


default search action
Thiago Poleto
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j9]Thiago Poleto
, Thyago Celso Cavalcante Nepomuceno
, Victor Diogho Heuer de Carvalho
, Ligiane Cristina Braga de Oliveira Friaes
, Rodrigo Cleiton Paiva de Oliveira, Ciro José Jardim de Figueiredo
:
Information Security Applications in Smart Cities: A Bibliometric Analysis of Emerging Research. Future Internet 15(12): 393 (2023) - [j8]Thalles André Cabral Silva, Victor Diogho Heuer de Carvalho
, Robério José Rogério dos Santos
, Thiago Poleto
, Thyago Celso Cavalcante Nepomuceno
:
Elicitation of Key Factors to Support Information Technology Outsourcing in Technological Innovation Hubs: Applying a Multicriteria Analytical Framework. Inf. 14(3): 169 (2023) - 2021
- [j7]Thiago Poleto
, Maisa Mendonça Silva, Thárcylla Rebecca Negreiros Clemente, Ana Paula Henriques de Gusmão
, Ana Paula de Barros Araújo, Ana Paula Cabral Seixas Costa:
A Risk Assessment Framework Proposal Based on Bow-Tie Analysis for Medical Image Diagnosis Sharing within Telemedicine. Sensors 21(7): 2426 (2021) - [c9]Thiago Poleto, Thyago Celso Cavalcante Nepomuceno
, Victor Diogho Heuer de Carvalho
, Ana Paula Cabral Seixas Costa:
A Typology of Relational Attitude in IT Outsourcing: An Analysis on the Contractor's Perspective. WorldCIST (3) 2021: 295-304 - 2020
- [j6]Maisa Mendonça Silva
, Thiago Poleto
, Ana Paula Henriques de Gusmão
, Ana Paula Cabral Seixas Costa:
A strategic conflict analysis in IT outsourcing using the graph model for conflict resolution. J. Enterp. Inf. Manag. 33(6): 1581-1598 (2020) - [c8]Thiago Poleto, Rodrigo Cleiton Paiva de Oliveira, Ayara Letícia Bentes da Silva, Victor Diogho Heuer de Carvalho
:
Using Fuzzy Cognitive Map Approach for Assessing Cybersecurity for Telehealth Scenario. WorldCIST (2) 2020: 828-837
2010 – 2019
- 2018
- [j5]Victor Diogho Heuer de Carvalho
, Thiago Poleto
, Ana Paula Cabral Seixas Costa:
Information technology outsourcing relationship integration: a critical success factors study based on ranking problems (P.γ) and correlation analysis. Expert Syst. J. Knowl. Eng. 35(1) (2018) - [j4]Ana Paula Henriques de Gusmao
, Maisa Mendonça Silva
, Thiago Poleto
, Lúcio Câmara e Silva, Ana Paula Cabral Seixas Costa
:
Cybersecurity risk analysis model using fault tree analysis and fuzzy decision theory. Int. J. Inf. Manag. 43: 248-260 (2018) - 2017
- [j3]Thiago Poleto
, Victor Diogho Heuer de Carvalho
, Ana Paula Cabral Seixas Costa
:
The Full Knowledge of Big Data in the Integration of Inter-Organizational Information: An Approach Focused on Decision Making. Int. J. Decis. Support Syst. Technol. 9(1): 16-31 (2017) - [c7]Maisa Mendonça Silva, Ana Paula Henriques de Gusmao
, Thiago Poleto, Ana Paula C. S. Costa
:
A nominal classification method using minimum profiles to classify IT service contractors. SMC 2017: 3329-3333 - 2016
- [j2]Ana Paula Henriques de Gusmao
, Lúcio Câmara e Silva, Maisa Mendonça Silva
, Thiago Poleto
, Ana Paula Cabral Seixas Costa
:
Information security risk analysis model using fuzzy decision theory. Int. J. Inf. Manag. 36(1): 25-34 (2016) - [c6]Victor Diogho Heuer de Carvalho
, Thiago Poleto
, Ana Paula Cabral Seixas Costa
:
The Main Critical Success Factors of Contractual and Relational Governances in Outsourcing Relationships. WorldCIST (1) 2016: 3-12 - 2015
- [c5]Thiago Poleto
, Victor Diogho Heuer de Carvalho
, Ana Paula Cabral Seixas Costa
:
The Roles of Big Data in the Decision-Support Process: An Empirical Investigation. ICDSST 2015: 10-21 - [c4]Lúcio Câmara e Silva, Ana Paula Henriques de Gusmao
, Maisa Mendonça Silva, Thiago Poleto
, Ana Paula Cabral Seixas Costa
:
Analysis of IT Outsourcing Services Failures Based on an Existing Risk Model. SMC 2015: 286-290 - 2014
- [j1]Maisa Mendonça Silva
, Ana Paula Henriques de Gusmao
, Thiago Poleto
, Lúcio Câmara e Silva, Ana Paula Cabral Seixas Costa
:
A multidimensional approach to information security risk management using FMEA and fuzzy theory. Int. J. Inf. Manag. 34(6): 733-740 (2014) - [c3]Lúcio Câmara e Silva, Thiago Poleto
, Victor Diogho Heuer de Carvalho
, Ana Paula Cabral Seixas Costa
:
Selection of a Business Process Management system: An analysis based on a Multicriteria problem. SMC 2014: 295-299 - 2013
- [c2]Lúcio Câmara e Silva, Thiago Poleto
, Jadielson Alves de Moura, Suzana de França Dantas Daher
, Ana Paula C. S. Costa
:
Group Decision Approach to Adopt Green IT Practices Based on S.W.O.T Analysis. SMC 2013: 747-751 - 2012
- [c1]Lúcio Câmara e Silva, Thiago Poleto, Jadielson Alves de Moura, Ana Paula C. S. Costa:
An Analysis of and Perspective on the Information Security Maturity Model: a case study of a Public and a Private Sector Company. AMCIS 2012
Coauthor Index
aka: Ana Paula C. S. Costa

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 22:12 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint