The relationship between higher education activities follows a sequential cycle focused on knowle... more The relationship between higher education activities follows a sequential cycle focused on knowledge transference. The aim of this paper is to examine the details of the following associated questions of debate about KT (knowledge translation) in education mission activities (first mission): relationship between teaching activities and scientific research, correlation between learning and teaching quality, entrepreneurship and the Bologna Process: the reform of education systems and finally, learning & teaching outcomes. This analysis allows a systematic approach to the specific goals of the Bologna Process that include promoting the student centred model, increasing the autonomy and accountability of universities, strengthening the responsibility of institutions for the quality of teaching, highlighting the excellence of learning, enhancing the quality of research and the transference of knowledge, as a basis for a competitive economy. In order to achieve this goal, from a CI (comp...
The aim of this paper is to define the architecture of the information analysis towards a proposa... more The aim of this paper is to define the architecture of the information analysis towards a proposal of methodology on systematic information analysis. First, the author shows the dimensions that state the architecture of information management. Second, the work explores the concept of indicator, as the measurement of the relation between data, and presents the results of a theoretical study of the scales that determine the analytical procedure of information from a systematic perspective. Third, the hierarchical architecture of indicators is reviewed from the literature taking the classification of scientometrics indicators as reference standard to its projection on extended metrics of information. The paper suggests from the review that the analytical progress of sequential application of indicators, based in a hierarchical architecture: (1) is the main guarantee to ensure a methodological systematisation of analytical procedure; (2) may be defined as the systematic order of intelle...
In a context of progress and development in a common area and environment, the elements that part... more In a context of progress and development in a common area and environment, the elements that participate in the dynamic interaction of this environment (individuals, groups or associations, organizations, companies, societies, etc.) correlate unfailingly in terms of competition. The survival and vital expansion of these actors depends in good part on the skilful treatment that they do with information about the factors that influence their relationship with the environment: information on resources, trends, risks, advantages, etc. Ultimately, the global process of every activity converges fundamentally on the urgency of a strategy.
The aim of this paper is to define the architecture of the information analysis towards a proposa... more The aim of this paper is to define the architecture of the information analysis towards a proposal of methodology on systematic information analysis. First, the author shows the dimensions that state the architecture of information management. Second, the work explores the concept of indicator, as the measurement of the relation between data, and presents the results of a theoretical study
En una situación de progreso y desarrollo en un ámbito y entorno común, los elementos que partici... more En una situación de progreso y desarrollo en un ámbito y entorno común, los elementos que participan en la interacción dinámica de este entorno (individuos, grupos o asociaciones, organizaciones, empresas, sociedades, etc) se relacionan indefectiblemente en clave de competencia. La supervivencia y expansión vital de estos sujetos depende en buena parte del tratamiento más hábil de que den a la información sobre los factores que condicionan su relación con el entorno: información sobre los recursos, tendencias, riesgos, ventajas, etc. En último término, el proceso global de toda actividad converge fundamentalmente en la urgencia de una estrategia.
Centraremos el analisis dentro de este articulo en el estudio hipotetico dirigido a las empresas ... more Centraremos el analisis dentro de este articulo en el estudio hipotetico dirigido a las empresas del sector vitivinicola, consistente en determinar la ventaja competitiva que es susceptible de obtener una empresa en la aplicacion del conocimiento derivado de la I+D desarrollada en biotecnologia. Se procedera a un estudio cienciometrico y bibliometrico de patentes, en la aplicacion de las nuevas tecnologias, concretamente en la aplicacion de la luz ultravioleta para incrementar la concentracion del antioxidante natural resveratrol, que se encuentra en la uva y que pasa al vino, desarrollando su potencial beneficioso para la salud de la uva de mesa y el vino.
We will focus the analysis in this article in a hypothetical study addressed to companies in the ... more We will focus the analysis in this article in a hypothetical study addressed to companies in the wine-making industry. The objective will be the determination of the competitive advantage that can be obtained if the knowledge that comes from R+D in the biotechnology field is applied. We will proceed to a cienciometric and bibliometric study of patents, in the context of the application of new technologies, more precisely in the application of the ultraviolet light to increase the concentration of the natural antioxidant resveratrol, which can be found in the grape and then passes on to the wine during the wine making process, and in this process, it develops its beneficial potential effects for the health of the grapes and the wine.
This article consists of a conceptual analysis—from the perspective of communication sciences—of ... more This article consists of a conceptual analysis—from the perspective of communication sciences—of the relevant aspects that should be considered during operational steps in data visualization. The analysis is performed taking as a reference the components that integrate the communication framework theory—the message, the form, the encoder, the context, the channel, and the decoder—which correspond to six elements in the context of data visualization: content, graphic representation, encoding setup, graphic design and approach, media, and user. The study is focused accordingly on the dimensions that these elements describe: the degrees of abstraction of the information, the functionalities of the tool for the graphical representation, the specifications for the setup of the visualization, the approach modes to the context by the graphic design, the levels of communication efficiency in the media, and the requirements of the visualization perceived as values from the user experience si...
The community relationship maintained by the metric disciplines is expressed in concrete terms in... more The community relationship maintained by the metric disciplines is expressed in concrete terms in three elements: the consideration of information as its object of study; the statistical and mathematical methodology that provides the basis of the scientific analysis techniques; and the specific subject or matter that metrics are developing. We understand that the consideration of these elements is those that determine the architecture of the metric disciplines. Metrics are defined as a combined whole of quantitative techniques associated with a specialised field of scientific knowledge, in order to obtain descriptive, evaluative or prospective results from the activities or phenomena analysis.
In a context of progress and development in a common area and environment, the elements that part... more In a context of progress and development in a common area and environment, the elements that participate in the dynamic interaction of this environment (individuals, groups or associations, organizations, companies, societies, etc.) correlate unfailingly in terms of competition. The survival and vital expansion of these actors depends in good part on the skilful treatment that they do with information about the factors that influence their relationship with the environment: information on resources, trends, risks, advantages, etc. Ultimately, the global process of every activity converges fundamentally on the urgency of a strategy.
Nations must define priorities, objectives, goals and scope when formulating a national strategy ... more Nations must define priorities, objectives, goals and scope when formulating a national strategy that covers cyberspace, cybersecurity, stakeholder engagement, capacity building, cyber governance, cybercrime and cyber defense. The goal of this article is to propose a National Cybersecurity Strategy Model (NCSSM) based on key pillars in order to tackle the completion of all the requirements in a national strategy. This approach aims to develop international cybersecurity strategies, alliances and cooperation. Our research is focused on a comparative analysis of ten leading countries and five intergovernmental organizations cybersecurity strategies. It includes eleven cybersecurity frameworks aligned with cyber governance and cyber law.
2017 International Conference on Information Systems and Computer Science (INCISCOS)
Nowadays, private corporations and public institutions are dealing with constant and sophisticate... more Nowadays, private corporations and public institutions are dealing with constant and sophisticated cyberthreats and cyberattacks. As a general warning, organizations must build and develop a cybersecurity culture and awareness in order to defend against cybercriminals. Information Technology (IT) and Information Security (InfoSec) audits that were efficient in the past, are trying to converge into cybersecurity audits to address cyber threats, cyber risks and cyberattacks that evolve in an aggressive cyber landscape. However, the increase in number and complexity of cyberattacks and the convoluted cyberthreat landscape is challenging the running cybersecurity audit models and putting in evidence the critical need for a new cybersecurity audit model. This article reviews the best practices and methodologies of global leaders in the cybersecurity assurance and audit arena. By means of the analysis of the current approaches and theoretical background, their real scope, strengths and weaknesses are highlighted looking forward a most efficient and cohesive synthesis. As a resut, this article presents an original and comprehensive cybersecurity audit model as a proposal to be utilized for conducting cybersecurity audits in organizations and Nation States. The CyberSecurity Audit Model (CSAM) evaluates and validates audit, preventive, forensic and detective controls for all organizational functional areas. CSAM has been tested, implemented and validated along with the Cybersecurity Awareness TRAining Model (CATRAM) in a Canadian higher education institution. A research case study is being conducted to validate both models and the findings will be published accordingly.
Traditional cybersecurity, security or information security awareness programs have become ineffe... more Traditional cybersecurity, security or information security awareness programs have become ineffective to change people's behavior in recognizing, failing to block or reporting cyberthreats within their organizational environment. As a result, human errors and actions continue to demonstrate that we are the weakest links in cybersecurity. This article studies the most recent cybersecurity awareness programs and its attributes. Furthermore, the authors compiled recent awareness methodologies, frameworks and approaches. The authors introduce a suggested awareness training model to address existing deficiencies in awareness training. The Cybersecurity Awareness TRAining Model (CATRAM) has been designed to deliver training to different organizational audiences, each of these groups with specific content and separate objectives. The authors concluded their study by addressing the need of future research to target new approaches to keep cybersecurity awareness focused on the everchang...
International Journal of Information Security and Privacy, 2017
This paper reviews the existing methodologies and best practices for digital investigations phase... more This paper reviews the existing methodologies and best practices for digital investigations phases like collecting, evaluating and preserving digital forensic evidence and chain of custody of cybercrimes. Cybercriminals are adopting new strategies to launch cyberattacks within modified and ever changing digital ecosystems, this article proposes that digital investigations must continually readapt to tackle cybercrimes and prosecute cybercriminals, working in international collaboration networks, sharing prevention knowledge and lessons learned. The authors also introduce a compact cyber forensics model for diverse technological ecosystems called Cyber Forensics Model in Digital Ecosystems (CFMDE). Transferring the knowledge, international collaboration, best practices and adopting new digital forensic tools, methodologies and techniques will be hereinafter paramount to obtain digital evidence, enforce organizational cybersecurity policies, mitigate security threats, fight anti-foren...
2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF), 2016
Nowadays, cybercrime is growing rapidly around the world, as new technologies, applications and n... more Nowadays, cybercrime is growing rapidly around the world, as new technologies, applications and networks emerge. In addition, the Deep Web has contributed to the growth of illegal activities in cyberspace. As a result, cybercriminals are taking advantage of system vulnerabilities for their own benefit. This article presents the history and conceptualization of cybercrime, explores different categorizations of cybercriminals and cyberattacks, and sets forth our exhaustive cyberattack typology, or taxonomy. Common categories include where the computer is the target to commit the crime, where the computer is used as a tool to perpetrate the felony, or where a digital device is an incidental condition to the execution of a crime. We conclude our study by analyzing lessons learned and future actions that can be undertaken to tackle cybercrime and harden cybersecurity at all levels.
The relationship between higher education activities follows a sequential cycle focused on knowle... more The relationship between higher education activities follows a sequential cycle focused on knowledge transference. The aim of this paper is to examine the details of the following associated questions of debate about KT (knowledge translation) in education mission activities (first mission): relationship between teaching activities and scientific research, correlation between learning and teaching quality, entrepreneurship and the Bologna Process: the reform of education systems and finally, learning & teaching outcomes. This analysis allows a systematic approach to the specific goals of the Bologna Process that include promoting the student centred model, increasing the autonomy and accountability of universities, strengthening the responsibility of institutions for the quality of teaching, highlighting the excellence of learning, enhancing the quality of research and the transference of knowledge, as a basis for a competitive economy. In order to achieve this goal, from a CI (comp...
The aim of this paper is to define the architecture of the information analysis towards a proposa... more The aim of this paper is to define the architecture of the information analysis towards a proposal of methodology on systematic information analysis. First, the author shows the dimensions that state the architecture of information management. Second, the work explores the concept of indicator, as the measurement of the relation between data, and presents the results of a theoretical study of the scales that determine the analytical procedure of information from a systematic perspective. Third, the hierarchical architecture of indicators is reviewed from the literature taking the classification of scientometrics indicators as reference standard to its projection on extended metrics of information. The paper suggests from the review that the analytical progress of sequential application of indicators, based in a hierarchical architecture: (1) is the main guarantee to ensure a methodological systematisation of analytical procedure; (2) may be defined as the systematic order of intelle...
In a context of progress and development in a common area and environment, the elements that part... more In a context of progress and development in a common area and environment, the elements that participate in the dynamic interaction of this environment (individuals, groups or associations, organizations, companies, societies, etc.) correlate unfailingly in terms of competition. The survival and vital expansion of these actors depends in good part on the skilful treatment that they do with information about the factors that influence their relationship with the environment: information on resources, trends, risks, advantages, etc. Ultimately, the global process of every activity converges fundamentally on the urgency of a strategy.
The aim of this paper is to define the architecture of the information analysis towards a proposa... more The aim of this paper is to define the architecture of the information analysis towards a proposal of methodology on systematic information analysis. First, the author shows the dimensions that state the architecture of information management. Second, the work explores the concept of indicator, as the measurement of the relation between data, and presents the results of a theoretical study
En una situación de progreso y desarrollo en un ámbito y entorno común, los elementos que partici... more En una situación de progreso y desarrollo en un ámbito y entorno común, los elementos que participan en la interacción dinámica de este entorno (individuos, grupos o asociaciones, organizaciones, empresas, sociedades, etc) se relacionan indefectiblemente en clave de competencia. La supervivencia y expansión vital de estos sujetos depende en buena parte del tratamiento más hábil de que den a la información sobre los factores que condicionan su relación con el entorno: información sobre los recursos, tendencias, riesgos, ventajas, etc. En último término, el proceso global de toda actividad converge fundamentalmente en la urgencia de una estrategia.
Centraremos el analisis dentro de este articulo en el estudio hipotetico dirigido a las empresas ... more Centraremos el analisis dentro de este articulo en el estudio hipotetico dirigido a las empresas del sector vitivinicola, consistente en determinar la ventaja competitiva que es susceptible de obtener una empresa en la aplicacion del conocimiento derivado de la I+D desarrollada en biotecnologia. Se procedera a un estudio cienciometrico y bibliometrico de patentes, en la aplicacion de las nuevas tecnologias, concretamente en la aplicacion de la luz ultravioleta para incrementar la concentracion del antioxidante natural resveratrol, que se encuentra en la uva y que pasa al vino, desarrollando su potencial beneficioso para la salud de la uva de mesa y el vino.
We will focus the analysis in this article in a hypothetical study addressed to companies in the ... more We will focus the analysis in this article in a hypothetical study addressed to companies in the wine-making industry. The objective will be the determination of the competitive advantage that can be obtained if the knowledge that comes from R+D in the biotechnology field is applied. We will proceed to a cienciometric and bibliometric study of patents, in the context of the application of new technologies, more precisely in the application of the ultraviolet light to increase the concentration of the natural antioxidant resveratrol, which can be found in the grape and then passes on to the wine during the wine making process, and in this process, it develops its beneficial potential effects for the health of the grapes and the wine.
This article consists of a conceptual analysis—from the perspective of communication sciences—of ... more This article consists of a conceptual analysis—from the perspective of communication sciences—of the relevant aspects that should be considered during operational steps in data visualization. The analysis is performed taking as a reference the components that integrate the communication framework theory—the message, the form, the encoder, the context, the channel, and the decoder—which correspond to six elements in the context of data visualization: content, graphic representation, encoding setup, graphic design and approach, media, and user. The study is focused accordingly on the dimensions that these elements describe: the degrees of abstraction of the information, the functionalities of the tool for the graphical representation, the specifications for the setup of the visualization, the approach modes to the context by the graphic design, the levels of communication efficiency in the media, and the requirements of the visualization perceived as values from the user experience si...
The community relationship maintained by the metric disciplines is expressed in concrete terms in... more The community relationship maintained by the metric disciplines is expressed in concrete terms in three elements: the consideration of information as its object of study; the statistical and mathematical methodology that provides the basis of the scientific analysis techniques; and the specific subject or matter that metrics are developing. We understand that the consideration of these elements is those that determine the architecture of the metric disciplines. Metrics are defined as a combined whole of quantitative techniques associated with a specialised field of scientific knowledge, in order to obtain descriptive, evaluative or prospective results from the activities or phenomena analysis.
In a context of progress and development in a common area and environment, the elements that part... more In a context of progress and development in a common area and environment, the elements that participate in the dynamic interaction of this environment (individuals, groups or associations, organizations, companies, societies, etc.) correlate unfailingly in terms of competition. The survival and vital expansion of these actors depends in good part on the skilful treatment that they do with information about the factors that influence their relationship with the environment: information on resources, trends, risks, advantages, etc. Ultimately, the global process of every activity converges fundamentally on the urgency of a strategy.
Nations must define priorities, objectives, goals and scope when formulating a national strategy ... more Nations must define priorities, objectives, goals and scope when formulating a national strategy that covers cyberspace, cybersecurity, stakeholder engagement, capacity building, cyber governance, cybercrime and cyber defense. The goal of this article is to propose a National Cybersecurity Strategy Model (NCSSM) based on key pillars in order to tackle the completion of all the requirements in a national strategy. This approach aims to develop international cybersecurity strategies, alliances and cooperation. Our research is focused on a comparative analysis of ten leading countries and five intergovernmental organizations cybersecurity strategies. It includes eleven cybersecurity frameworks aligned with cyber governance and cyber law.
2017 International Conference on Information Systems and Computer Science (INCISCOS)
Nowadays, private corporations and public institutions are dealing with constant and sophisticate... more Nowadays, private corporations and public institutions are dealing with constant and sophisticated cyberthreats and cyberattacks. As a general warning, organizations must build and develop a cybersecurity culture and awareness in order to defend against cybercriminals. Information Technology (IT) and Information Security (InfoSec) audits that were efficient in the past, are trying to converge into cybersecurity audits to address cyber threats, cyber risks and cyberattacks that evolve in an aggressive cyber landscape. However, the increase in number and complexity of cyberattacks and the convoluted cyberthreat landscape is challenging the running cybersecurity audit models and putting in evidence the critical need for a new cybersecurity audit model. This article reviews the best practices and methodologies of global leaders in the cybersecurity assurance and audit arena. By means of the analysis of the current approaches and theoretical background, their real scope, strengths and weaknesses are highlighted looking forward a most efficient and cohesive synthesis. As a resut, this article presents an original and comprehensive cybersecurity audit model as a proposal to be utilized for conducting cybersecurity audits in organizations and Nation States. The CyberSecurity Audit Model (CSAM) evaluates and validates audit, preventive, forensic and detective controls for all organizational functional areas. CSAM has been tested, implemented and validated along with the Cybersecurity Awareness TRAining Model (CATRAM) in a Canadian higher education institution. A research case study is being conducted to validate both models and the findings will be published accordingly.
Traditional cybersecurity, security or information security awareness programs have become ineffe... more Traditional cybersecurity, security or information security awareness programs have become ineffective to change people's behavior in recognizing, failing to block or reporting cyberthreats within their organizational environment. As a result, human errors and actions continue to demonstrate that we are the weakest links in cybersecurity. This article studies the most recent cybersecurity awareness programs and its attributes. Furthermore, the authors compiled recent awareness methodologies, frameworks and approaches. The authors introduce a suggested awareness training model to address existing deficiencies in awareness training. The Cybersecurity Awareness TRAining Model (CATRAM) has been designed to deliver training to different organizational audiences, each of these groups with specific content and separate objectives. The authors concluded their study by addressing the need of future research to target new approaches to keep cybersecurity awareness focused on the everchang...
International Journal of Information Security and Privacy, 2017
This paper reviews the existing methodologies and best practices for digital investigations phase... more This paper reviews the existing methodologies and best practices for digital investigations phases like collecting, evaluating and preserving digital forensic evidence and chain of custody of cybercrimes. Cybercriminals are adopting new strategies to launch cyberattacks within modified and ever changing digital ecosystems, this article proposes that digital investigations must continually readapt to tackle cybercrimes and prosecute cybercriminals, working in international collaboration networks, sharing prevention knowledge and lessons learned. The authors also introduce a compact cyber forensics model for diverse technological ecosystems called Cyber Forensics Model in Digital Ecosystems (CFMDE). Transferring the knowledge, international collaboration, best practices and adopting new digital forensic tools, methodologies and techniques will be hereinafter paramount to obtain digital evidence, enforce organizational cybersecurity policies, mitigate security threats, fight anti-foren...
2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF), 2016
Nowadays, cybercrime is growing rapidly around the world, as new technologies, applications and n... more Nowadays, cybercrime is growing rapidly around the world, as new technologies, applications and networks emerge. In addition, the Deep Web has contributed to the growth of illegal activities in cyberspace. As a result, cybercriminals are taking advantage of system vulnerabilities for their own benefit. This article presents the history and conceptualization of cybercrime, explores different categorizations of cybercriminals and cyberattacks, and sets forth our exhaustive cyberattack typology, or taxonomy. Common categories include where the computer is the target to commit the crime, where the computer is used as a tool to perpetrate the felony, or where a digital device is an incidental condition to the execution of a crime. We conclude our study by analyzing lessons learned and future actions that can be undertaken to tackle cybercrime and harden cybersecurity at all levels.
Uploads
Papers by Victor Cavaller