Your browser doesn't support javascript.
Show: 20 | 50 | 100
Results 1 - 2 de 2
Filter
Add filters

Language
Document Type
Year range
1.
16th Iberian Conference on Information Systems and Technologies (CISTI) ; 2021.
Article in English | Web of Science | ID: covidwho-1975964

ABSTRACT

This work regards the simulation of the spread of the COVID-19 disease in a community by applying the deterministic and stochastic Susceptible-allows to realistically simulate the spread of COVID-19 in a medium-sized community and to study the effect of preventive measures such as quarantine and vaccination. The results of the simulations are compared with the deterministic version of the SEIR model. The comparison makes it possible to conclude that the epidemic outbreak can be prevented even though the basic reproduction number is greater than one.

2.
15th International Conference on Information Technology and Applications, ICITA 2021 ; 350:561-572, 2022.
Article in English | Scopus | ID: covidwho-1844325

ABSTRACT

The emergence of the COVID-19 pandemic led several organizations around the world and in the most varied areas of activity, to move from the intention to implement a digital transformation in the medium/long-term, to an instant obligation to apply the digital transformation. The organizations’ ability to adapt immediately meant their survival and even in some cases a positive evolution of their business. The digital transformation applied in an abrupt way has uncovered some critical factors for its success. One of the most relevant factors will be information security. Many of the digital systems put into operation more intensively during the pandemic, have shown to be highly fragile on issues related to information security. One relevant problem of the organizations is the low effectiveness and efficiency of financial, human, and material resources, allocated to the reduction or mitigation of the risks identified in their information systems. This study aims to offer a new method for prioritizing security risks. The new proposed method directs the organizations resources to more effectively and efficiently actions to reduce or mitigate the identified vulnerabilities of the information system. © 2022, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

SELECTION OF CITATIONS
SEARCH DETAIL