Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Victor Cavaller is active.

Publication


Featured researches published by Victor Cavaller.


International Journal of Knowledge and Learning | 2009

National culture and the secrecy of innovations

Enric Serradell-López; Victor Cavaller

The main objective of this paper is to provide greater understanding of the nature of secrecy in firms. It presents an effort to develop some links between management of the secrecy and its relationship with culture. Using measures from Hofstedes (2001) work, we have linked some dimensions of national culture with CIS 3 EU survey database. The results show that some attributes of the culture in organisations as masculinity and uncertainty avoidance have impact on the tendency of the firms for not to patent and maintain secrecy of their innovations.


world summit on the knowledge society | 2009

Cultural Aspects of Secrecy in Global Economy

Enric Serradell-López; Victor Cavaller

The main objective of this paper is to provide greater understanding of the nature of secrecy in firms. It presents an effort to develop some links between management of the secrecy and its relationship with culture. Using measures from Hofstede’s work, we have linked some dimensions of national culture with CIS 3 UE survey database. The results show that some attributes of the culture as Masculinity and Uncertainty Avoidance have impact on the tendency of the firms for not to patent and maintain secrecy of their innovations.


International Journal of Information Security and Privacy | 2017

Digital Forensic Analysis of Cybercrimes: Best Practices and Methodologies

Regner Sabillon; Jordi Serra-Ruiz; Victor Cavaller; Jeimy J. Cano

This paper reviews the existing methodologies and best practices for digital investigations phases like collecting, evaluating and preserving digital forensic evidence and chain of custody of cybercrimes. Cybercriminals are adopting new strategies to launch cyberattacks within modified and ever changing digital ecosystems, this article proposes that digital investigations must continually readapt to tackle cybercrimes and prosecute cybercriminals, working in international collaboration networks, sharing prevention knowledge and lessons learned. The authors also introduce a compact cyber forensics model for diverse technological ecosystems called Cyber Forensics Model in Digital Ecosystems CFMDE. Transferring the knowledge, international collaboration, best practices and adopting new digital forensic tools, methodologies and techniques will be hereinafter paramount to obtain digital evidence, enforce organizational cybersecurity policies, mitigate security threats, fight anti-forensics practices and indict cybercriminals. The global Digital Forensics community ought to constantly update current practices to deal with cybercriminality and foreseeing how to prepare to new technological environments where change is always constant.


2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF) | 2016

Cybercriminals, cyberattacks and cybercrime

Regner Sabillon; Victor Cavaller; Jeimy J. Cano; Jordi Serra-Ruiz

Nowadays, cybercrime is growing rapidly around the world, as new technologies, applications and networks emerge. In addition, the Deep Web has contributed to the growth of illegal activities in cyberspace. As a result, cybercriminals are taking advantage of system vulnerabilities for their own benefit. This article presents the history and conceptualization of cybercrime, explores different categorizations of cybercriminals and cyberattacks, and sets forth our exhaustive cyberattack typology, or taxonomy. Common categories include where the computer is the target to commit the crime, where the computer is used as a tool to perpetrate the felony, or where a digital device is an incidental condition to the execution of a crime. We conclude our study by analyzing lessons learned and future actions that can be undertaken to tackle cybercrime and harden cybersecurity at all levels.


InSITE 2007: Informing Science + IT Education Conference | 2007

Sequential Application of Indicators in Degrees of Intellection for Systematic Information Analysis

Victor Cavaller

The aim of this paper is to define the architecture of the information analysis towards a proposal of methodology on systematic information analysis. First, the author shows the dimensions that state the architecture of information management. Second, the work explores the concept of indicator, as the measurement of the relation between data, and presents the results of a theoretical study of the scales that determine the analytical procedure of information from a systematic perspective. Third, the hierarchical architecture of indicators is reviewed from the literature taking the classification of scientometrics indicators as reference standard to its projection on extended metrics of information. The paper suggests from the review that the analytical progress of sequential application of indicators, based in a hierarchical architecture: (1) is the main guarantee to ensure a methodological systematisation of analytical procedure; (2) may be defined as the systematic order of intellection: (3) and allows a rigorous, integral and exhaustive information management in organisations.


Tourism Management Perspectives | 2014

Web Quality Index (WQI) for official tourist destination websites. Proposal for an assessment system

José Fernández-Cavia; Cristòfol Rovira; Pablo Díaz-Luque; Victor Cavaller


Procedia - Social and Behavioral Sciences | 2011

Portfolios for entrepreneurship and self-evaluation of higher education institutions

Victor Cavaller


Archive | 2010

Monitoring Students' Activity and Performance in Online Higher Education: A European Perspective

Fernando Lera-López; Javier Faulin; Angel A. Juan; Victor Cavaller


international conference information systems and computer science | 2017

A Comprehensive Cybersecurity Audit Model to Improve Cybersecurity Assurance: The CyberSecurity Audit Model (CSAM)

Regner Sabillon; Jordi Serra-Ruiz; Victor Cavaller; Jeimy J. Cano


Profesional De La Informacion | 2013

Diseño conceptual y especificación de requerimientos para el desarrollo y rediseño de sitios web

Rafael Pedraza-Jiménez; Saúl Blanco; Lluís Codina; Victor Cavaller

Collaboration


Dive into the Victor Cavaller's collaboration.

Top Co-Authors

Avatar

Jordi Serra-Ruiz

Open University of Catalonia

View shared research outputs
Top Co-Authors

Avatar

Regner Sabillon

Open University of Catalonia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Angel A. Juan

Open University of Catalonia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Pablo Díaz-Luque

Pablo de Olavide University

View shared research outputs
Researchain Logo
Decentralizing Knowledge