10.1145/3375900.3375909acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicetmConference Proceedingsconference-collections
research-article

An Approach of National and International Cybersecurity Laws and Standards to Mitigate Information Risks in Public Organizations of Ecuador

Published:07 February 2020Publication History

ABSTRACT

Today, cybersecurity is very important, and Ecuador could suffer serious security problems that would compromise the information of its citizens if it does not change its laws and standards in public institutions. The objective of this article was to analyze laws and standards in depth to be able to implement them in organizations public of Ecuador. It was used the deductive and exploratory research method to analyze the information of available media and scientific articles. It resulted in improvements in cybersecurity with the use of standards such as the International Organization for Standardization (ISO) and specific laws for cybersecurity. It was concluded that Ecuador need improve the cybersecurity in public organization, because had leak of information and implementation of laws and standards can help mitigate the risks the information.

References

  1. Valenzuela, D. Á. (2018). Ciberseguridad en América Latina y ciberdefensa en Chile. Revista Chilena de Derecho y Tecnologia, 7(1), 1--2. DOI= https://doi.org/10.5354/0719-2584.2018.50416Google ScholarGoogle Scholar
  2. Ministerio de las Telecomunicaciones y de la sociedad de la información. [n. d.]. Ecuador ocupa sexto lugar en la región, según Índice de Ciberseguridad. https://www.telecomunicaciones.gob.ec/ecuador-ocupa-sexto-lugar-en-la-region-segun-indice-de-ciberseguridad/Google ScholarGoogle Scholar
  3. El comercio. [n. d.]. Ciber mafias atacaron a 17 empresas ecuatorianas. https://www.elcomercio.com/actualidad/cibermafias-ciberataque-17empresas-ecuador-seguridadinformatica.html.Google ScholarGoogle Scholar
  4. International Organization for Standardization. [n. d.]. ISO Survey of certifications to management system standards https://isotc.iso.org/livelink/livelink?func=ll&objId=18808772&objAction=browse&viewType=1Google ScholarGoogle Scholar
  5. Society, E. (2014). IEEE Standard Cybersecurity Requirements for Substation Automation, Protection, and Control Systems IEEE Power and Energy Society.Google ScholarGoogle Scholar
  6. Chinyemba, M. K., & Phiri, J. (2018). An investigation into information security threats from insiders and how to mitigate them: A case study of Zambian public sector. Journal of Computer Science, 14(10), 1389--1400. DOI= https://doi.org/10.3844/jcssp.2018.1389.1400Google ScholarGoogle ScholarCross RefCross Ref
  7. Carvalho, C., & Marques, E. (2019). Adapting ISO 27001 to a Public Institution. Iberian Conference on Information Systems and Technologies. (June), 19--22.Google ScholarGoogle ScholarCross RefCross Ref
  8. Municipalidad Guayaquil. [n. d.]. Reglamento de seguridad de Informática del Gobierno Autónomo Descentralizado Municipal. http://guayaquil.gob.ec/Ordenanzas/Otras%20disposiciones/2014-01-24%20Reglamento%20de%20seguridad%20de%20Inform%C3%A1tica%20del%20Gobierno%20Aut%C3%B3nomo%20Descentralizado%20Municipal.PDFGoogle ScholarGoogle Scholar
  9. Gobierno del Ecuador. [n. d.]. Código orgánico integral penal. https://tbinternet.ohchr.org/Treaties/CEDAW/Shared%20Documents/ECU/INT_CEDAW_ARL_ECU_18950_S.pdfGoogle ScholarGoogle Scholar
  10. Thackray, H., McAlaney, J., Dogan, H., Taylor, J., & Richardson, C. (2016). Social psychology: An under-used tool in cybersecurity. Proceedings of the 30th International BCS Human Computer Interaction Conference, HCI 2016, 2016-July, 1--3. DOI= https://doi.org/10.14236/ewic/HCI2016.64Google ScholarGoogle ScholarCross RefCross Ref
  11. Kosseff, J. (2018). Developing collaborative and cohesive cybersecurity legal principles. International Conference on Cyber Conflict, CYCON, 2018-May, 283--297. DOI= https://doi.org/10.23919/CYCON.2018.8405022Google ScholarGoogle ScholarCross RefCross Ref
  12. Kshetri, N. (2019). Cybercrime and Cybersecurity in Africa. Journal of Global Information Technology Management, 22(2), 77--81. DOI= https://doi.org/10.1080/1097198X.2019.1603527.Google ScholarGoogle ScholarCross RefCross Ref
  13. Martin Horák, Václav Stupka, and Martin Husák. 2019. GDPR Compliance in Cybersecurity Software: A Case Study of DPIA in Information Sharing Platform. In Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019) (ARES '19), August 26--29, 2019, Canterbury, United Kingdom. ACM, New York, NY, USA, 8 pages. https://doi.org/10.1145/3339252.3340516Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Toapanta, M., Mero, J., Huilcapi, D., Tandazo, M., Orizaga, A., & Mafla, E. (2018). A Blockchain Approach to Mitigate Information Security in a Public Organization for Ecuador. IOP Conference Series: Materials Science and Engineering, 423(1). https://doi.org/10.1088/1757-899X/423/1/012164Google ScholarGoogle ScholarCross RefCross Ref
  15. Toapanta, S. M. T., Gallegos, L. E. M., & Trejo, J. A. O. (2016). Security analysis of civil registry database of Ecuador. International Conference on Electrical, Electronics, and Optimization Techniques, ICEEOT 2016, 1024--1029. DOI= https://doi.org/10.1109/ICEEOT.2016.7754841Google ScholarGoogle ScholarCross RefCross Ref
  16. Sen, R. (2018). Challenges to cybersecurity: Current state of affairs. Communications of the Association for Information Systems, 43(1), 22--44. DOI= https://doi.org/10.17705/1CAIS.04302.Google ScholarGoogle ScholarCross RefCross Ref
  17. Thomas Schaberreiter, Veronika Kupfersberger, Konstantinos Rantos, Arnolnt Spyros, Alexandros Papanikolaou, Christos Ilioudis, and Gerald Quirchmayr. 2019. A Quantitative Evaluation of Trust in the Quality of Cyber Threat Intelligence Sources. In Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019) (ARES '19), August 26--29, 2019, Canterbury, United Kingdom. ACM, New York, NY, USA, 10 pages. https://doi.org/10.1145/3339252.3342112Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Albertivan, D., Limantara, H., Rachmadiati, R. A., Pamungkas, A. W., & Surantha, N. (2019). IT risk identification and evaluation: A case study on XYZ University. International Journal on Advanced Science, Engineering and Information Technology, 9(1), 250--257. https://doi.org/10.18517/ijaseit.9.1.2739Google ScholarGoogle ScholarCross RefCross Ref
  19. Tom Cuchta, Brian Blackwood, Thomas R. Devine, Robert J. Niichel, Kristina M. Daniels, Caleb H. Lutjens, Sydney Maibach, and Ryan J. Stephenson. 2019. Human Risk Factors in Cybersecurity. In The 20th Annual Conference on Information Technology Education (SIGITE '19), October 3--5, 2019, Tacoma, WA, USA. ACM, New York, NY, USA, 6 pages. https://doi.org/10. 1145/3349266.3351407Google ScholarGoogle Scholar
  20. Chatfield, A. T., & Reddick, C. G. (2017). Cybersecurity innovation in government: A case study of U.S. pentagon's vulnerability reward program. ACM International Conference Proceeding Series, Part F128275, 64--73. https://doi.org/10.1145/3085228.3085233.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. An Approach of National and International Cybersecurity Laws and Standards to Mitigate Information Risks in Public Organizations of Ecuador

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICETM '19: Proceedings of the 2019 2nd International Conference on Education Technology Management
      December 2019
      126 pages
      ISBN:9781450376297
      DOI:10.1145/3375900

      Copyright © 2019 ACM

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 7 February 2020

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader
    About Cookies On This Site

    We use cookies to ensure that we give you the best experience on our website.

    Learn more

    Got it!