{"id":"https://openalex.org/W3025457123","doi":"https://doi.org/10.1109/icict50521.2020.00049","title":"Analysis of New Technologies in Information Security to Mitigate Data Risks in a Public Organization","display_name":"Analysis of New Technologies in Information Security to Mitigate Data Risks in a Public Organization","publication_year":2020,"publication_date":"2020-03-01","ids":{"openalex":"https://openalex.org/W3025457123","doi":"https://doi.org/10.1109/icict50521.2020.00049","mag":"3025457123"},"language":"en","primary_location":{"id":"doi:10.1109/icict50521.2020.00049","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icict50521.2020.00049","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016709650","display_name":"Segundo Mois\u00e9s Toapanta Toapanta","orcid":"https://orcid.org/0000-0002-9041-0518"},"institutions":[{"id":"https://openalex.org/I3132940433","display_name":"Politecnica Salesiana University","ror":"https://ror.org/00f11af73","country_code":"EC","type":"education","lineage":["https://openalex.org/I3132940433"]}],"countries":["EC"],"is_corresponding":true,"raw_author_name":"Segundo Moises Toapanta Toapanta","raw_affiliation_strings":["Department of Computer Science, Salesian Polytechnic University, Guayaquil, Ecuador"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Salesian Polytechnic University, Guayaquil, Ecuador","institution_ids":["https://openalex.org/I3132940433"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082456719","display_name":"Luis Enrique Mafla Gallegos","orcid":"https://orcid.org/0000-0002-7808-7738"},"institutions":[{"id":"https://openalex.org/I70764802","display_name":"National Polytechnic School","ror":"https://ror.org/01gb99w41","country_code":"EC","type":"education","lineage":["https://openalex.org/I70764802"]}],"countries":["EC"],"is_corresponding":false,"raw_author_name":"Luis Enrique Mafla Gallegos","raw_affiliation_strings":["Faculty of Engineering Systems, National polytechnic school (EPN), Quito, Ecuador"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering Systems, National polytechnic school (EPN), Quito, Ecuador","institution_ids":["https://openalex.org/I70764802"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023366614","display_name":"Mario Dario Medina Lara","orcid":null},"institutions":[{"id":"https://openalex.org/I3132940433","display_name":"Politecnica Salesiana University","ror":"https://ror.org/00f11af73","country_code":"EC","type":"education","lineage":["https://openalex.org/I3132940433"]}],"countries":["EC"],"is_corresponding":false,"raw_author_name":"Mario Dario Medina Lara","raw_affiliation_strings":["Department of Computer Science, Salesian Polytechnic University, Guayaquil, Ecuador"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Salesian Polytechnic University, Guayaquil, Ecuador","institution_ids":["https://openalex.org/I3132940433"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5112453192","display_name":"Javier Gonzalo Ortiz Rojas","orcid":null},"institutions":[{"id":"https://openalex.org/I3132940433","display_name":"Politecnica Salesiana University","ror":"https://ror.org/00f11af73","country_code":"EC","type":"education","lineage":["https://openalex.org/I3132940433"]}],"countries":["EC"],"is_corresponding":false,"raw_author_name":"Javier Gonzalo Ortiz Rojas","raw_affiliation_strings":["Department of Computer Science, Salesian Polytechnic University (UPS), Guayaquil, Ecuador"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Salesian Polytechnic University (UPS), Guayaquil, Ecuador","institution_ids":["https://openalex.org/I3132940433"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5016709650"],"corresponding_institution_ids":["https://openalex.org/I3132940433"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.06633965,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"11","issue":null,"first_page":"276","last_page":"283"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9919999837875366,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9818999767303467,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7120018601417542},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.669510006904602},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.6185943484306335},{"id":"https://openalex.org/keywords/information-security-management","display_name":"Information security management","score":0.5858614444732666},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.5393787026405334},{"id":"https://openalex.org/keywords/security-controls","display_name":"Security controls","score":0.48817282915115356},{"id":"https://openalex.org/keywords/immutability","display_name":"Immutability","score":0.47979122400283813},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.42920905351638794},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.4215855598449707},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.41478240489959717},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.3924955725669861},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.3537418842315674},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.32222414016723633},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.2009791135787964},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.1782679259777069},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.165880024433136},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.11156633496284485}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7120018601417542},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.669510006904602},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.6185943484306335},{"id":"https://openalex.org/C148976360","wikidata":"https://www.wikidata.org/wiki/Q1662500","display_name":"Information security management","level":5,"score":0.5858614444732666},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.5393787026405334},{"id":"https://openalex.org/C178148461","wikidata":"https://www.wikidata.org/wiki/Q1632136","display_name":"Security controls","level":3,"score":0.48817282915115356},{"id":"https://openalex.org/C2776126399","wikidata":"https://www.wikidata.org/wiki/Q3942906","display_name":"Immutability","level":3,"score":0.47979122400283813},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.42920905351638794},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.4215855598449707},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.41478240489959717},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.3924955725669861},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.3537418842315674},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.32222414016723633},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2009791135787964},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.1782679259777069},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.165880024433136},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.11156633496284485},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icict50521.2020.00049","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icict50521.2020.00049","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W2000588234","https://openalex.org/W2140133741","https://openalex.org/W2268989031","https://openalex.org/W2290151134","https://openalex.org/W2290944024","https://openalex.org/W2304202958","https://openalex.org/W2597357083","https://openalex.org/W2792571124","https://openalex.org/W2806028629","https://openalex.org/W2884628187","https://openalex.org/W2900439029","https://openalex.org/W2944618043","https://openalex.org/W2952568827","https://openalex.org/W2966364580","https://openalex.org/W2972615700","https://openalex.org/W2990117382"],"related_works":["https://openalex.org/W2891666484","https://openalex.org/W4293770853","https://openalex.org/W2120971814","https://openalex.org/W4256374004","https://openalex.org/W805142288","https://openalex.org/W1988974780","https://openalex.org/W2390821232","https://openalex.org/W2375893592","https://openalex.org/W2767454858","https://openalex.org/W2066297175"],"abstract_inverted_index":{"Were":[0],"analyzed":[1],"references":[2],"on":[3],"alternative":[4],"technologies":[5,23,41],"or":[6],"new":[7,22,40],"proposals":[8],"to":[9,35,45,65,107],"help":[10],"mitigate":[11],"data":[12,50],"risks.":[13],"The":[14,32],"problem":[15],"is":[16,34,101],"the":[17,47,67,70],"lack":[18],"of":[19,21,39,49,69,79,93],"application":[20],"that":[24,99],"secure":[25],"information":[26,43,68],"and":[27,60,113,119],"reduce":[28],"risks":[29,48],"in":[30,42,51,88],"organizations.":[31],"objective":[33],"perform":[36],"an":[37],"analysis":[38],"security":[44],"minimize":[46],"a":[52,104],"public":[53],"organization.":[54],"It":[55,73,96],"was":[56,97],"used":[57,64],"deductive":[58],"method":[59],"exploratory":[61],"research":[62],"were":[63],"analyze":[66],"referenced":[71],"articles.":[72],"turned":[74],"out:":[75],"Mixed":[76],"Conceptual":[77],"Model":[78],"Information":[80,94],"Control,":[81],"Double":[82],"Security":[83],"Architecture":[84],"for":[85],"Public":[86],"Organization":[87],"Educational":[89],"Area,":[90],"Algorithm":[91],"Control":[92],"Security.":[95],"concluded":[98],"blockchain":[100],"considered":[102],"as":[103],"fundamental":[105],"option":[106],"provide":[108],"control,":[109],"robustness":[110],"against":[111],"failures":[112],"malicious":[114],"attacks,":[115],"reliability,":[116],"availability,":[117],"immutability":[118],"security.":[120]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
