Um Estudo sobre Atividades Participativas para Soluções IoT para o Home care de Pessoas Idosas
Authors:
Renata de Podestá Gaspar,
Rodrigo Bonacin,
Vinícius Gonçalves
Abstract:
Population aging in Brazil and in the world occurs at the same time of advances and evolutions in technology. Thus, opportunities for new solutions arise for the elderly, such as innovations in Home Care. With the Internet of Things, it is possible to improve the elderly autonomy, safety and quality of life. However, the design of IoT solutions for elderly Home Care poses new challenges. In this c…
▽ More
Population aging in Brazil and in the world occurs at the same time of advances and evolutions in technology. Thus, opportunities for new solutions arise for the elderly, such as innovations in Home Care. With the Internet of Things, it is possible to improve the elderly autonomy, safety and quality of life. However, the design of IoT solutions for elderly Home Care poses new challenges. In this context, this technical report aims to detail activities developed as a case study to evaluate the IoT-PMHCS Method, which was developed in the context of the Master's program in Computer Science at UNIFACCAMP, Brazil. This report includes the planning and results of interviews, participatory workshops, validations, simulation of solutions, among other activities. This document reports the practical experience of applying the IoT-PMHCS Method.
--
O envelhecimento populacional no Brasil e no mundo ocorre ao mesmo tempo que os avanços e evoluções na tecnologia. Desta forma, surgem oportunidades de novas soluções para o público idoso, tais como inovações em Home Care. Com a Internet das Coisas é possível promover maior autonomia, segurança e qualidade de vida aos idosos. Entretanto, o design de soluções de IoT para Home Care de pessoas idosas traz novos desafios. Diante disto, este relatório técnico tem o objetivo de detalhar atividades desenvolvidas como estudo de caso para avaliação do Método IoT-PMHCS, desenvolvido no contexto do programa de Mestrado em Ciência da Computação da UNIFACCAMP, Brasil. O relatório inclui o planejamento e resultados de entrevistas, workshops participativos, pesquisas de validação, simulação de soluções, dentre outras atividades. Este documento relata a experiência prática da aplicação do Método IoT-PMHCS.
△ Less
Submitted 1 March, 2021;
originally announced March 2021.
The Security Assessment Domain: A Survey of Taxonomies and Ontologies
Authors:
Ferrucio de Franco Rosa,
Rodrigo Bonacin,
Mario Jino
Abstract:
The use of ontologies and taxonomies contributes by providing means to define concepts, minimize the ambiguity, improve the interoperability and manage knowledge of the security domain. Thus, this paper presents a literature survey on ontologies and taxonomies concerning the Security Assessment domain. We carried out it to uncover initiatives that aim at formalizing concepts from the Information S…
▽ More
The use of ontologies and taxonomies contributes by providing means to define concepts, minimize the ambiguity, improve the interoperability and manage knowledge of the security domain. Thus, this paper presents a literature survey on ontologies and taxonomies concerning the Security Assessment domain. We carried out it to uncover initiatives that aim at formalizing concepts from the Information Security and Test and Assessment fields of research. We applied a systematic review approach in seven scientific databases. 138 papers were identified and divided into categories according to their main contributions, namely: Ontology, Taxonomy and Survey. Based on their contents, we selected 47 papers on ontologies, 22 papers on taxonomies, and 11 papers on surveys. A taxonomy has been devised to be used in the evaluation of the papers. Summaries, tables, and a preliminary analysis of the selected works are presented. Our main contributions are: 1) an updated literature review, describing key characteristics, results, research issues, and application domains of the papers; and 2) the taxonomy for the evaluation process. We have also detected gaps in the Security Assessment literature that could be the subject of further studies in the field. This work is meant to be useful for security researchers who wish to adopt a formal approach in their methods and techniques.
△ Less
Submitted 29 June, 2017;
originally announced June 2017.