Teresa Guarda

Teresa Guarda
  • PhD Information Systems
  • Universidad Estatal Península de Santa Elena

About

153
Publications
73,148
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
639
Citations
Introduction
Teresa Guarda received her Ph.D. in Systems and Information Technologies in 2015 from Minho University. She is a Collaborating Researcher at ALGORITMI Research Centre; is a member and responsible for Conferences and International Relations of the research group BITrum, Spain; Vice President for Communication of the International Society for the Study of Information, Austria; researcher of GSIS. She was the Director of the CIST Research Center, UPSE, Ecuador (18 Oct 2019 - 3 Fev 2023).
Current institution
Universidad Estatal Península de Santa Elena

Publications

Publications (153)
Chapter
This paper presents an insightful analysis of the trilogy of data-driven techniques, artificial intelligence (AI), and blockchain technology as a power structure that contributes to an efficient, agile, and secure decision-making process based on the analysis of large datasets is further enhanced by the integration of more receptive AI techniques,...
Article
Full-text available
E-Government is considered like the use of information and communication technologies with the aim to facilitate and improving the efficiency, accessibility, and transparency of the public services; allowing an easily and faster interaction without having to move physically between citizens and enterprises with the government more easily, without h...
Conference Paper
Cognitive computing emerged from a mixture of cognitive science and computer science. Although cognitive computing is seen as a challenge for companies, it is an opportunity that raises the bar for the services provided, allowing companies that are committed to investing in innovation, and in this particular case in the travel and tourism sector, b...
Conference Paper
Currently, the use of biometric sensors in physical activity has received considerable interest from academics and industry. Biometric sensors such as heart rate monitors, accelerometers and GPS trackers will provide immediate data on physiological responses, movement patterns and performance metrics. This paper intends to examine the impact of bio...
Conference Paper
Digital transformation is a change of mindset within the industry, which companies go through with the aim of becoming more modern and keeping up with technological advances. Blockchain and RPA are two disruptive technologies. Being Robotic Process Automation (RPA) itself a driver of digital transformation. RPA is one of the emerging tools which is...
Conference Paper
In recent years, simulators have emerged as powerful knowledge transfer tools in medicine, aviation, engineering, and many other industries. Simulators provide an immersive and interactive learning environment, and it allows users to gain practical experience and gain critical skills without requiring real-world resources or exposure to potential r...
Chapter
Despite being an emerging phenomenon, the literature on how ICT impact the adoption of sustainable agriculture has aroused growing interest on the part of farmers, scientific and business communities and policy makers. Therefore, the main objective of this study was to investigate the state-of-the-art of ICT use in agriculture with an impact on the...
Chapter
The expectation created around 5G is great. Major changes are foreseen, in very different areas, which will have a great impact on people’s daily lives. It is expected that smart cities will be more efficient, more sustainable and safer, with significant impacts on the people who inhabit them and also on the people who visit them. 5G technology is...
Chapter
Smart Cities promote a great improvement in urban environments in terms of sustainability, leveraged by the use of technologies that allow the optimization and monitoring of different systems, from waste management systems to public safety. There are several technologies that can play a key role in this process, highlighting augmented computing, au...
Chapter
When the discussion on sixth-generation (6G) mobile communication networks begins in Portugal, the implementation of 5G on the ground is taking its first steps. Portugal is one of the European Union (EU) countries that is most behind in the implementation of this technology, although the European Commission considers its implementation essential fo...
Chapter
The purpose of this work is to publicize the impact of the 5G mobile phone network on organizations. And clarify why 5G is not a danger, but rather an important technological advance within society. Explaining that non-ionizing signals do not have a harmful impact on human health, since radio signals, microwaves, including infrared, are included in...
Chapter
Business intelligence (BI) and analytics are a set of techniques, methodologies, and tools used in the analysis of business data, which allow users (decision makers) to have a clearer view of the market, leveraging the decision-making process, allowing timely business decisions. Usually BI refers to Extract Transform and Load processes (ETL), Data...
Chapter
Full-text available
The objective of this research is to analyze the necessary conditions of cooperative security that contribute to the purposes of the states’ maritime strategy. The maritime strategy is part of the national strategy of a state, and its purpose is to create, maintain, and use maritime power to promote and protect maritime interests, which derive from...
Chapter
Full-text available
The dropout of higher education students is a worldwide problem, which has been studied for several decades. Initially, the investigations focused on psychological and individual aspects of the student, but later they began to include variables from the context of the academy. With the expansion of this phenomenon in higher education institutions,...
Chapter
If on the one hand the world population is increasing rapidly, on the other hand, the area of arable land is increasingly smaller, the climatic conditions are increasingly unstable, water resources are scarce, and diseases and pests are less controllable. This research work refers to different techniques for automating agricultural processes based...
Chapter
Scientific research constitutes the basis for developing new knowledge. Thus, a bibliometric study was conducted to describe the scientific production in the field of digital economy and to group the existing literature into thematic clusters. To achieve these objectives, a search was carried out in Scopus and the Web of Science (WoS) databases. Su...
Book
Full-text available
This book presents a selection of chapters accepted for publication in the book Technology, Business, Innovation, and Entrepreneurship in Industry 4.0, which is part of EAI/Springer Innovations in Communication and Computing series that discusses recent innovations, trends, challenges, results, experiences, and concerns in the several perspectives...
Chapter
The pandemic that hit the world in 2020 created a transition period from classes to an e-learning environment. In this type of teaching, a lot of data is generated about different topics that can help improve the class’s daily routine. This paper presents an online case study performed during the 1st semester of the 2020/2021 school year. Online da...
Chapter
This work performs a series of analysis of allocation and subsequent recovery of information through File Carving techniques to solid state storage devices (SSD), in several scenarios of loss of information, both accidental and intentional, and based on these experimental results it is proposed a protocol that seeks to contribute to the work of the...
Chapter
One of the sectors with the greatest contribution to energy consumption and global CO2 emissions is construction. The typology of buildings and the technologies used to increase energy efficiency in use are becoming increasingly important. Global energy consumption is estimated to increase significantly. According the International Energy Agency (I...
Chapter
Information is one of the most important assets for organizations. In the current scenario of a stagnant economy and fierce competition, it is imperative for organizations to be proactive, and for this to be possible, it is necessary to have timely access to the necessary information, so that it supports the decision-making process, thus allowing a...
Article
Full-text available
The use of smart and connected devices, such as Android and Internet of Things (IoT) have increased exponentially. In the last 10 years, mobiles and IoT devices have surpassed PC’s utilization. Android hosts an array of connected sensors like IoT. It has transformed a simple gadget into a hub of mobile phone with IoT. With a high number of clients...
Chapter
The emergence of the COVID-19 pandemic led several organizations around the world and in the most varied areas of activity, to move from the intention to implement a digital transformation in the medium/long-term, to an instant obligation to apply the digital transformation. The organizations’ ability to adapt immediately meant their survival and e...
Book
This book presents and discusses the most recent innovations, trends, challenges, results, experiences, and concerns in the several perspectives of technologies, business, innovation, and entrepreneurship in Industry 4.0. Due to its broad impact in many fields, it has rapidly gained global attention from academia, government, industry, cities, and...
Chapter
New technologies emerge every day, and existing ones are improving. Due to this improvement, chatbots with artificial intelligence appeared. A chatbot is a robot (bot), built through rules defined by a conversational flow and/or Artificial Intelligence, which meets a certain demand of the person who is chatting with it and delivers pre-defined resp...
Chapter
Despite the fact that data science continues in a constant evolution, there are still many problems that are still impossible to solve due to processing issues, either due to the exorbitant amount of data collected, or related to the different types of data to be processed. Quantum computing in the last decade has experienced a significant boom whi...
Article
Full-text available
Pages: 137-148 Resumen: El desarrollo económico viene siendo impulsado por las grandes innovaciones tecnológicas, las empresas tratan de aprovechar la revolución de la tecnología para crear o innovar modelos de negocios. Aprendizaje automático es un subcampo de la ciencia de la computación y una rama de la inteligencia artificial que tiene como fin...
Chapter
Full-text available
In the begin cloud computing was seen as a thing of “startup” and visionary users, but nowadays it is a reality in organizations of any sector, type and size. Investments in data centers are replaced by the consumption of IT resources from a cloud provider. There are several types of virtualization, and that essentially means the abstraction of com...
Chapter
Full-text available
As we have discussed in previous works, glossaLAB project is devoted to the integration of an extensive encyclopedic corpus into a system of interdisciplinary glossaries -whose concept has been described thoroughly-. By that means, glossaLAB intends to offer a platform for the co-creation of interdisciplinary and transdisciplinary knowledge that re...
Chapter
Artificial neural networks in an effort to emulate the operation of the human brain from the point of view of learning and adaptation, have evolved in such a way that different statistical and mathematical models have inspired biological models, example you have to nerve cells or better known as neurons; the same ones that are composed of dendrites...
Chapter
The rapid and disorganized growth of cities, generates urban expansion and produces a new urban aesthetic, which becomes the expression of economic, social and political transformations. In this current and future development scenario, the idea of smart cities is developed, cities capable of solving, or at least preventing, urban problems with the...
Chapter
The correct management of information systems security is often overlooked in technological measures and management efforts, and although there are now many tools to address security threats, the human aspect has been neglected. This paper discusses the human factors that could potentially lead to intrusions with social engineering. Social engineer...
Book
Full-text available
This book provides readers with an insight into information and knowledge in the Internet of Things, in particular an investigation of data management and processing, information extraction, technology, knowledge management, knowledge sharing, knowledge co-creation, knowledge integration, and the development of new intelligent services available an...
Chapter
Mobile technologies have undergone a great evolution in a short space of time. This rapid evolution was not limited to smartphones but also extended to a variety of smart devices that allow to easily receive and transmit data, as well as to connect to the IoT. The mobile devices together with the growing worldwide adoption of social media sites by...
Article
Full-text available
A small number of individuals infected within a community can lead to the rapid spread of the disease throughout that community, leading to an epidemic outbreak. This is even more true for highly contagious diseases such as COVID-19, known to be caused by the new coronavirus SARS-CoV-2. Mathematical models of epidemics allow estimating several impa...
Chapter
This paper proposes the automation of the information retrieval process in solid-state storage devices - SSD, through an application that has been named as Carvers Suite, which is supported by recovery techniques and methodologies (File Carving); by the affectation factors, whether physical, human or environmental, and developed in the most common...
Article
Full-text available
Today, advances in technology bring changes to people’s lifestyles, and challenging organizations to accompany these advances. Organizational managers and those responsible for the Information Technology (IT) department must evaluate current trends in innovation, and determine how they can boost business, creating new business models, and promoting...
Preprint
Full-text available
The article describes the approach of applying the cybersubsidiarity model, based on Stafford Beer's Viable System Model, to the management of a project oriented to the setting up of a sustainable platform for interdisciplinary knowledge co-creation. The application to this project is shown as a case study for the institution of sustainable organiz...
Chapter
IoT represents the expansion of technology in all aspects of everyday life. There are various initiatives according to the needs of the people. In this sense, visual impairment constitutes a greater difficulty for mobilization in unfamiliar environments. The obstacles present in the environments increase the risks and damage to the physical integri...
Chapter
In today’s digital age, transactions are made increasingly in the virtual universe. Some do all financial transactions online, but some do not even want to think about this possibility since the consideration is unreliable. To make online financial transactions more reliable, many technologies have already been tested. Since passwords, tokens, phys...
Book
This book is composed by the papers written in English and accepted for presentation and discussion at The 2021 International Conference on Information Technology & Systems (ICITS 21), held at the Universidad Estatal Península de Santa Elena, in Libertad, Ecuador, between the 10th and the 12th of February 2021. ICITS is a global forum for research...
Book
This book is composed by the papers written in English and accepted for presentation and discussion at The 2021 International Conference on Information Technology & Systems (ICITS 21), held at the Universidad Estatal Península de Santa Elena, in Libertad, Ecuador, between the 10th and the 12th of February 2021. ICITS is a global forum for researche...
Book
This book constitutes the refereed proceedings of the First International Conference on Advanced Research in Technologies, Information, Innovation and Sustainability, ARTIIS 2021, held in La Libertad, Ecuador, in November 2021. The 53 full papers and 2 short contributions were carefully reviewed and selected from 155 submissions. The volume covers...
Article
Full-text available
This study aimed to analyze the impact of brand loyalty and impulse buying online on the consumer’s attitude towards the brand. For this, a crosssectional, quantitative and analytical study was carried out, based on a nonprobabilistic sample of 890 young people living in Portugal. The data were collected through a digital questionnaire from October...
Chapter
A small number of people infected with a contagious disease in a large community can lead to the rapid spread of the disease by many of the people in that community, leading to an epidemic. Mathematical models of epidemics allow estimating several impacts on the population, such as the total and maximum number of people infected, as well as the dur...
Chapter
3D technology is currently used in many areas; these technologies provide simulators, modeling, and personalization tools for printing in a totally innovative way. For years, financial restrictions imposed on the public sector have created difficulties in carrying out Navy missions, which, due to their high value and specificity, already have, by t...
Book
Full-text available
Modern marketing practices have evolved to become a dynamic meeting point for technology practitioners and business professionals. Digital technologies have added a new paradigm to the way businesses are projected, communicated, and developed through their marketing activities, from message delivery to content production. Digital Marketing Strateg...
Article
Full-text available
The glossaLAB.edu project aimed at the development, in educational contexts, of tools for conceptual clarification is described. These tools are oriented, in turn, to the creation of skills and capacities for the integration of interdisciplinary knowledge in two transdisciplinary fields: the general study of information and the general study of sys...
Chapter
Full-text available
This text is the result of a research process that has been carried out during the last five years on the realities and problems of plagiarism in contexts of higher education in different countries. We have observed eight groups of university students of different degrees in Engineering in a mandatory course of “Oral and written expression” in two...
Chapter
The advent of new technologies, the massification of internet access, the availability of personal computers in the market, and the entrance of smartphones into citizens' daily lives all have constituted a revolution that has led to a change in consumer behavior. There is no need for an empirical study, since it is enough to enter some social netwo...
Book
This book gathers the proceedings of the Multidisciplinary International Conference of Research Applied to Defense and Security (MICRADS), held at the Eloy Alfaro Military Academy (ESMIL), in Quito, Ecuador, during 13 – 15 May 2020. It covers a variety of topics in systems, communication and defense; strategy and political-administrative vision in...
Article
Full-text available
Pages: 95-109 Resumen: Se describe el proyecto glossaLAB.edu destinado al desarrollo, en contextos educativos, de herramientas de clarificación conceptual. Dichas herramientas se orientan, a su vez, a la creación de destrezas y capacidades de integración de conocimiento interdisciplinar en dos ámbitos transdisciplinares: el estudio general de la in...
Chapter
Full-text available
The paper describes the glossaLAB international project as a contribution to confront the urgent need of knowledge integration frameworks, as required to face global challenges that overwhelm disciplinary knowledge capacity. Under this scope, glossaLAB is devised to make contributions in three main aspects of such endeavor: (i) development of a sou...
Article
Full-text available
Personal Data Protection has been among the most discussed topics lately and a reason for great concern among organizations. The EU General Data Protection Regulation (GDPR) is the most important change in data privacy regulation in 20 years. The regulation will fundamentally reshape the way in which data is handled across every sector. The organiz...
Conference Paper
With the evolution and popularization of mobile communication systems, especially for access to data services, it becomes increasingly important to have a closer look at security systems. From analog systems to the fourth generation, many changes and evolutions occurred. This makes possible to question whether mobile networks have sufficiently secu...
Chapter
The General Data Protection Regulation entered into force on 25 May 2018, but was approved on 27 April 2016. The General Data Protection Regulation (GDPR) aims to ensure the coherence of natural persons’ protection within the European Union (EU), comprising very important innovative rules that will be applied across the EU and will directly affect...
Chapter
The General Data Protection Regulation (full name: Regulation on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive) entered into force on May 25 2018, but was approved on April 27 2016. The General Data Protection Regulation (GDPR) aims to ensure the coher...
Chapter
Information and communication technologies have been evolving rapidly, providing more and more alternative ways of accessing information, accessible through multiple paths and devices, transforming IoT into a giant digital system. This heterogeneous diversity ecosystem allows travel to the CrowdSensing era. Information in its role of reducing uncer...
Article
In recent decades, in order to reflect the complex needs of the information society, the field of "Intelligence & Fuzzy Theory" has continuously expanded its themes and boundaries. As a result, many academic studies have attempted to address complex information science and technology issues from a broader perspective.
Chapter
Nowadays there are many threats that a company needs to protect itself. Everyone knows someone who has fallen for a coup by using an email, message or phone. People who pass by someone they trust, to extract data and money from the victim. These three ways are used to try convince someone to deliver accounts, credit card and document data in compan...
Chapter
In these times of digital transformation, cities have overcome the challenges of the past and are building the future. The use of technological resources as a means of efficiently delivering various services and improving citizens’ quality of life has transformed regions and cities into smart regions and cities. There have been a remarkable amount...
Chapter
The evolution of information and communication technology and the exponential growth of the Internet are been accompanied by the spread of malware, being currently one of the most serious security threats on the Internet. Today, given the technological power of a device connected to the Internet, where a large amount of confidential information is...
Article
This research is focused on the development of a mobile App in a friendly environment such as MIT app inventor, based on the analysis of an agile methodology for the development of mobile applications, all of this as part of the Internet of Things (IOT) that It can be controlled from a LAN or WAN by interacting with the Arduino Uno and Shield Ardui...
Article
Full-text available
Due to the technological advances that have arisen in recent years, the use of smartphones has become an indispensable resource for the human being, this is due to the fact that it allows carrying out daily activities such as telephone calls, sending messages, taking photos, using social networks, email, bank account management, purchases and onlin...
Article
Full-text available
The security information has become an essential element of great consideration for the companies, since now the data of the companiess were processed, sent and stored in applications and web services so, it is mandatory the use of methods and processes that allow to ensure the information before the possible threats of an attack to these systems,...
Article
As a simpler alternative to SOAP and WSDL, REST (Representational State Transfer) has been implemented in Web providers even in large providers such as Google, Yahoo! and Facebook, making it easier to transmit data between the client and the server and the other way as it is an easy to do and learn architecture because it uses explicit HTTP methods...
Article
Full-text available
This document aims to present the state of the art regarding the subject of data recovery in SSD storage devices whose information loss has been caused physical damage are these human or environmental factors and proposed the most common scenarios of the causes of this loss being these blows or humidity, also the techniques of file carving are anal...
Article
Full-text available
Technology today offers so many advantages and benefits that it is inevitable not to use any of the tools it provides. The internet is currently the most used technological resource in the world. Web browsing on this side is the most frequent task performed by people. Either from a computer or even in an intelligent device. The internet is extremel...
Article
Internet hosts most of the services that people and companies access. Minimizing privacy problems is one of the most important topics in the current technological environment and the perception that the information is accessible to unauthorized third parties negatively affects the user, so there is still much distrust in Ecuadorian society regardin...
Article
In this article we detail how in households the use of technological equipment helps to optimize processes in daily activities, when carrying out a transaction, a lot of information is handled, which is fragile when it is sent to the Internet, since by this means the Data subtraction is done by the various vulnerabilities that hackers encounter on...
Article
Full-text available
The paper describes the PRIMER international initiative aimed to develop interdisciplinary research capacities and skills to boost the ability to face global challenges whose complexity is beyond the reach of individual disciplines. To this end, the initiative has carried out education , research and innovation activities based on theoretical and m...
Chapter
Full-text available
Is the structure of our digital world suited for a fair intercultural life? Intercultural life requires, first of all, a dense net of connections among people belonging to the same culture and with the components of the context in which this culture exists; secondly, a weaker but nevertheless effective network where interactions among different cul...
Article
Full-text available
There are a wide range of ambient noise sources within the underwater acoustics. Acoustic noise can vary over time in intensity and spectral composition, depending on environmental conditions. In passive sonar detection the target of interest is surrounded by several noises, environmental and other radiated noise from other sources. The acoustic de...
Article
The methods used by a teacher to improve the learning process, allow applying techniques that analyze the interrelations in small groups and in this way, overcome the weaknesses generated by the lack of group dynamism. In this article, the objective was to know the interrelations generated by popularity, authority, positive leadership and the compl...
Chapter
Full-text available
Today the strategic significance of information is fundamental to any organization. With the intensification of competition between companies in open markets and often saturated, companies must learn to know themselves and to the market through the collection and analysis of quality information. The strategic information is seen as a key resource f...
Chapter
Throughout the stunning development of wireless communication technologies, sensors and wireless sensor networks (WSN) are being used in almost every area, such as in healthcare feld. The ubiquitous sensing enabled by WSN technologies, in particularly the wireless medical sensor network (WMSN), might be one important key success factor in the moder...
Chapter
The methods used by a teacher to improve the learning process, allow applying techniques that analyze the interrelations in small groups and in this way, overcome the weaknesses generated by the lack of group dynamism. In this article, the objective was to know the interrelations generated by popularity, authority, positive leadership and the compl...

Network

Cited By