176 research outputs found

    Analisando Projetos através das Práticas: Um Ensaio Teórico

    Get PDF
    Organizações utilizam projetos como forma de implementar mudanças e de gerar novos produtos e/ou serviços. Estudos sobre projetos são tradicionalmente sistemáticos e focam em processos, metodologias e ferramentas que se preocupam em aspectos técnicos do que nos aspectos práticos, muitas vezes negligenciando totalmente os atores envolvidos nas atividades cotidianas. As teorias da prática preocupam-se em como as práticas são forjadas em um contexto individual e social. Este ensaio teórico explora essa lacuna e faz um recorte das práticas em projetos apresentando uma análise sob a lente das teorias da prática de como estas se formam em projetos e como são perpetuadas através de uma das mais importantes e recentes teorias sociais: as teorias de Theodore Schatzki. Conclui-se que projetos, por serem temporários, são fontes ricas de práticas inovadoras, porém apresentam formas complexas de organizar e perpetuar suas práticas cotidianas

    Analisando Projetos através das Práticas: Um Ensaio Teórico

    Get PDF
    Organizations use projects as a way to implement change and to generate new products and / or services. Studies about projects are traditionally systematic and focus on processes, methodologies and tools that are more concerned with technical factors than with practical aspects often neglecting completely the actors involved in the daily activities. Theories of practice are concerned about how the practices are forged in an individual and social context. This theoretical essay explores this gap and provides theoretical reflection of the practices in projects presenting an analysis with the lens of the practical theories of how the practices are formed in projects and how they are perpetuated through one of the most important and recent social theories: Theodore Schatzki theories. It is concluded that projects to be temporary, are rich sources of innovative practices, but have complex ways of organizing and perpetuating their daily practices.Organizações utilizam projetos como forma de implementar mudanças e de gerar novos produtos e/ou serviços. Estudos sobre projetos são tradicionalmente sistemáticos e focam em processos, metodologias e ferramentas que se preocupam em aspectos técnicos do que nos aspectos práticos, muitas vezes negligenciando totalmente os atores envolvidos nas atividades cotidianas. As teorias da prática preocupam-se em como as práticas são forjadas em um contexto individual e social. Este ensaio teórico explora essa lacuna e faz um recorte das práticas em projetos apresentando uma análise sob a lente das teorias da prática de como estas se formam em projetos e como são perpetuadas através de uma das mais importantes e recentes teorias sociais: as teorias de Theodore Schatzki. Conclui-se que projetos, por serem temporários, são fontes ricas de práticas inovadoras, porém apresentam formas complexas de organizar e perpetuar suas práticas cotidianas

    Organizing in the shadow of donors: How donations market regulates the governance practices of sponsored projects in non-governmental organizations

    Get PDF
    The purpose of this study is to analyze the influence of donors in the organization of governance practices of sponsored projects in non-governmental organizations (NGOs) from an agency theory perspective. For this, the sponsored project was understood as a temporary organization. The study relied on data collected through document survey in contracts and call for tenders for project support, and on semi-structured interviews with executives from donor organizations in a Latin America country. The study found that the governance of NGOs is impacted by temporary governance derived from projects. In turn, the projects are circumvented by aspects of compliance and enforcement through pressure from donors, and transferring donor management processes to NGOs produces two shadows over NGOs: (a) there is a public organizations’ influence of laws, norms and actions of state decentralization that demands NGOs to organize themselves like the State; and, (b) on the corporate donors side, an organization aligned with business is required

    Towards Safer Industrial Serial Networks: An Expert System Framework for Anomaly Detection

    Get PDF
    Cyber security is a topic of increasing relevance in relation to industrial networks. The higher intensity and intelligent use of data pushed by smart technology (Industry 4.0) together with an augmented integration between the operational technology (production) and the information technology (business) parts of the network have considerably raised the level of vulnerabilities. On the other hand, many industrial facilities still use serial networks as underlying communication system, and they are notoriously limited from a cyber security perspective since protection mechanisms available for TCP/IP communication do not apply. Therefore, an attacker gaining access to a serial network can easily control the industrial components, potentially causing catastrophic incidents, jeopardizing assets and human lives. This study proposes a framework to act as an anomaly detection system (ADS) for industrial serial networks. It has three ingredients: an unsupervised K-means component to analyse message content, a knowledge-based expert system component to analyse message metadata, and a voting process to generate alerts for security incidents, anomalous states, and faults. The framework was evaluated using the Profibus-DP, a network simulator which implements a serial bus system. Results for the simulated traffic were promising: 99.90% for accuracy, 99,64% for precision, and 99.28% for F1-Score. They indicate feasibility of the framework applied to serial-based industrial networks

    Non-IP Industrial Networks: An Agnostic Anomaly Detection System

    Get PDF
    This paper describes a system to detect anomalies in non-IP (Internet Protocol) industrial networks on Industrial Control Systems (ICS). Non-IP industrial networks are widely applied in ICS to connect sensors and actuators to control systems or business networks. They were designed to be in an air-gapped security environment and therefore contain almost no cyber security features and are vulnerable to various attacks. Even though they are part of the communication layers, a few external cyber security controls are applied in this crucial tier. As an extension of the work by De Moura et al. (2021), this study proposes and tests the proof-of-concept of an agnostic anomaly detection system (AADS) to detect anomalies on any non-IP industrial network (e.g., DeviceNet, CANBus) as an additional cyber security measure working at the physical network layer. The proof-of-concept is comprised of three modules, including hardware and software components: data gathering (sniffer), parser, and detection. Testing the proof-of-concept in an industrial lab network (i.e., a Profibus-DP lab network) showed the proposal's feasibility with a detection rate above 99% (overall accuracy: 99.59%; F1-Score: 99.18%)

    O AMBIENTE VUCA NO SUCESSO DO PROJETO: OS EFEITOS DOS MÉTODOS DE GERENCIAMENTO DE PROJETOS

    Get PDF
    Due to the ever-changing work environment in the age of digital transformation, project managers need to adapt to an environment which is volatile, uncertain, complex, and ambiguous (VUCA). Many organizations adopt management methods based on strict project management planning, assuming that they are the best way to succeed in any situation. However, projects may depend on flexibility to achieve success. This study aims to analyze the impact of adverse project environments on project success and the effect of the management method choice. A PLS-SEM model is tested on a survey of 332 project professionals. Findings showed that choosing a method that best fits the project’s environment can help catch up on project success only when it undergoes frequent changes throughout its life cycle.Devido ao ambiente de trabalho em constante mudança, os gerentes de projeto precisam se adaptar a um ambiente volátil, incerto, complexo e ambíguo (VUCA) na era da transformação digital. Muitas organizações adotam métodos de gestão baseados em um planejamento rigoroso na gestão de projetos, assumindo que eles são a melhor forma de obter sucesso em qualquer situação. No entanto, os projetos podem depender de flexibilidade para alcançar o sucesso. Este estudo tem como objetivo analisar o impacto de ambientes de projeto adversos no sucesso do projeto e o efeito da escolha do método de gestão. Um modelo PLS-SEM é testado em uma pesquisa com 332 profissionais envolvidos em projetos. Os resultados mostraram que a escolha de um método que melhor se adapte ao ambiente do projeto pode ajudar a recuperar o sucesso do projeto somente quando ele passa por mudanças frequentes ao longo de seu ciclo de vida

    Cybersecurity in Industrial Networks: Artificial Intelligence Techniques Applied to Intrusion Detection Systems

    Get PDF
    Industrial control systems (ICS) operate on serial based networks which lack proper security safeguards by design. They are also becoming more integrated to corporate networks, creating new vulnerabilities which expose ICS networks to increasing levels of risk with potentially significant impact. Despite those risks, only a few mechanisms have been suggested and are available in practice as cybersecurity safeguards for the ICS network layer, maybe because they might not be commercially viable. Intrusion detection systems (IDS) are typically deployed in the corporate networks to protect against attacks since they are based on TCP/IP. However, IDS are not used in serial based ICS networks yet. This study examines and compares modern Artificial Intelligence (AI) techniques applied in IDS that are potentially useful for serial-based ICS networks. The results showed that current AI-based IDS methods are viable in such networks. A mix of AI techniques would be the best way forward to detect known attacks via rules and novel attacks, not previously mapped, via supervised and unsupervised techniques. Despite these strategies’ limited use in serial-based networks, their adoption could significantly strengthen cybersecurity of ICS networks

    A Cyber-Security Strategy for Internationally-dispersed Industrial Networks

    Get PDF
    Globalization implies geographically dispersed supply chains composed of facilities strategically located in several countries and regions of the world. These structures commonly involve several Operational Technology (OT) and Information Technology (IT) infrastructures and integration to enable accurate and useful information processing. Such integration (also called Cyber-Physical Systems) transforms the industry and facilitates massive data volumes' systematic transformation into valuable information. Security risks posed by such integration may be substantial and, depending on the size of the company, and the number of integration points, dealing with them could easily cost millions of dollars. With the main objective of studying available strategies to manage security risks in companies with dispersed supply chains, this paper reviews international cyber-security standards and regulations and proposes a more comprehensive strategy. The strategy includes IT services, optimized perimeter segregation, and data flow policies among OT and IT networks to balance a high level of protection and cost-effectiveness
    • …
    corecore