1,725 results on '"ciberseguridad"'
Search Results
2. FORENSE DIGITAL APLICADA AO COMBATE DE CRIMES CIBERNÉTICOS: UMA REVISÃO.
- Author
-
Lima de Andrade, Ingrid
- Subjects
DIGITAL forensics ,DATA security failures ,COMPUTER crimes ,ARTIFICIAL intelligence ,EDUCATIONAL finance - Abstract
Copyright of Revista Foco (Interdisciplinary Studies Journal) is the property of Revista Foco and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
3. La ciberdelincuencia y la protección de datos personales.
- Author
-
Bazurto Mecias, Carlos Javier, Jurado Cabello, Yulexi Katherine, Sifa Mueses, Luz Maria, and Reinoso Paredes, Alejandra Gabriela
- Subjects
- *
DATA protection , *DIGITAL technology , *COMPUTER engineering , *ARTIFICIAL intelligence , *TELECOMMUNICATION , *BLOCKCHAINS , *CRYPTOCURRENCIES - Abstract
In the digital age, information has become a highly valuable asset, attracting not only individuals and companies but also criminals seeking to exploit it for illicit purposes. Cybercrime, defined as any criminal activity involving the use of computer technology and communication networks, has experienced exponential growth in recent years. This article explores the protection of personal data in the context of cybercrime, focusing on Ecuador's legal framework established by the 2008 Constitution and the 2021 Organic Law on Personal Data Protection. The article provides a comprehensive analysis of various forms of cybercrime, such as unauthorized access, computer fraud, and the distribution of illegal content, examining their impact on data privacy and security. It also addresses the challenges faced by authorities in enforcing laws due to encryption and data anonymization, as well as the use of blockchain and cryptocurrencies in illicit activities. The increasing incidence of cybercrime in Ecuador, exemplified by the Ola Bini case, is discussed alongside the role of artificial intelligence and Big Data in privacy concerns. The article concludes by highlighting necessary cybersecurity strategies in the financial sector to protect sensitive data and ensure economic stability. [ABSTRACT FROM AUTHOR]
- Published
- 2024
4. La ciberseguridad necesita mujeres y las mujeres necesitan ciberseguridad.
- Author
-
Molina Gil, Jezabel and Caballero-Gil, Pino
- Subjects
DIGITAL technology ,GENDER-based violence ,WOMEN'S wages ,INCOME inequality ,SATISFACTION - Abstract
Copyright of Revista Iberoamericana de Ciencia, Tecnologia y Sociedad is the property of Centro de Estudios sobre Ciencia, Desarrollo y Educacion Superior and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
5. THE ROLE OF INTERNAL AUDITORS CHARACTERISTICS IN CYBERSECURITY RISK ASSESSMENT IN FINANCIAL-BASED BUSINESS ORGANISATIONS: A CONCEPTUAL REVIEW.
- Author
-
Usman, Alih, Che-Ahmad, Ayoib, and Abdulmalik, Salau Olarinoye
- Subjects
INTERNAL auditors ,INTERNET security ,LITERATURE reviews ,FINANCIAL services industry ,PLANNED behavior theory ,PROFESSIONAL ethics ,INTERNAL auditing ,PERSONALITY - Abstract
Copyright of Environmental & Social Management Journal / Revista de Gestão Social e Ambiental is the property of Environmental & Social Management Journal and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
6. ÉTICA(S) DE LA INTELIGENCIA ARTIFICIAL Y DERECHO CONSIDERACIONES A PROPÓSITO DE LOS LÍMITES Y LA CONTENCIÓN DEL DESARROLLO TECNOLÓGICO.
- Author
-
LLANO ALONSO, FERNANDO H.
- Subjects
- *
DIGNITY , *APPLIED ethics , *TRUST , *SOCIAL services , *METAETHICS , *ARTIFICIAL intelligence - Abstract
This paper focuses on the ethics of AI and the principles behind it. Prior to the rules governing AI, it is necessary to understand the ethical issues related to the development, implementation and responsible use of AI systems. These ethical foundations are necessary to protect the rights and dignity of individuals, ensure fairness in data access and processing, minimise biases and risks associated with algorithms, promote transferability in automated decisions, and promote trustworthiness in technology, human benefit and social welfare. It is also proposed to study the ethics of AI from an all-encompassing point of view that integrates both applied ethics and metaethics of AI. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
7. La regulación de las criptomonedas en México y sus principales desafíos jurídicos internacionales.
- Author
-
TIRADO GÁLVEZ, Reyna Araceli
- Subjects
ELECTRONIC money ,INTERNATIONAL finance ,COVID-19 pandemic ,TAX evasion ,MONEY laundering ,PERSONALLY identifiable information - Abstract
Copyright of AIS: Ars Iuris Salmanticensis is the property of Ediciones Universidad de Salamanca and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
8. Bridging the Digital Gap: Teaching Cyber Strategy and Policy through a Crisis Simulation.
- Author
-
Winger, Gregory, Ellis, Stephanie, and Glover, Daniel
- Subjects
- *
ACTIVE learning , *POLITICAL science education , *INFORMATION technology , *DIGITAL forensics , *SOCIAL conflict , *POLITICAL science - Abstract
This article details an attempt to bridge the gulf between information technology (IT) and social science approaches to cybersecurity using a simulation. Digital affairs are increasingly central to public policy, and yet the subject's incorporation within political science education has been hamstrung by an underlying disciplinary divide and lack of familiarity. Despite their differences, both IT and political science have strong traditions of utilizing active learning methods and simulation to achieve learning outcomes. Drawing on this shared pedagogy, we created an interdisciplinary simulation that leverages elements of digital forensics to provide students with a unique, active learning experience of responding to a national cybersecurity crisis. The simulation was fielded during an intermediate level class on cyber conflict and generated an overwhelmingly positive response. Students credited the exercise with helping them better understand the unique characteristics of cyberspace as a geopolitical domain and appreciated how the lack of an IT background was not a barrier to addressing cyber policy issues. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
9. Institucionalidad regional frente a la Cuarta Revolución Industrial: transición hacia una gobernanza digital.
- Author
-
Alfaro Umaña, Gabriela Eunice and Turcio Alvarenga, Marjorie Berenice
- Abstract
Copyright of Revista de Fomento Social is the property of ETEA and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
10. LOS PROBLEMAS SURGIDOS TRAS EL GRAVE CONFLICTO ISRAELO-PALESTINO EN GAZA A RAÍZ DE LOS ATAQUES DE HAMÁS DEL 7 DE OCTUBRE DE 2023.
- Author
-
Bermejo, Romualdo and Ordoñez, Natalia
- Abstract
Copyright of Revista UNISCI is the property of Unidad de Investigaciones Sobre Seguridad y Cooperacion International (UNISCI) and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
11. Seguridad de la información en instituciones públicas: desafíos y buenas prácticas en el contexto ecuatoriano.
- Author
-
Armando Ávila-Coello, Alex
- Subjects
- *
TECHNOLOGICAL innovations , *INFORMATION technology security , *DATA protection , *CORPORATE culture , *TRUST - Abstract
This study addresses the growing need to strengthen information security strategies in Ecuador's public institutions, emphasizing the critical role of data protection in the context of digitization. Through a systematic literature review, current security practices, cybersecurity maturity, training programs, and adoption of emerging technologies are examined. The findings reveal significant challenges in the effective implementation of security policies, highlighting the gap between the formulation of regulatory frameworks and their practical application, along with limitations in resources and training. In addition, the importance of fostering an organizational culture of cybersecurity and the need to advance digitization are identified as key elements for improving institutional resilience. The research suggests that the effectiveness of cybersecurity training programs depends on their customization and the inclusion of practical elements. Finally, it is concluded that it is essential to improve the clarity and effectiveness of information security legislation to strengthen trust in public institutions and ensure robust data protection in Ecuador. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
12. Ciberseguridad en educación superior: una revisión bibliométrica
- Author
-
Jhon Richard Orosco-Fabian
- Subjects
Ciberseguridad ,Seguridad digital ,Seguridad de la información ,Privacidad ,Educación superior ,Education ,Special aspects of education ,LC8-6691 - Abstract
Introducción: Las TIC han impactado en todos los sectores de la sociedad, sobre todo en educación superior, donde el estudiantado se forma para la inserción al mercado laboral, pero que será mediado por estas tecnologías y a la vez expuestos a aspectos de ciberseguridad. Objetivo: El objetivo del estudio fue analizar la producción científica sobre ciberseguridad en educación superior mediante métodos bibliométricos. Método: En el estudio se utilizó la bibliometría. El diseño de investigación fue no experimental de tipo longitudinal en la ruta cuantitativa y hermenéutico interpretativo en la ruta cualitativa. Para el análisis y presentación de datos se usó Datawrapper, VOSviewer y Bibliometrix. Resultados: Los resultados revelan que la ciberseguridad en educación superior es un campo en expansión desde 2003, con crecimiento exponencial desde 2018, liderado por autores de Finlandia, Arabia Saudita y Estados Unidos, en revistas especializadas como IEEE Security and Privacy. Discusión: El mapeo científico identificó a la ciberseguridad, ciberamenazas, conciencia en ciberseguridad, violación de la ciberseguridad, seguridad de la información y Reglamento General de Protección de Datos (GDPR) como temas centrales, revelando el énfasis en estudiar la educación en ciberseguridad. Se evidencia un campo fértil de estudio en cuanto a la ciberseguridad en la educación superior
- Published
- 2024
- Full Text
- View/download PDF
13. Cooperación internacional policial ante amenazas cibernéticas en Colombia: Modalidad Business Email Compromise
- Author
-
Luis Evelio Castillo Pulido and Juan Felipe Jiménez Acosta
- Subjects
compromiso de correo empresarial (bec) ,ciberseguridad ,cooperación internacional ,ciberdelincuencia ,amenazas cibernéticas ,History of scholarship and learning. The humanities ,AZ20-999 ,Science (General) ,Q1-390 ,Social sciences (General) ,H1-99 - Abstract
Esta investigación tiene como objetivo identificar un modelo de cooperación policial internacional aplicable a las diferentes manifestaciones de las amenazas cibernéticas en Colombia: robo por medios informáticos, a través de la industria Business Email Compromise (BEC). Se ha seguido un enfoque interpretativo, que permite entender el panorama cibernético desde la perspectiva de especialistas académicos, considerando sus creencias y actitudes. Además, se adoptó una metodología mixta que integra enfoques cualitativos y cuantitativos, lo que facilita la triangulación de datos provenientes tanto del trabajo de campo, como de análisis teóricos y descriptivos. Los hallazgos clave sugieren que un patrón BEC internacional está relacionado con facturas falsas, bienes raíces y fraude de directores ejecutivos, así como compromisos de correo electrónico doméstico. Los actores más afectados son los organismos multilaterales, las empresas privadas y públicas, respectivamente; se ha relacionado con el tráfico de armas, la trata de personas, la explotación sexual, el tráfico de drogas y el tráfico de órganos.
- Published
- 2024
- Full Text
- View/download PDF
14. Analysis and classification of spam email using Artificial Intelligence to identify cyberthreats.
- Author
-
Martino, Francisco Jáñez
- Subjects
ARTIFICIAL intelligence ,SPAM email ,NATURAL language processing ,CLASSIFICATION - Abstract
Copyright of Procesamiento del Lenguaje Natural is the property of Sociedad Espanola para el Procesamiento del Lenguaje Natural and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
15. From Shadows to Governance: Understanding the Darkweb Parliament.
- Author
-
Slonopas, Andre, Rutherford, Adam, Averbeck, Ryan, Beatty, Adam, and Cooper, Harry
- Subjects
CRYPTOMARKETS ,INTERNET security ,DECENTRALIZATION in government ,MODERATION ,DEMOCRACY - Abstract
Copyright of Global Security & Intelligence Studies is the property of Policy Studies Organization and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
16. Charting Digital Domain: The U.S.’s Evolving Approach to Cyberspace and Critical Infrastructure.
- Author
-
Waddell, Scott, Wooten, Kenneth, Burch, James, Kritz, David, and Slonopas, Andre
- Subjects
CYBERSPACE ,TECHNOLOGICAL innovations ,CIVIL defense ,NATIONAL security ,INTERNET security - Abstract
Copyright of Global Security & Intelligence Studies is the property of Policy Studies Organization and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
17. Rezago y asimetrías de las política nacional e internacional de ciberseguridad de México frente a Estados Unidos y Canadá: retos de cooperación para Norteamérica.
- Author
-
Aguilar Antonio, Juan Manuel
- Subjects
- *
POLITICAL realism , *GREAT powers (International relations) , *INTERNATIONAL relations theory , *WAR , *INTERNATIONAL relations , *CYBERTERRORISM - Abstract
The research analyzes the national and international cybersecurity policies of the United States, Mexico, and Canada. It starts from the hypothesis that the active foreign policy profile with regional and international impact, and the individual historical trajectory of more than two decades of the United States and Canada, explain the level of consolidation in the development of their cybersecurity policy. An eclectic review of international relations theories such as realism, liberalism, constructivism, and the theory of war was conducted to identify theoretical elements for the analysis of the international and national policies of the three countries. It is concluded that both the United States, considered a global power in cybersecurity, and Canada, a regional power, have an active foreign policy in the field, with a trajectory of almost two decades. Meanwhile, Mexico has a significant lag in the field that is not related to an effective national and international cybersecurity policy. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
18. Estrategia de comunicaciones de seguridad de la información como requisito previo para contrarrestar la guerra híbrida: experiencia mundial.
- Author
-
Nussipova, Arailym, Khussainova, Gulzhan, Kabilova, Raushangul, Aliyarov, Esenzhol, and Nuralina, Botakoz
- Subjects
- *
INFORMATION technology security , *COMMUNICATION strategies , *INFORMATION warfare , *INTERNET security , *STRATEGIC communication , *COMPARATIVE studies - Abstract
Introduction: The relevance of the study is underscored in response to the need for innovative tools to counter hybrid threats in the field of information security. Methodology: The study's methodological approach is described, highlighting the application of methods such as analysis, systematization, and comparison. The use of these methods is emphasized in conducting a comprehensive comparative analysis of information security strategies in Ukraine, Kazakhstan, and the European Union. Results: It is emphasized that the study's results provide a detailed insight into the current state of information security in the analyzed countries. It is specifically mentioned that recommendations for the development of information security communication strategies are a tangible outcome of the research. Conclusions: The conclusion highlights the importance of developing or enhancing information security communication strategies in the countries under study. It is suggested that these strategies can serve as an effective countermeasure against hybrid warfare and enemy attacks, thereby strengthening cybersecurity and responsiveness. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
19. Framework for modeling and simulation of maritime cyberdefense - MARCIM: state of the art and methodology.
- Author
-
Edison Cabuya-Padilla, Diego and Castaneda-Marroquin, Carlos Alfonso
- Subjects
- *
INTERNET security , *CYBERNETICS , *SIMULATION methods & models , *METAHEURISTIC algorithms , *RESEARCH methodology - Abstract
The article presents the state of the art and methodology of the doctoral research project "Framework for modeling and simulation of maritime cyberdefense - MARCIM". The state of the art defined the background of the research problem, the state of scientific activity, trends and challenges related to MARCIM: cyberdefense, modeling and simulation in cyber security and cyberdefense; and maritime cybersecurity and cyberdefense. The methodology was established with a focus on modeling complex systems, by phases and application actors. The article mainly concludes that maritime cyberdefense at a strategic level behaves like a complex system, with dynamics, processes and elements that cannot be clearly identified, which require modeling and simulation, with a metaheuristic approach, to study the set of actions and interactions between its entities. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
20. Cybersecurity, cyberspace and cyberthreats at the beginning of the 21st century: a Latin America typology and review.
- Author
-
Kosevich, Ekaterina
- Subjects
- *
CYBERTERRORISM , *CYBERSPACE , *INTERNET security , *INFORMATION & communication technologies , *TWENTY-first century , *INFORMATION technology - Abstract
Concepts of ‘cyberspace’, ‘cybersecurity’ and ‘cyberthreats’ and an analysis of policy documents are employed to explore the character and evolution of cybersecurity policies in Mexico, Colombia and the Dominican Republic, chosen as examples of ‘accelerated’, ‘transitional’ and ‘lagging’ Latin American development. Mexico focused on the stability of the Internet as a space that contributes to faster economic growth. Columbia’s ‘risk management’ path seeks a balance between plausible threat evaluation and the estimated cost of eliminating them and concentrates on the active prevention of cyberattacks, emphasising the importance of developing concrete mechanisms for international regulation in the field of cybersecurity. The approach to cybersecurity of the Dominican Republic is based on the idea of ensuring a rapid transition to an innovative development model with the widespread introduction of information and communication technology (ICT), while addressing domestic cybercrime to which ordinary citizens and businesses are constantly exposed to. Comparing these experiences, it is clear that these approaches are characterised by two trends: randomness and non-imitation. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
21. Cooperación internacional policial ante amenazas cibernéticas en Colombia: Modalidad Business Email Compromise.
- Author
-
Castillo Pulido, Luis Evelio and Jiménez Acosta, Juan Felipe
- Subjects
- *
DRUG traffic , *SEX crimes , *CYBERTERRORISM , *FRAUD , *INTERNATIONAL cooperation , *HUMAN trafficking , *CYBERBULLYING - Abstract
The objective of this research was to identify a model of international police cooperation applicable to the different manifestations of cyber threats in Colombia: theft by means of computer, through the Business Email Compromise (BEC) industry; its development has been achieved through an interpretive research model that provides an understanding of beliefs and attitudes that make it possible to comprehend the world from the perspective of academic experts; additionally, a mixed approach through which synergies are established and qualitative and quantitative methodologies are complemented; research methods that simultaneously allow for the triangulation of information obtained from field work and theoretical and descriptive/phenomenological studies; Key findings suggest that an international BEC pattern is linked to false invoices, real estate and CEO fraud, as well as domestic email compromises. the most affected actors are multilateral organisations, private and public companies, respectively; It has been linked to arms trafficking, human trafficking, sexual exploitation, drug trafficking, and organ trafficking. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
22. SISTEMAS DE INFORMACIÓN DE ADMINISTRACIÓN FINANCIERA (SIAF) EN LA GOBERNANZA PÚBLICA INTELIGENTE: UNA EXPLORACIÓN DEL CASO COLOMBIANO.
- Author
-
OSPINA DÍAZ, MILTON RICARDO, VERA OSORIO, SANDRA PATRICIA, and ZAMBRANO OSPINA, KELLY JOHANNA
- Subjects
- *
INFORMATION storage & retrieval systems , *MANAGEMENT information systems , *INFORMATION resources management , *MARKETING , *INTERNET security , *WEBSITES , *INFORMATION & communication technologies , *PUBLIC finance - Abstract
Financial Management Information Systems (FMIS) are essential for efficient and transparent management of financial resources in the public sector. Due to the scarcity of publications on this topic in Colombia, this article aims to provide a contribution to academia and professionals who work in public finance by examining the importance of systems such as SIIF, CHIP, SIRECI, ÉPICO, SIA Observa, the DNP Investment Map, and the new PIIP platform, among others. Topics such as Smart Public Management (SPM), digital government, the fight against corruption, interoperability, cybersecurity, artificial intelligence (AI) and public marketing are also addressed. The research used an interpretative perspective, based on a theoretical, documentary, descriptive and purposeful type. It also used a qualitative and quantitative approach, which included the application ofa survey as an instrument of data collection. At the end of the article, the challenge of improving the interoperability and security of FMIS in the Colombian State is raised, highlighting the importance of training officials in information and communication technologies (ICT), as well as promoting websites and platforms related to state public finances to strengthen transparency and encourage citizen participation. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
23. Ciberseguridad en servicios de apoyo al médico ocupacional de la ciudad de Lima. Estudio piloto.
- Author
-
Gomero-Cuadra, Raúl and Sánchez-Calle, David
- Subjects
- *
DATA security , *COMPUTER software , *DATA security failures , *PILOT projects , *QUESTIONNAIRES , *DESCRIPTIVE statistics , *OCCUPATIONAL medicine , *PHYSICIANS , *HEALTH care industry , *INDUSTRIAL hygiene - Abstract
Recent investigations emphasize the importance of cybersecurity in the growing digital era; 83% of organizations experienced breaks in cyber security in 2022, spending a mean of 4,35 million dollars per incident. Cybersecurity in Peru is regulated by legal norms aimed at protecting data and providing informatic security. Objective: To describe cybersecurity in the support services to occupational physicians (SSOP) in the city of Lima. Methods: A non-validated survey was created and distributed to 11 SSOPs in Lima that provide a service to an important building project in Lima. Results: More than 80% of health care establishments had a response plan against cybernetic attacks; security copies of the data were done regularly storing them in a different place than the establishment and regularly updated security software's. Conclusion: The cybersecurity program is reactive. We discuss the importance of cybersecurity and analyze future challenges as well as emphasize the importance of preemptive preparedness in an environment of constant digital transformation. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
24. THE GLOBAL TERRORIST THREAT FORESCAST IN 2024.
- Author
-
Liu Chunlin and Gunaratna, Rohan
- Subjects
DEATH rate ,ARAB-Israeli conflict ,TERRORISTS ,INTERNET security - Abstract
Copyright of Revista UNISCI is the property of Unidad de Investigaciones Sobre Seguridad y Cooperacion International (UNISCI) and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
25. Política y Estrategias de la Seguridad Cibernética, un estudio de caso múltiple: Argentina, Perú y Brasil.
- Author
-
Huamani Cuba, Arthur Christian and Aparecida Moura, Maria
- Subjects
ELECTRONIC records ,INFORMATION technology security ,INFORMATION science ,INTERNET security ,CONTENT analysis - Abstract
Copyright of Revista Ibero-Americana de Ciência da Informação is the property of Revista Ibero-Americana de Ciencia da Informacao and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
26. Análisis de la ciberseguridad en espacios educativos pertenecientes a la Fuerza Aeroespacial Colombiana.
- Author
-
Castillo García, Jaquelin
- Abstract
Copyright of Revista Ciencia y Poder Aéreo is the property of Escuela de Postgrados de la Fuerza Aerea Colombiana and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
27. Ciberseguridad y desarrollo de habilidades digitales: propuesta de alfabetización digital en edades tempranas
- Author
-
Olda Bustillos Ortega, Javier Rojas Segura, and Jorge Murillo Gamboa
- Subjects
ciberseguridad ,niñez ,alfabetización ,academia ,cibernética ,Systems engineering ,TA168 - Abstract
Los niños son el segmento más vulnerable de esta sociedad ciberfísica, pudiendo ser fácilmente explotados por su bajo nivel de percepción del riesgo cibernético. Iniciar la educación y el desarrollo de habilidades digitales en edades tempranas incentiva a esta población a seguir en el futuro carreras profesionales como ciberseguridad, aportando de manera sostenible a cerrar la brecha de la fuerza laboral en este campo. Mediante un enfoque cualitativo, se realizó una revisión documental, una revisión de la literatura y una consulta a expertos académicos, para proponer un programa de alfabetización digital en edades tempranas. A manera de caso de estudio se presenta el Programa de Alfabetización Digital de la Universidad Internacional de las Américas de Costa Rica y las experiencias con el Taller de Ciberseguridad para Niños, dirigido hacia el desarrollo de habilidades digitales, el bienestar cibernético en edades tempranas y el interés de los niños en seguir nuevas carreras profesionales. Se propone reducir la brecha de la fuerza laboral en puestos sobre ciberseguridad a través de programas de formación en edades tempranas, que concienticen sobre los riesgos en seguridad cibernética, su evolución, su impacto en la sociedad y destaquen su importancia en un mundo cada vez más dominado por la tecnología.
- Published
- 2023
- Full Text
- View/download PDF
28. Análisis estadístico neutrosófico sobre ciberriesgos de los estudiantes universitarios basado en la utilización de redes sociales.
- Author
-
Aguirre Paz, Luz Marina, Viscaino Naranjo, Fausto Alberto, and Bustillos Mallitasig, Angela Karina
- Abstract
Copyright of Neutrosophic Computing & Machine Learning is the property of Multimedia Larga and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2023
29. THE ROLE OF INTERNAL AUDITORS CHARACTERISTICS IN CYBERSECURITY RISK ASSESSMENT IN FINANCIAL-BASED BUSINESS ORGANISATIONS: A CONCEPTUAL REVIEW.
- Author
-
Usman, Alih, Che-Ahmad, Ayoib, and Abdulmalik, Salau Olarinoye
- Subjects
INTERNET security laws ,INTERNAL auditors ,WHISTLEBLOWING ,INTERNET security ,COMPUTER security ,RISK assessment ,INFORMATION technology security - Published
- 2023
- Full Text
- View/download PDF
30. THE ROLE OF INFORMATION TECHNOLOGY GOVERNANCE ON ENHANCING CYBERSECURITY AND ITS REFLECTION ON INVESTOR CONFIDENCE.
- Author
-
Shaker, Ameer Saheb, Al-Shiblawi, Ghazwan Ayad Khalid, Union, Ali Hilal, and Hameed, Karrar Saleem
- Subjects
INFORMATION technology ,INVESTOR confidence ,INTERNET security laws ,INFORMATION resources management ,INFORMATION technology security ,INFORMATION technology management - Abstract
This article examines the relationship between information technology governance, cybersecurity, and investor confidence. The study concludes that while cybersecurity does affect investor confidence, information technology governance does not have a significant impact on either cybersecurity or investor confidence. The research suggests that financial reports should include information technology governance dimensions, particularly for telecommunications firms and private banks, to enhance investor confidence. The article also emphasizes the need for transparency and interest in information technology governance in the financial reports of banks and telecommunications companies. Overall, the article provides insights into the importance of cybersecurity and information technology governance in organizations for long-term success and protection against cyber threats. [Extracted from the article]
- Published
- 2023
- Full Text
- View/download PDF
31. GOVERNANÇA DA SEGURANÇA CIBERNÉTICA E OS DESAFIOS DO SÉCULO XXI: A RELAÇÃO CIVIS-MILITARES NO SECTOR CIBERNÉTICO DO BRASIL.
- Author
-
Lopes da Silva Gomes, Nilton and Mendes Laginestra, Abian
- Subjects
INTERNET security ,CYBERTERRORISM ,CIVIL society ,SECONDARY analysis - Abstract
Copyright of Revista Foco (Interdisciplinary Studies Journal) is the property of Revista Foco and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2023
- Full Text
- View/download PDF
32. La inmunización de la red: la inteligencia artificial basada en Python como bloqueo contra los ciberataques.
- Author
-
Guerrero Panchana, Johnny Fernando and Romero Ibarra, José Luis
- Subjects
- *
ARTIFICIAL intelligence , *COMPUTER networks , *COMPUTER network traffic , *COMPUTER security , *COMPUTER systems - Abstract
In an increasingly technology-dependent world, cybersecurity has become a critical concern. Cyberattacks, such as data theft and malware, can have devastating consequences for businesses, governments, and individuals. In this context, artificial intelligence (AI) emerges as a powerful tool to safeguard networks and computer systems. Network immunization leverages machine learning and real-time data analysis to identify patterns and anomalies in network traffic. AI can detect unusual behaviors that may indicate an ongoing cyberattack or intrusion attempt. Furthermore, it can adapt and continuously learn from new threats, thereby maintaining a more secure network over time. However, the implementation of network immunization requires careful consideration due to ethical and privacy challenges, involving constant monitoring of online activities. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
33. Marco de referencia para el modelamiento y simulación de la ciberdefensa marítima - MARCIM: estado del arte y metodología
- Author
-
Diego Edison Cabuya-Padilla and Carlos Alfonso Castaneda-Marroquin
- Subjects
ciberdefensa ,cibernética ,ciberseguridad ,defensa ,informática ,marítimo ,modelo de simulación ,Technology ,Mining engineering. Metallurgy ,TN1-997 - Abstract
El artículo presenta el estado del arte y metodología del proyecto de investigación doctoral “Marco de referencia para el modelamiento y simulación de la ciberdefensa marítima – MARCIM”. El estado del arte definió los antecedentes del problema de investigación, estado de la actividad científica, tendencias y retos de las temáticas del MARCIM: ciberdefensa, modelamiento y simulación en ciberseguridad y ciberdefensa; y ciberseguridad y ciberdefensa marítima. La metodología se planteó con un enfoque en modelamiento de sistemas complejos, por fases y actores de aplicación. El artículo concluye principalmente que la ciberdefensa marítima a nivel estratégico se comporta como un sistema complejo, con dinámicas, procesos y elementos que no se pueden identificar claramente, que requieren del modelamiento y simulación, con un enfoque metaheurístico, para estudiar el conjunto de acciones e interacciones entre sus entidades.
- Published
- 2024
- Full Text
- View/download PDF
34. Implicaciones y desafíos del ciberespacio para la aplicación del Derecho Internacional
- Author
-
Emilio Horacio Valencia Corozo
- Subjects
Ciberseguridad ,Privacidad ,Jurisdicción ,Derecho internacional ,Cooperación internacional ,International relations ,JZ2-6530 - Abstract
La aplicación del derecho internacional en el ciberespacio es un tema cada vez más relevante, debido al avance tecnológico y la creciente dependencia de la sociedad del mundo digital. El presente artículo busca analizar cómo se aplica el derecho internacional en este ámbito y determinar sus principales implicaciones en la esfera digital. Los hallazgos muestran que este es un tema complejo, en constante evolución, en el cual existen diferentes enfoques y perspectivas. Algunos defienden la necesidad de adaptar y actualizar el derecho internacional existente a las particularidades del ciberespacio, mientras que otros abogan por la creación de un marco legal específico para regular las actividades en línea. Se concluye que el derecho internacional tiene un papel fundamental a desempeñar en la regulación y la aplicación de normas en el ciberespacio, lo cual requiere además de una mayor cooperación y coordinación a nivel internacional.
- Published
- 2024
- Full Text
- View/download PDF
35. La necesidad de un marco normativo internacional jurídicamente vinculante para el ciberespacio. Apuntes sobre el debate en las Naciones Unidas
- Author
-
Yailin Castro Loredo
- Subjects
tecnologías de la información y las comunicaciones ,ciberseguridad ,ciberataque ,seguridad internacional ,relaciones internacionales ,multilateralismo ,International relations ,JZ2-6530 - Abstract
El desarrollo de las tecnologías de la información y las comunicaciones tiene un impacto cada vez mayor en todas las esferas de la sociedad y, por tanto, en el comportamiento y la seguridad de las naciones. Su cada vez más creciente uso para incitar la violencia, la subversión y desestabilización, la difusión de noticias falsas, y realizar ataques cibernéticos, ha favorecido la militarización del ciberespacio. Mientras los conflictos tradicionales en el medio terrestre cuentan con un marco legal aplicable desde el Derecho Internacional, el ciberespacio, aún no cuenta con un marco normativo internacional vinculante, lo que refuerza la necesidad de su elaboración. Ello ha hecho que el tema se convierta en una prioridad de política exterior de las principales potencias y un tema de debate y relevancia para la política internacional, en particular en el marco de las Naciones Unidas.
- Published
- 2024
- Full Text
- View/download PDF
36. Redes Sociales: Riesgos y desafíos para la comunidad académica de los colegios de la Policía
- Author
-
José Neftalí Villa Ramírez, Carlos Manuel Mesa Méndez, José Luis Garzón Santos, and Rut Urueña Sanabria
- Subjects
ciberespacio ,ciberseguridad ,redes sociales ,usos ,riesgos ,educación ,programas ,prevención ,normatividad ,History of scholarship and learning. The humanities ,AZ20-999 ,Science (General) ,Q1-390 ,Social sciences (General) ,H1-99 - Abstract
La utilización de redes sociales por los estudiantes de educación media de los colegios de la Policía Nacional en Bogotá, incluye, la identificación de posibles vacíos en temas de ciberseguridad, pese a programas y estrategias relacionadas con el uso responsable al navegar por el ciberespacio. Esta investigación se sustenta en el paradigma comprensivo- interpretativo (sociológico) con un enfoque mixto de preponderancia cualitativa. Se realizó una revisión documental, encuesta a estudiantes y entrevista en profundidad a padres de familia y docentes. Se agruparon los hallazgos en dos categorías; ciberseguridad y educación. Los resultados de la encuesta evidenciaron una hiper- conectividad por parte de los estudiantes; la interacción realizada a través de las redes sociales, especialmente mediante el intercambio de fotos, videos, compartir estados y hacer video llamadas. Los hallazgos de la entrevista expresan que, si bien cada establecimiento educativo es autónomo, no es claro entre padres de familia, cuidadores y docentes una ruta expresamente definida a seguir al momento de evidenciar peligros emergentes al uso evidenciado en redes sociales. También falta mayor corresponsabilidad al identificar ciertos tipos de conductas que atentan contra los estudiantes, dado que algunos padres consideran que es un tema del cual debe encargarse el colegio, mientras que los docentes discurren que es compromiso de los padres. En conclusión, se deja al descubierto, la necesidad de valorar el grado de aceptación, efectividad y alcance de estrategias desarrolladas por colegios y entes privados o gubernamentales, respecto a la sensibilización en temas de ciberseguridad y uso responsable al navegar en internet.
- Published
- 2023
- Full Text
- View/download PDF
37. Cómo promueven los Estados la ciberseguridad de las pymes
- Author
-
Olda Bustillos Ortega and Javier Rojas Segura
- Subjects
ciberseguridad ,pymes ,gobierno ,academia ,Systems engineering ,TA168 - Abstract
La tecnología ha producido cambios en la sociedad que han forjado la evolución de nuestra especie. Actualmente, la digitalización ha dado lugar al uso exponencial de tecnologías de la información y la comunicación, lo que ha generado un aumento en el riesgo de ciberataques que amenazan la cadena de suministros global. Los más afectados son las pequeñas y medianas empresas y su ecosistema, por la escasez de recursos para proteger la integridad, confidencialidad y disponibilidad de sus activos de información. Aumentar la concientización general en ciberseguridad eleva la inmunidad global a los ciberataques, por lo que el objetivo de este trabajo es investigar cómo los gobiernos de diversos países apoyan a la ciberseguridad de las pequeñas y medianas empresas, resaltando las mejores prácticas internacionales e identificando áreas de mejora en el desarrollo de capacidades para gobiernos, formuladores de políticas, expertos en seguridad cibernética y académicos. La ciberseguridad debe abordarse con un enfoque interdisciplinario y holístico, con aplicación multilateral, ya que las pequeñas y medianas empresas necesitan el apoyo del gobierno en la gestión del riesgo cibernético, en cooperación con la academia para construir una cultura de ciberseguridad.
- Published
- 2023
- Full Text
- View/download PDF
38. Toma de decisiones en la gestión de riesgos cibernéticos: una aproximación fenomenológico-hermenéutica
- Author
-
Horacio Manrique Tisnés, Claudia Claudia Palacio Henao, and Gloria Cristina Pabón Noreña
- Subjects
Ciberseguridad ,fenomenología-hermenéutica ,gestión de riesgos cibernéticos ,incertidumbre ,toma de decisiones ,Social Sciences ,Commerce ,HF1-6182 ,Business ,HF5001-6182 - Abstract
Los ciberataques aumentan y sus impactos son difíciles de estimar. El desconocimiento del tipo de riesgo genera alta complejidad y baja capacidad de predicción. En consecuencia, los gerentes toman de-cisiones basados en su experiencia e intuición en escenarios de incer-tidumbre. Esta investigación explora factores intervinientes en la gestión de riesgo cibernético (GRC) desde la perspectiva de los decisores, median-te diseño cualitativo y método fenomenológico-hermenéutico. Se entre-vistaron ocho directivos con amplia experiencia en el campo de la ciber-seguridad en organizaciones colombianas grandes. Como resultado del análisis, desde la experiencia de los entrevistados, se identificaron 191 unidades de sentido que se agruparon en 37 subcategorías, nueve categorías y dos supracategorías, que se integran en un esquema cualitativo, representando la toma de decisiones (TD) desde la perspectiva de decisores en ciberseguridad. Este esquema cualitativo es un aporte necesario, novedoso y original a la comprensión del proceso de TD en la gestión de las tecnologías de la información y la comunicación (TIC), pues permite conocer factores intervinientes en la TD para la GRC, desde la perspectiva de los decisores. Se encontró que, aunque la experiencia del decisor es muy importante, la madurez de la organización incide significativamente en la forma de gestión y toma decisiones. Finalmente, se señalan las limitaciones del estudio.
- Published
- 2023
- Full Text
- View/download PDF
39. Transparencia, ciberseguridad e identidad digital en el entorno 5G
- Author
-
Clara Rodríguez Ilarraz and Ricardo Javier Palomo Zurdo
- Subjects
ciberseguridad ,transparencia ,resiliencia ,identidad digital ,5G ,Political institutions and public administration (General) ,JF20-2112 ,Accounting. Bookkeeping ,HF5601-5689 - Abstract
El espíritu de la Directiva europea 2022/2555, conocida como NIS 2, en materia de ciberseguridad y del Real Decreto-ley 7/2022, de 29 de marzo, conocido como Ley de Ciberseguridad 5G, es que se promueva la creación e implementación de normas comunes, correspondientemente certificadas, en el ámbito de la ciberseguridad, en aras de favorecer la transparencia y la resiliencia del Mercado Único Digital Europeo. En este sentido, el sector de los prestadores de servicios de confianza, cuya normativa está siendo actualmente objeto de debate (denominada eIDAS 2), es el mejor ejemplo del uso de la estandarización en la que podría llamarse sociedad digital. En este trabajo se analiza la relación jurídica entre la ciberseguridad, la identidad digital y la transparencia, debido al nuevo escenario que implica la irrupción de la era de la Quinta Generación (TIC-5G) de telecomunicaciones y la convergencia de las tecnologías que la integran.
- Published
- 2023
- Full Text
- View/download PDF
40. La ciberhegemonía de EEUU en la OEA
- Author
-
Maximiliano Vila Seoane
- Subjects
ciberseguridad ,ciberhegemonía ,ciberdiplomacia ,cibercolonialismo ,OEA ,International relations ,JZ2-6530 - Abstract
El artículo examina las actividades de ciberseguridad de la Organización de Estados Americanos (OEA), por intermedio del estudio de: los actores que impulsan el tema en su agenda; sus cambios a lo largo del tiempo; y los aspectos problemáticos de la iniciativa para los países de América Latina. En base al análisis de material primario y secundario, se concluye que la OEA se ha establecido como el principal espacio de cooperación en temas de ciberseguridad a nivel intergubernamental en las Américas mediante un conjunto de actividades de asesoramiento, capacitación e intercambio de información entre sus Estados miembro. Sin embargo, el programa de ciberseguridad de la OEA también refuerza una dependencia normativa y tecnológica con las principales empresas y agencias estatales de EE.UU. y de sus aliados. Adicionalmente, las discusiones sobre ciberseguridad en la OEA pasan por alto los ciberataques y el ciberespionaje de EE.UU. Consecuentemente, el organismo contribuye a la ciberhegemonía estadounidense en las Américas, pues si bien hay relaciones consensuales de cooperación, también lleva a reproducir patrones de dependencia por los cuáles la OEA aún es criticada en la región.
- Published
- 2023
- Full Text
- View/download PDF
41. Sistemas de Información de Administración Financiera (SIAF) en la gobernanza pública inteligente: una exploración del caso colombiano
- Author
-
Milton Ricardo Ospina Díaz, Sandra Patricia Vera Osorio, and Kelly Johanna Zambrano Ospina
- Subjects
gobierno inteligente ,interoperabilidad ,sistemas de información financiera ,ciberseguridad ,marketing público ,Political science ,Political institutions and public administration (General) ,JF20-2112 - Abstract
Los sistemas de información de administración financiera (SIAF) son fundamentales para una gestión eficiente y transparente de los recursos financieros en el sector público. Debido a la escasez de publicaciones sobre esta temática en Colombia, este artículo pretende ser un aporte a la academia y a los profesionales que laboran en finanzas públicas al examinar la importancia de sistemas como SIIF, CHIP, Sireci, Épico, SIA Observa, el Mapa de Inversiones del Departamento Nacional de Planeación, la nueva plataforma PIIP, entre otros. También se abordan temas como gestión pública inteligente (GPI), gobierno digital, lucha contra la corrupción, interoperabilidad, ciberseguridad, inteligencia artificial (IA) y marketing público. La investigación ha utilizado una perspectiva interpretativa, de tipo teórico, documental, descriptivo y propositivo, con enfoques cualitativo y cuantitativo a partir de la aplicación de encuestas. Al final del artículo se plantea el desafío de mejorar la interoperabilidad y la seguridad de los SIAF en el Estado colombiano, resaltando la importancia de capacitar a los funcionarios en tecnologías de la información y la comunicación (TIC), así como promover los sitios web y las plataformas relacionadas con las finanzas públicas estatales para fortalecer la transparencia y fomentar la participación ciudadana.
- Published
- 2023
- Full Text
- View/download PDF
42. Redes Sociales: Riesgos y desafíos para la comunidad académica de los colegios de la Policía.
- Author
-
Villa Ramírez, José Neftalí, Mesa Méndez, Carlos Manuel, Garzón Santos, José Luis, and Urueña Sanabria, Rut
- Subjects
- *
CONSCIOUSNESS raising , *SCHOOL police , *HIGH school students , *PARENTS , *PRIVATE schools - Abstract
The use of social networks by high school students from National Police schools in Bogotá includes the identification of possible gaps in cybersecurity issues, despite programmes and strategies related to responsible use when browsing cyberspace. This research is based on the comprehensive-interpretive (sociological) paradigm with a mixed approach of qualitative predominance. A documentary review, a student survey and an in-depth interview with parents and speakers were carried out. The findings were grouped into two categories; cybersecurity and education. The results of the survey showed hyper-connectivity on the part of the students; the interaction carried out through social networks, especially through the exchange of photos, videos, sharing statuses and making video calls. The findings of the interview express that, although each educational establishment is autonomous, among parents, caregivers and teachers an expressly defined route is not clear to follow when evidencing emerging dangers to the use evidenced in social networks. There is also a lack of greater co-responsibility when identifying certain types of behaviour that threaten students, given that some parents consider that it is an issue that the school should take care of, while teachers believe that it is the parents' responsibility. In conclusion, the need to assess the degree of acceptance, the effectiveness and the scope of strategies developed by schools and private or government entities, with respect to raising awareness on cybersecurity issues and responsible use when browsing the Internet, is revealed. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
43. Gestión de vulnerabilidades basadas en riesgos en la aeronavegación.
- Author
-
Diaz Blanco, Vladimir and Brito Acuña, Guillermo
- Subjects
AERONAUTICAL navigation ,INFRASTRUCTURE (Economics) ,AEROSPACE industries ,INTERNET security ,BEST practices - Abstract
Copyright of Revista Cubana de Ciencias Informáticas is the property of Universidad de las Ciencias Informaticas (UCI) and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2023
44. Software para la gestión de la madurez en ciberseguridad.
- Author
-
Brito Acuña, Guillermo and Diaz Blanco, Vladimir
- Subjects
INTERNET security - Published
- 2023
45. Técnicas de Aprendizaje Automático para la detección y prevención de amenazas de ciberseguridad. Proyecciones futuras.
- Author
-
Reyes, Dainys Gainza, Brito, Henry Raúl González, Zulueta Veliz, Yeleny, and Fernández Pérez, Yamilis
- Subjects
MACHINE learning ,ARTIFICIAL intelligence ,REINFORCEMENT learning ,INTERNET security ,AUTOMATION - Abstract
Copyright of Revista Cubana de Ciencias Informáticas is the property of Universidad de las Ciencias Informaticas (UCI) and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2023
46. Impacto de factores exógenos en la transformación digital de las empresas.
- Author
-
Ilia V., CAZARES GARRIDO
- Subjects
DIGITAL transformation ,HIGH technology industries ,SOCIAL context ,GOVERNMENT policy ,INTERNATIONAL business enterprises - Abstract
Copyright of Revista Espacios is the property of Talleres de Impresos Oma and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2023
- Full Text
- View/download PDF
47. Desarrollo e implementación de tecnologías Informáticas para procesos de pago inmediato de bajo monto a través de transferencias electrónicas.
- Author
-
Ayala, E. L., Fuquen, H. S., Sánchez, C. M., Vargas, L. M., and Rojas, M.
- Subjects
- *
COMPUTER security , *MOBILE commerce , *WIRELESS Internet , *INTERNET access , *PAYMENT systems , *BLOCKCHAINS , *ONLINE banking , *FINANCIAL services industry - Abstract
The article shows the result of the innovation project developed by ACH Colombia, where a new service for immediate transfers of low amounts person to person was designed, supported by computer platforms adopting the highest technological level tools available, such as Blockchain (chain of blocks), warranting high levels of reliability and security. A payment ecosystem was integrated associating the main Colombian financial entities to provide immediate payment services among their users, reducing the use of cash. This proposal takes advantage of the wide adoption of mobile phones and internet access to develop a system of transactional processes that facilitate the purchase and payment operations of end users. A review of characteristics and technologies is shown for the design of means of payment. A recapitulation of cases regarding immediate payment systems is accomplished, and the methodological implementation of this payment system and final results are shown. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
48. Aeronautic maturity cybersecurity: a framework.
- Author
-
Brito-Acuña, Guillermo
- Subjects
- *
INTERNET security , *AERONAUTICS , *BEST practices , *EXCELLENCE - Abstract
This article presents the results of a systematic review of the methods to implement cybersecurity maturity. Based on them, it proposes a framework for excellence in aeronautical cybersecurity that integrates the objectives of aeronautical cybersecurity with capabilities and requirements, which contributes to increasing the maturity of aeronautical cybersecurity. It exposes 13 objectives with 120 capabilities and 5 functional maturity levels to gradually meet up to 600 aeronautical cybersecurity requirements. Which were taken from articles with good practices associated with publications of the last 5 years and the criteria resulting from the collaboration of managers and the validation of experts in the industry, which allowed it to be enriched with good practices associated with the management of cybersecurity and the resilience of these infrastructures. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
49. Control de accesos en seguridad de la información: Una revisión sistemática de las técnicas actuales.
- Author
-
PACHECO, JEAN, CHAVEZ, JOSUE, and DE LOS SANTOS, ALBERTO MENDOZA
- Subjects
- *
INTERNET security , *ACCESS control , *ASSET protection , *INFORMATION technology security , *DIGITAL technology , *INFORMATION resources management , *DATA integrity , *DIGITAL asset management - Abstract
In today's dynamic cybersecurity scenario, effective management of access to critical systems and data is essential to safeguard the integrity and confidentiality of information. This article presents a systematic review of the most prominent access control techniques in the last five years (2019-2023), with the aim of providing an updated view of trends in information security. The review, based on a meticulous selection of articles from Scopus, SciELO, IEEE and Google Scholar, adheres to the PRISMA methodology to ensure a rigorous and complete systematic review. Advanced techniques such as CP-ABE, ABAC, RBAC, ACE-BC, ABSE, among others, were identified and evaluated, which represent significant advances in access control and the protection of sensitive information. The results obtained highlight the critical importance of these techniques in information security, providing a clear overview of the most effective tools in the protection of digital assets. Ultimately, this review not only informs the latest trends but also drives future research in the area of access control and information security. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
50. Prácticas preventivas para fomentar la desconexión digital en la enseñanza universitaria.
- Author
-
SERRANO FALCÓN, CAROLINA, MOYA AMADOR, ROSA, CARMEN GARCÍA GARNICA, MARÍA DEL, and MUÑOZ ROPA, ANTONIO
- Subjects
CONSCIOUSNESS raising ,INSTANT messaging ,DIGITAL health ,CELL phones ,COLLEGE students ,RIGHT to health ,TRAINING needs - Abstract
Copyright of Revista Crítica de Relaciones de Trabajo, Laborum is the property of Ediciones Laborum S.L. and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2023
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.