This user account status is Approved
Algoritmi | User | José Filipe Sá Rodrigues Soares

José Filipe Sá Rodrigues Soares

José Filipe Sá Rodrigues Soares

At Algoritmi

Integrated Researcher with PhD

Member of the IST R&D Group

Academic Degree

PhD

Current Position

Assistant Professor at Escola de Engenharia da Universidade do Minho

Personal Webpage

Personal Email

fss@dsi.uminho.pt

Orcid

0000-0002-3822-2763

Researcher ID

I-6583-2015

FCT Public Key

J019675JFW6

Ciência ID

A416-D253-775F

Google Scholar

About Me



Analyzing e-governance assessment initiatives: An exploratory study

ACM International Conference Proceeding Series

2018 | conference-paper

Assessment of forecasting models for patients arrival at Emergency Department

Operations Research for Health Care

2018 | journal-article

Information security concerns in IT outsourcing: Identifying (in) congruence between clients and vendors

Information and Management

2017 | journal-article

Key Issues for the Successful Adoption of Cloud Computing

Procedia Computer Science

2017 | conference-paper

Authenticity challenges of wearable technologies

Managing Security Issues and the Hidden Dangers of Wearable Technologies

2016 | book

Audit of alignment between business and information systems,Auditoria do alinhamento entre sistemas de informação e negócio

Atas da Conferencia da Associacao Portuguesa de Sistemas de Informacao

2015 | conference-paper

A catalog of information systems outsourcing risks

International Journal of Information Systems and Project Management

2014 | journal-article

Assessment frequency in introductory computer programming disciplines

Computers in Human Behavior

2014 | journal-article

Information systems security management key issues in local government

ACM International Conference Proceeding Series

2014 | conference-paper

Information systems security policies adoption: An institutional theory view

Proceedings of the 7th IADIS International Conference Information Systems 2014, IS 2014

2014 | conference-paper

Towards a theory of information systems outsourcing risk

Centeris 2014 - Conference on Enterprise Information Systems / Projman 2014 - International Conference on Project Management / Hcist 2014 - International Conference on Health and Social Care Information Systems and Technologies

2014 | book-chapter

Applying Action Research in the Adoption of Information Systems Security Policies

Proceedings of the 12th European Conference on Research Methodology For Business and Management Studies

2013 | journal-article

Key issues in information systems security management

International Conference on Information Systems (ICIS 2013): Reshaping Society Through Information Systems Design

2013 | conference-paper

Secure outsourcing: An investigation of the fit between clients and providers

IFIP Advances in Information and Communication Technology

2013 | book

Information security policies: A content analysis

Proceedings - Pacific Asia Conference on Information Systems, PACIS 2012

2012 | conference-paper

Information systems security outsourcing key issues: A service providers' perspective

ECIS 2012 - Proceedings of the 20th European Conference on Information Systems

2012 | conference-paper

Trust in e-voting systems: A case study

Lecture Notes in Business Information Processing

2012 | book

Computer programming: Fail fast to learn sooner

Communications in Computer and Information Science

2010 | book

Information Systems Security Policies: A survey in Portuguese Public Administration

Proceedings of the IADIS International Conference Information Systems 2010

2010 | conference-paper

Analyzing e-governance assessment initiatives: An exploratory study

ACM International Conference Proceeding Series

2018 | conference-paper

Assessment of forecasting models for patients arrival at Emergency Department

Operations Research for Health Care

2018 | journal-article

Information security concerns in IT outsourcing: Identifying (in) congruence between clients and vendors

Information and Management

2017 | journal-article

Key Issues for the Successful Adoption of Cloud Computing

Procedia Computer Science

2017 | conference-paper

Authenticity challenges of wearable technologies

Managing Security Issues and the Hidden Dangers of Wearable Technologies

2016 | book

Audit of alignment between business and information systems,Auditoria do alinhamento entre sistemas de informação e negócio

Atas da Conferencia da Associacao Portuguesa de Sistemas de Informacao

2015 | conference-paper

A catalog of information systems outsourcing risks

International Journal of Information Systems and Project Management

2014 | journal-article

Assessment frequency in introductory computer programming disciplines

Computers in Human Behavior

2014 | journal-article

Information systems security management key issues in local government

ACM International Conference Proceeding Series

2014 | conference-paper

Information systems security policies adoption: An institutional theory view

Proceedings of the 7th IADIS International Conference Information Systems 2014, IS 2014

2014 | conference-paper

Towards a theory of information systems outsourcing risk

Centeris 2014 - Conference on Enterprise Information Systems / Projman 2014 - International Conference on Project Management / Hcist 2014 - International Conference on Health and Social Care Information Systems and Technologies

2014 | book-chapter

Applying Action Research in the Adoption of Information Systems Security Policies

Proceedings of the 12th European Conference on Research Methodology For Business and Management Studies

2013 | journal-article

Key issues in information systems security management

International Conference on Information Systems (ICIS 2013): Reshaping Society Through Information Systems Design

2013 | conference-paper

Secure outsourcing: An investigation of the fit between clients and providers

IFIP Advances in Information and Communication Technology

2013 | book

Information security policies: A content analysis

Proceedings - Pacific Asia Conference on Information Systems, PACIS 2012

2012 | conference-paper

Information systems security outsourcing key issues: A service providers' perspective

ECIS 2012 - Proceedings of the 20th European Conference on Information Systems

2012 | conference-paper

Trust in e-voting systems: A case study

Lecture Notes in Business Information Processing

2012 | book

Computer programming: Fail fast to learn sooner

Communications in Computer and Information Science

2010 | book

Information Systems Security Policies: A survey in Portuguese Public Administration

Proceedings of the IADIS International Conference Information Systems 2010

2010 | conference-paper