Short courses of the 10th Regional School on Informatics of Mato Grosso

Authors

Thiago Meirelles Ventura (ed)
UFMT
https://orcid.org/0000-0002-3758-5466

Keywords:

Early Privacy, VoIP, UiPath, Cognitive automation

Synopsis

The content of this book is related to privacy, voice over IP and process automation. In the first chapter, entitled “Despertando o olhar para a Early Privacy: desafios e recursos para o estabelecimento de privacidade em sistemas computacionais”, authors comment on how privacy should be thought of from the beginning of software design, respecting usability and accessibility aspects to ensure that users in their widest diversity can effectively make decisions about their personal information in the technological context. In the second chapter, “Voz sobre IP (VoIP) – configurando servidor elastix para ensino-aprendizagem”, author talks about the importance of VoIP as a voice transport service using the internet, besides showing in practice the server implementation elastix for this purpose. The third and last chapter, entitled “Automação Cognitiva de Processos com UiPath”, simulates a scenario in which the automation of a process is carried out with the UiPath tool, facilitating the performance of tasks. The three chapters of this book have methodologies and tools for the information technology area, being a useful book mainly for people who want to start in the respective areas covered.

 

Chapters

Downloads

Download data is not yet available.

References

Bordim, Jacir L. (2010) “Introdução à Voz sobre IP e Asterisk”, p. 11-16, 02 de abr. de 2018.

Brasil. (2018) “Lei No 13.709”. Acesso em: 05/10/2019. Disponível em: <http://www.planalto.gov.br/ccivil_03/_ato2015-2018/2018/lei/L13709.htm> .

Burgess, Andrew. (2018) ‘‘The Executive Guide to Artificial Intelligence: How to identify and implement applications for AI in your organization’’, Palgrave Macmillan. London, United Kingdom, 1o edição.

Carvalho, Priscila F. (2018) “Modelagem de Negócios: Uma Aplicação na Implantação de um Sistema VoIP para Fornecimento de Serviços de Telefonia IP por uma Empresa da Região de Campos dos Goytacazes.” Rio de Janeiro, p. 12, 05 de nov. de 2008.

Cavoukian, A. (2009) “Privacy by design: The 7 foundational principles.” Information and Privacy Commissioner of Ontario, Canada 5.

Cerqueira, T. R. (2013) “Personas como Método de Avaliação – Um Estudo Sobre a Usabilidade das Configurações de Privacidade do Facebook”. Monografia Especialização. UFMT.

Clarke, R. (1989) “Privacy Impact Assessment Guidelines”. Acesso em: 05/10/2019. Disponível em: <http://www.xamax.com.au/DV/PIA.html>

Clarke, R. (2009) “Privacy impact assessment: Its origins and development”. Computer Law & Security Review, 25(2), 123–135. https://doi.org/10.1016/j.clsr.2009.02.002

Claudemir. (2012) BLOG DOS CURSOS. “ELASTIX. Parte 2: Configurando Extensões e SoftPhone X-lite”. Disponível em: http://blogdoscursos.com.br/elastix-parte-2-configurando-extensoes-e-softphone-x-lite/>.

CounterPath. (2018) “Comunicações móveis em um nível totalmente novo”. Disponível em: <http://www.counterpath.com/softphone-clients/>.

FaleMaisVOIP. (2016) “Softphone: o que é, como funciona e quais as opções?” Disponível em: <https://www.falemaisvoip.com.br/blog/softphone/>.

IEEE, (2017) ‘‘IEEE 2755-2017 - IEEE Guide for Terms and Concepts in Intelligent Process Automation’’, https://standards.ieee.org/standard/2755-2017.html, Agosto.

Keller, Alexandre. (2011) “Asterisk na prática”. p. 20 – 27, 2a edição. São Paulo: Novatec Editora, 2011.

Kokolakis, S. (2017) “Privacy Attitudes and Privacy Behaviour: a review of current research of the privacy paradox phenomenon”, In: Computers and Security, v. 64, 2017, p. 122-134.

Langheinrich M. (2001) “Privacy by Design — Principles of Privacy-Aware Ubiquitous Systems”. In: Abowd

G.D., Brumitt B., Shafer S. (eds) Ubicomp 2001: Ubiquitous Computing. UbiComp 2001. Lecture Notes in Computer Science, vol 2201. Springer, Berlin, Heidelberg

Langheinrich, M. (2018) "Privacy in Ubiquitous Computing." Ubiquitous computing fundamentals. Chapman and Hall/CRC, 109-174.

Lowdermilk, T. “User-centered design: a developer’s guide to building user-friendly applications”. O’Reilly Media, Inc, 2013.

Madakam, Somayya., Holmukhe, Rajesh M. and Durgesh Kumar Jaiswal. (2019) ‘‘THE FUTURE DIGIT AL WORK FORCE: ROBOTIC PROCESS AUTOMA TION (RPA)’’, In: Journal of Information Systems and Technology Management – Jistem USP, Vol. 16, 2019, https://doi.org/10.4301/s1807-1775201916001

Limanez, Mateus Godoi. (2009) “Avaliação dos protocolos VoIP SIP e IAX utilizando simulação e parâmetros de qualidade de voz”. Dissertação (Mestrado) – Instituto de Ciências Matemáticas e de Computação. Universidade de São Paulo, USP. São Carlos/SP. 2009, p. 7.

New York Times. (2018) “Cambridge Analytica and Facebook: The Scandal and the Fallout So Far”. Acesso em: 16/09/2019. Disponível em: https://www.nytimes.com/2018/04/04/us/politics/cambridge-analytica-scandal-fallout.html.

New York Times. (2019) “In Hong Kong Protests, Faces Become Weapons”. Acesso em: 16/09/2019. Disponível em: https://www.nytimes.com/2019/07/26/technology/hong-kong-protests-facial-recognition-surveillance.html

OAIC (Office of the Australian Information Commissioner). (2014) “Guide to undertaking privacy impact assessments”. Disponível em: <https://www.oaic.gov.au/privacy/guidance-and-advice/guide-to-undertaking-privacy-impact-assessments/>

Petenate, Marcelo. (2019) ‘‘Aprenda Tudo Sobre a Metodologia Lean Six Sigma, Detalhes, Certificação e como Aplicar’’, https://www.escolaedti.com.br/lean-e-seis-sigma-qual-a-diferenca, Agosto.

Schaub, F., Breaux, T. D., and Sadeh, N. (2016) “Crowdsourcing privacy policy analysis: Potential, challenges and best practices.” it-Information Technology 58.5: 229-236.

Sellen, A. Rogers, Y. Harper, R., and Rodden, T. (2009) “Reflecting human values in the digital age”. Commun. ACM 52, 3 (March 2009), 58-66.

Silva Junior, D. P., de Souza, P. C. and Gonçalves, T. A. J. (2018b) “Early Privacy: Approximating Mental Models in the Definition of Privacy Requirements in Systems Design.” In: Proceedings of the 17th Brazilian Symposium on Human Factors in Computing Systems. ACM.

Silva Junior, D. P., de Souza, P. C. and Maciel, C. (2018a) “Method for privacy requirements elicitation in ubiquitous computing”. In: Proceedings of the XXXII Brazilian Symposium on Software Engineering (SBES '18). ACM, New York, NY, USA, 178-183

TELECO, Inteligência em Telecomunicações. “PTT no Celular II: Protocolos SIP e RTP”. Disponível em: <http://www.teleco.com.br/tutoriais/tutorialpushtotalk2/pagina_3.asp>.

TELECO, Inteligência em Telecomunicações. (2019) “Telefonia IP: Protocolos”. Disponível em: <https://www.teleco.com.br/tutoriais/tutorialtelip/pagina_3.asp>.

TELECO, Inteligência em Telecomunicações. (2019) “VoIP/Telefonia IP”. Disponível em: <http://www.teleco.com.br/voip.asp>.

The Verge. (2019) “Microsoft’s new privacy policy admits humans are listening to some Skype and Cortana recordings”. Acesso em: 05/10/2019. Disponível em: <https://www.theverge.com/2019/8/14/20805801/microsoft-privacy-policy-change-humans-listen-skype-cortana-voice-recording>

Van der Aals, Wil M. P., Bichler, Martin., Heinzl, Armin. ‘‘Robotic Process Automation’’, In: Bus Inf Syst Eng 60(4), 2018, https://doi.org/10.1007/s12599-018-0542-4

Wright, D. (2012) "The state of the art in privacy impact assessment." Computer Law & Security Review 28.1 (2012): 54-61.

Wright, D. (2013) “Making Privacy Impact Assessment More Effective”, The Information Society, 29:5, 307-315

Yamauchi, E. A., de Souza, P. C. and Silva Junior, D. P.. (2016) “Prominent issues for privacy establishment in privacy policies of mobile apps.” In: Proceedings of the 15th Brazilian Symposium on Human Factors in Computing Systems. ACM.

Downloads

Publication date

October 16, 2019

Details about the available publication format: Full Volume

Full Volume

Co-publisher's ISBN-13 (24)

978-85-7669-487-8