The glossaLAB.edu project aimed at the development, in educational contexts, of tools for conceptual clarification is described. These tools are oriented, in turn, to the creation of skills and capacities for the integration of interdisciplinary knowledge in two transdisciplinary fields: the general study of information and the general study of sys...
This text is the result of a research process that has been carried out during the last five years on the realities and problems of plagiarism in contexts of higher education in different countries. We have observed eight groups of university students of different degrees in Engineering in a mandatory course of “Oral and written expression” in two...
The advent of new technologies, the massification of internet access, the availability of personal computers in the market, and the entrance of smartphones into citizens' daily lives all have constituted a revolution that has led to a change in consumer behavior. There is no need for an empirical study, since it is enough to enter some social netwo...
This book gathers the proceedings of the Multidisciplinary International Conference of Research Applied to Defense and Security (MICRADS), held at the Eloy Alfaro Military Academy (ESMIL), in Quito, Ecuador, during 13 – 15 May 2020. It covers a variety of topics in systems, communication and defense; strategy and political-administrative vision in...
Pages: 95-109 Resumen: Se describe el proyecto glossaLAB.edu destinado al desarrollo, en contextos educativos, de herramientas de clarificación conceptual. Dichas herramientas se orientan, a su vez, a la creación de destrezas y capacidades de integración de conocimiento interdisciplinar en dos ámbitos transdisciplinares: el estudio general de la in...
The paper describes the glossaLAB international project as a contribution to confront the urgent need of knowledge integration frameworks, as required to face global challenges that overwhelm disciplinary knowledge capacity. Under this scope, glossaLAB is devised to make contributions in three main aspects of such endeavor: (i) development of a sou...
Personal Data Protection has been among the most discussed topics lately and a reason for great concern among organizations. The EU General Data Protection Regulation (GDPR) is the most important change in data privacy regulation in 20 years. The regulation will fundamentally reshape the way in which data is handled across every sector. The organiz...
With the evolution and popularization of mobile communication systems, especially for access to data services, it becomes increasingly important to have a closer look at security systems. From analog systems to the fourth generation, many changes and evolutions occurred. This makes possible to question whether mobile networks have sufficiently secu...
The General Data Protection Regulation entered into force on 25 May 2018, but was approved on 27 April 2016. The General Data Protection Regulation (GDPR) aims to ensure the coherence of natural persons’ protection within the European Union (EU), comprising very important innovative rules that will be applied across the EU and will directly affect...
The General Data Protection Regulation (full name: Regulation on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive) entered into force on May 25 2018, but was approved on April 27 2016. The General Data Protection Regulation (GDPR) aims to ensure the coher...
Information and communication technologies have been evolving rapidly, providing more and more alternative ways of accessing information, accessible through multiple paths and devices, transforming IoT into a giant digital system. This heterogeneous diversity ecosystem allows travel to the CrowdSensing era. Information in its role of reducing uncer...
In recent decades, in order to reflect the complex needs of the information society, the field of "Intelligence & Fuzzy Theory" has continuously expanded its themes and boundaries. As a result, many academic studies have attempted to address complex information science and technology issues from a broader perspective.
Nowadays there are many threats that a company needs to protect itself. Everyone knows someone who has fallen for a coup by using an email, message or phone. People who pass by someone they trust, to extract data and money from the victim. These three ways are used to try convince someone to deliver accounts, credit card and document data in compan...
In these times of digital transformation, cities have overcome the challenges of the past and are building the future. The use of technological resources as a means of efficiently delivering various services and improving citizens’ quality of life has transformed regions and cities into smart regions and cities. There have been a remarkable amount...
The evolution of information and communication technology and the exponential growth of the Internet are been accompanied by the spread of malware, being currently one of the most serious security threats on the Internet. Today, given the technological power of a device connected to the Internet, where a large amount of confidential information is...
This research is focused on the development of a mobile App in a friendly environment such as MIT app inventor, based on the analysis of an agile methodology for the development of mobile applications, all of this as part of the Internet of Things (IOT) that It can be controlled from a LAN or WAN by interacting with the Arduino Uno and Shield Ardui...
Due to the technological advances that have arisen in recent years, the use of smartphones has become an indispensable resource for the human being, this is due to the fact that it allows carrying out daily activities such as telephone calls, sending messages, taking photos, using social networks, email, bank account management, purchases and onlin...
The security information has become an essential element of great consideration for the companies, since now the data of the companiess were processed, sent and stored in applications and web services so, it is mandatory the use of methods and processes that allow to ensure the information before the possible threats of an attack to these systems,...
As a simpler alternative to SOAP and WSDL, REST (Representational State Transfer) has been implemented in Web providers even in large providers such as Google, Yahoo! and Facebook, making it easier to transmit data between the client and the server and the other way as it is an easy to do and learn architecture because it uses explicit HTTP methods...
This document aims to present the state of the art regarding the subject of data recovery in SSD storage devices whose information loss has been caused physical damage are these human or environmental factors and proposed the most common scenarios of the causes of this loss being these blows or humidity, also the techniques of file carving are anal...
Technology today offers so many advantages and benefits that it is inevitable not to use any of the tools it provides. The internet is currently the most used technological resource in the world. Web browsing on this side is the most frequent task performed by people. Either from a computer or even in an intelligent device. The internet is extremel...
Internet hosts most of the services that people and companies access. Minimizing privacy problems is one of the most important topics in the current technological environment and the perception that the information is accessible to unauthorized third parties negatively affects the user, so there is still much distrust in Ecuadorian society regardin...
In this article we detail how in households the use of technological equipment helps to optimize processes in daily activities, when carrying out a transaction, a lot of information is handled, which is fragile when it is sent to the Internet, since by this means the Data subtraction is done by the various vulnerabilities that hackers encounter on...
The paper describes the PRIMER international initiative aimed to develop interdisciplinary research capacities and skills to boost the ability to face global challenges whose complexity is beyond the reach of individual disciplines. To this end, the initiative has carried out education , research and innovation activities based on theoretical and m...
Is the structure of our digital world suited for a fair intercultural life? Intercultural life requires, first of all, a dense net of connections among people belonging to the same culture and with the components of the context in which this culture exists; secondly, a weaker but nevertheless effective network where interactions among different cul...
There are a wide range of ambient noise sources within the underwater acoustics. Acoustic noise can vary over time in intensity and spectral composition, depending on environmental conditions. In passive sonar detection the target of interest is surrounded by several noises, environmental and other radiated noise from other sources. The acoustic de...
The methods used by a teacher to improve the learning process, allow applying techniques that analyze the interrelations in small groups and in this way, overcome the weaknesses generated by the lack of group dynamism. In this article, the objective was to know the interrelations generated by popularity, authority, positive leadership and the compl...
Today the strategic significance of information is fundamental to any organization. With the intensification of competition between companies in open markets and often saturated, companies must learn to know themselves and to the market through the collection and analysis of quality information. The strategic information is seen as a key resource f...
Throughout the stunning development of wireless communication technologies, sensors and wireless sensor networks (WSN) are being used in almost every area, such as in healthcare feld. The ubiquitous sensing enabled by WSN technologies, in particularly the wireless medical sensor network (WMSN), might be one important key success factor in the moder...
The methods used by a teacher to improve the learning process,
allow applying techniques that analyze the interrelations in small groups and in
this way, overcome the weaknesses generated by the lack of group dynamism.
In this article, the objective was to know the interrelations generated by popularity, authority, positive leadership and the compl...