Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ana Paula Henriques de Gusmão is active.

Publication


Featured researches published by Ana Paula Henriques de Gusmão.


International Journal of Information Management | 2014

A multidimensional approach to information security risk management using FMEA and fuzzy theory

Maisa Mendonça Silva; Ana Paula Henriques de Gusmão; Thiago Poleto; Lúcio Camara e Silva; Ana Paula Cabral Seixas Costa

We proposed an approach to information security risk management, encompassing Failure Mode and Effects Analysis (FMEA) and fuzzy theory.This approach analyses five dimensions of information security.A numerical application was undertaken. Because of the evolution and widespread use of the Internet, organisations are becoming more susceptible to attacks on Information Technology Systems. These attacks result in data losses and alterations, and impact services and business operations. Therefore, to minimise these potential failures, this paper presents an approach to information security risk management, encompassing Failure Mode and Effects Analysis (FMEA) and fuzzy theory. This approach analyses five dimensions of information security: access to information and systems, communication security, infrastructure, security management and secure information systems development. To illustrate the proposed model, it was applied to a University Research Group project. The results show that the most important aspects of information security risk are communication security, followed by infrastructure.


International Journal of Information Management | 2016

Information security risk analysis model using fuzzy decision theory

Ana Paula Henriques de Gusmão; Lúcio Camara e Silva; Maisa Mendonça Silva; Thiago Poleto; Ana Paula Cabral Seixas Costa

A risk analysis model for information security was proposed.The model is based on fuzzy decision theory.A taxonomy of events and scenarios using ETA methodology was developed.Alternatives can be ranked based on the criticality of the risk.The model provides information regarding the criticality causes of attacks.Results show that deliberate external database attack is the most risky alternative. This paper proposes a risk analysis model for information security assessment, which identifies and evaluates the sequence of events - referred to as alternatives - in a potential accident scenario following the occurrence of an initiating event corresponding to abuses of Information Technology systems. In order to perform this evaluation, this work suggests the use of Event Tree Analysis combined with fuzzy decision theory. The contributions of the present proposal are: the development of a taxonomy of events and scenarios, the ranking of alternatives based on the criticality of the risk, considering financial losses, and finally, the provision of information regarding the causes of information system attacks of highest managerial relevance for organizations. We included an illustrative example regarding a data center aiming to illustrate the applicability of the proposed model. To assess its robustness, we analyzed twelve alternatives considering two different methods of setting probabilities of the occurrence of events. Results showed that deliberate external database services attack represent the most risky alternative.


systems, man and cybernetics | 2015

Analysis of IT Outsourcing Services Failures Based on an Existing Risk Model

Lúcio Camara e Silva; Ana Paula Henriques de Gusmão; Maisa Mendonça Silva; Thiago Poleto; Ana Paula Cabral Seixas Costa

Outsourcing services have been one of the strategic measures adopted with regard to directing the focus of a company to its core business. However, companies which try to adopt Information Technology outsourcing have been faced with several threats. Therefore, the purpose of this paper is to show the applicability of an existing risk management model to deal with uncertainties in outsourcing services. The main idea is to combine Failure Modes and Effect Analysis (FMEA) with Fuzzy Logic to detect which of the different dimensions considered is more likely to fail. To show the applicability of the model, a hypothetical example was conducted with the knowledge of an expert. The result of the model is important as this will assist managers in preventing potential failures.


International Journal of Information Management | 2018

Cybersecurity risk analysis model using fault tree analysis and fuzzy decision theory

Ana Paula Henriques de Gusmão; Maisa Mendonça Silva; Thiago Poleto; Lúcio Camara e Silva; Ana Paula Cabral Seixas Costa

Abstract Cybersecurity, which is defined as information security aimed at averting cyberattacks, which are among the main issues caused by the extensive use of networks in industrial control systems. This paper proposes a model that integrates fault tree analysis, decision theory and fuzzy theory to (i) ascertain the current causes of cyberattack prevention failures and (ii) determine the vulnerability of a given cybersecurity system. The model was applied to evaluate the cybersecurity risks involved in attacking a website, e-commerce and enterprise resource planning (ERP), and to assess the possible consequences of such attacks; we evaluate these consequences, which include data dissemination, data modification, data loss or destruction and service interruption, in terms of criteria related to financial losses and time for restoration. The results of the model application demonstrate its usefulness and illustrate the increased vulnerability of e-commerce to cybersecurity attacks, relative to websites or ERP, due partly to frequent operator access, credit transactions and users’ authentication problems characteristic of e-commerce.


Mathematical Problems in Engineering | 2016

A Grey Theory Based Approach to Big Data Risk Management Using FMEA

Maisa Mendonça Silva; Thiago Poleto; Lúcio Camara e Silva; Ana Paula Henriques de Gusmão; Ana Paula Cabral Seixas Costa

Big data is the term used to denote enormous sets of data that differ from other classic databases in four main ways: (huge) volume, (high) velocity, (much greater) variety, and (big) value. In general, data are stored in a distributed fashion and on computing nodes as a result of which big data may be more susceptible to attacks by hackers. This paper presents a risk model for big data, which comprises Failure Mode and Effects Analysis (FMEA) and Grey Theory, more precisely grey relational analysis. This approach has several advantages: it provides a structured approach in order to incorporate the impact of big data risk factors; it facilitates the assessment of risk by breaking down the overall risk to big data; and finally its efficient evaluation criteria can help enterprises reduce the risks associated with big data. In order to illustrate the applicability of our proposal in practice, a numerical example, with realistic data based on expert knowledge, was developed. The numerical example analyzes four dimensions, that is, managing identification and access, registering the device and application, managing the infrastructure, and data governance, and 20 failure modes concerning the vulnerabilities of big data. The results show that the most important aspect of risk to big data relates to data governance.


systems, man and cybernetics | 2014

A multicriteria model for characterizing the strategic role of IT in organizations

Ana Paula Henriques de Gusmão; Maisa Silva Mendonça; Ana Paula Cabral Seixas Costa

Knowledge of the strategic role of technology and information systems in organizations is of critical importance for future investments in this area. Therefore, several authors have proposed models that enable the role of information systems in organizational processes to be analyzed strategically. Given the lack of a formal model for sorting organizations with respect to the strategic positioning of information systems, this paper puts forward a multicriteria model for categorizing organizations from the categories defined by the proposed IS Strategic Impact Grid.


Pesquisa Operacional | 2012

A model for evaluating efficiency - an application in information technology and systems investments

Ana Paula Henriques de Gusmão; Ana Paula Cabral Seixas Costa

Despite being widely applied in real problems that tackle evaluating efficiency, Data Envelopment Analysis (DEA) models are frequently criticized on account of the weights of evaluation criteria often being defined loosely. Thus, approaches to incorporating value judgments in DEA models have been used in order to obtain more consistent results with managerial reality. It is against this background that this paper proposes a DEA model for evaluating efficiency, where the value judgments of those responsible for evaluation, regarding the criteria, are defined based on the philosophy of the SMARTS method and incorporated into the model by the Assurance Region (AR) method. The model proposed is applied using information about the investments made in the area of Information Technology and Information Systems by Brazilian banks The aim is to exemplify the application of the model and raise points for discussion with regard to its merits.


International Journal of Production Economics | 2014

Continuous cooperation: A proposal using a fuzzy multicriteria sorting method

Maisa Mendonça Silva; Ana Paula Cabral Seixas Costa; Ana Paula Henriques de Gusmão


Archive | 2011

MEASURING EFFICIENCY OF ORGANIZATIONS THAT USE IT/IS: AN APPLICATION IN BRAZILIAN COMPANIES

Ana Paula Henriques de Gusmão; Ana Paula Cabral Seixas Costa


International Journal of Decision Support System Technology | 2014

A Decision Support System for Sizing the Call Center of an Electrical Power Distributor

Adiel Teixeira de Almeida Filho; Ana Paula Henriques de Gusmão; Thárcylla Rebecca Negreiros Clemente; Jadielson Alves de Moura; Ana Paula Cabral Seixas Costa; Adiel Teixeira de Almeida

Collaboration


Dive into the Ana Paula Henriques de Gusmão's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Maisa Mendonça Silva

Federal University of Pernambuco

View shared research outputs
Top Co-Authors

Avatar

Thiago Poleto

Federal University of Pernambuco

View shared research outputs
Top Co-Authors

Avatar

Lúcio Camara e Silva

Federal University of Pernambuco

View shared research outputs
Top Co-Authors

Avatar

Adiel Teixeira de Almeida

Federal University of Pernambuco

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jadielson Alves de Moura

Federal University of Pernambuco

View shared research outputs
Top Co-Authors

Avatar

Maisa Silva Mendonça

Federal University of Pernambuco

View shared research outputs
Top Co-Authors

Avatar

Marina Duarte

Federal University of Pernambuco

View shared research outputs
Researchain Logo
Decentralizing Knowledge