A pesquisa-ação é um método qualitativo que pode ser aplicado na engenharia de produção para gerar conhecimento científico e resolver problemas funcionais. O presente estudo tem como objetivo analisar o método e sua aplicação na engenharia de produção no setor industrial por meio de uma pesquisa exploratória. Para o desenvolvimento da pesquisa, foi realizada uma revisão da literatura. Especialistas com experiência na aplicação do método foram consultados por meio de uma survey e de entrevistas para identificar os principais fundamentos metodológicos da pesquisa-ação, suas etapas e técnicas para sua condução na engenharia de produção. Os resultados alcançados permitem observar que a aplicação da pesquisa-ação no setor industrial abrange diversas áreas de concentração, tais como, transformação digital, indústria 4.0 e gestão das operações. As etapas “planejar a pesquisa-ação” e “analisar dados e planejar ações” requerem maior tempo e esforço para condução da pesquisa-ação e, para devida condução do método, o pesquisador deve desenvolver e criar um relacionamento de confiança com os participantes que farão parte da pesquisa.
With the advent of legislation and regulations in privacy and data protection, risk management provides information for organizations to plan actions and strategies in information security and cybersecurity. Thus, the use of international standards and references are utilized for the definition of programs and internal projects. This study aims to identify the motivations and goals for adoption of the ISO 27005 standard in organizations in productive systems. For the development of the research, a systematic literature review with the adoption of a protocol based on the PRISMA-P was conducted. The results achieved suggests that organizations seek to adopt ISO 27005 to attend functional and institutional motivations aiming to improve processes related to information security management, risk management, risk assessment, improve information security management and meet laws, regulations and stakeholders.
Information security is a topic that has been increasingly discussed nowadays after the beginning of the pandemic and its understanding has been fundamental to protect information in several organizations. The present study aims to identify and analyze the application of threat modeling in digital transformation from the perspective of information security risks. For the development of the research, a systematic review of the literature was conducted with the adoption of a protocol based on PRISMA-P to identify which threat modeling techniques have been applied in digital transformation and which information security risk approaches are used in the application of the threat modeling. The result of this study suggests that threat modeling applied in digital transformation uses customized models by means of unspecified techniques and that qualitative risk approaches have been adopted more frequently in digital transformation.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.