{"id":"https://openalex.org/W2789869767","doi":"https://doi.org/10.1145/3175536.3175578","title":"Computer Fraud","display_name":"Computer Fraud","publication_year":2017,"publication_date":"2017-12-20","ids":{"openalex":"https://openalex.org/W2789869767","doi":"https://doi.org/10.1145/3175536.3175578","mag":"2789869767"},"language":"en","primary_location":{"id":"doi:10.1145/3175536.3175578","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3175536.3175578","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2017 9th International Conference on Education Technology and Computers","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059393923","display_name":"Luis Lema-Cerda","orcid":"https://orcid.org/0000-0003-4020-0990"},"institutions":[{"id":"https://openalex.org/I118946981","display_name":"Escuela Polit\u00e9cnica del Ej\u00e9rcito","ror":"https://ror.org/05j136930","country_code":"EC","type":"education","lineage":["https://openalex.org/I118946981"]}],"countries":["EC"],"is_corresponding":true,"raw_author_name":"Luis Lema-Cerda","raw_affiliation_strings":["Universidad de las Fuerzas Armadas ESPE, Sangolqu\u00ed, Ecuador"],"affiliations":[{"raw_affiliation_string":"Universidad de las Fuerzas Armadas ESPE, Sangolqu\u00ed, Ecuador","institution_ids":["https://openalex.org/I118946981"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060180789","display_name":"V\u00edctor H. Andaluz","orcid":"https://orcid.org/0000-0002-8127-1595"},"institutions":[{"id":"https://openalex.org/I118946981","display_name":"Escuela Polit\u00e9cnica del Ej\u00e9rcito","ror":"https://ror.org/05j136930","country_code":"EC","type":"education","lineage":["https://openalex.org/I118946981"]}],"countries":["EC"],"is_corresponding":false,"raw_author_name":"V\u00edctor H. Andaluz","raw_affiliation_strings":["Universidad de las Fuerzas Armadas ESPE, Sangolqu\u00ed, Ecuador"],"affiliations":[{"raw_affiliation_string":"Universidad de las Fuerzas Armadas ESPE, Sangolqu\u00ed, Ecuador","institution_ids":["https://openalex.org/I118946981"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052424555","display_name":"Diego Pinsha","orcid":null},"institutions":[{"id":"https://openalex.org/I118946981","display_name":"Escuela Polit\u00e9cnica del Ej\u00e9rcito","ror":"https://ror.org/05j136930","country_code":"EC","type":"education","lineage":["https://openalex.org/I118946981"]}],"countries":["EC"],"is_corresponding":false,"raw_author_name":"Diego Pinsha","raw_affiliation_strings":["Universidad de las Fuerzas Armadas ESPE, Sangolqu\u00ed, Ecuador"],"affiliations":[{"raw_affiliation_string":"Universidad de las Fuerzas Armadas ESPE, Sangolqu\u00ed, Ecuador","institution_ids":["https://openalex.org/I118946981"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5076456961","display_name":"Kl\u00e9ber Quevedo","orcid":null},"institutions":[{"id":"https://openalex.org/I118946981","display_name":"Escuela Polit\u00e9cnica del Ej\u00e9rcito","ror":"https://ror.org/05j136930","country_code":"EC","type":"education","lineage":["https://openalex.org/I118946981"]}],"countries":["EC"],"is_corresponding":false,"raw_author_name":"Kl\u00e9ber Quevedo","raw_affiliation_strings":["Universidad de las Fuerzas Armadas ESPE, Sangolqu\u00ed, Ecuador"],"affiliations":[{"raw_affiliation_string":"Universidad de las Fuerzas Armadas ESPE, Sangolqu\u00ed, Ecuador","institution_ids":["https://openalex.org/I118946981"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5059393923"],"corresponding_institution_ids":["https://openalex.org/I118946981"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.28291639,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"248","last_page":"252"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9872000217437744,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cobit","display_name":"COBIT","score":0.8968759179115295},{"id":"https://openalex.org/keywords/pillar","display_name":"Pillar","score":0.5859535336494446},{"id":"https://openalex.org/keywords/audit","display_name":"Audit","score":0.5598804354667664},{"id":"https://openalex.org/keywords/engineering-management","display_name":"Engineering management","score":0.48898184299468994},{"id":"https://openalex.org/keywords/information-security-management-system","display_name":"Information security management system","score":0.48883146047592163},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.48138120770454407},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.46662959456443787},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.44739875197410583},{"id":"https://openalex.org/keywords/accounting","display_name":"Accounting","score":0.41867509484291077},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.4150773584842682},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.3839196264743805},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38183391094207764},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.3257848620414734},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.2884138822555542},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.13483929634094238},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.12950295209884644},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.10002288222312927}],"concepts":[{"id":"https://openalex.org/C2776723946","wikidata":"https://www.wikidata.org/wiki/Q544025","display_name":"COBIT","level":3,"score":0.8968759179115295},{"id":"https://openalex.org/C105289051","wikidata":"https://www.wikidata.org/wiki/Q1930094","display_name":"Pillar","level":2,"score":0.5859535336494446},{"id":"https://openalex.org/C199521495","wikidata":"https://www.wikidata.org/wiki/Q181487","display_name":"Audit","level":2,"score":0.5598804354667664},{"id":"https://openalex.org/C110354214","wikidata":"https://www.wikidata.org/wiki/Q6314146","display_name":"Engineering management","level":1,"score":0.48898184299468994},{"id":"https://openalex.org/C111153917","wikidata":"https://www.wikidata.org/wiki/Q1662500","display_name":"Information security management system","level":5,"score":0.48883146047592163},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.48138120770454407},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.46662959456443787},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.44739875197410583},{"id":"https://openalex.org/C121955636","wikidata":"https://www.wikidata.org/wiki/Q4116214","display_name":"Accounting","level":1,"score":0.41867509484291077},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4150773584842682},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3839196264743805},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38183391094207764},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3257848620414734},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.2884138822555542},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.13483929634094238},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.12950295209884644},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.10002288222312927},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3175536.3175578","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3175536.3175578","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2017 9th International Conference on Education Technology and Computers","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7699999809265137,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W2062493711","https://openalex.org/W2259923630","https://openalex.org/W2566763766","https://openalex.org/W2590695271","https://openalex.org/W2738224018","https://openalex.org/W2772260502"],"related_works":["https://openalex.org/W2185994542","https://openalex.org/W3048038405","https://openalex.org/W4312240969","https://openalex.org/W2604745674","https://openalex.org/W3137087578","https://openalex.org/W203815982","https://openalex.org/W4301149476","https://openalex.org/W2901339057","https://openalex.org/W3120324834","https://openalex.org/W3201748716"],"abstract_inverted_index":{"This":[0],"research":[1,73],"project":[2],"is":[3,54,70],"aimed":[4],"at":[5,113],"conducting":[6],"an":[7],"analysis":[8,100],"of":[9,14,23,39,46,84,98,101],"computer":[10,108],"fraud":[11],"and":[12,86,105,124],"vulnerability":[13],"companies":[15,30],"in":[16,20],"the":[17,21,33,37,44,61,64,82,96,99,107,117],"industrial":[18],"sector":[19],"province":[22],"Cotopaxi,":[24],"since":[25],"for":[26,36],"many":[27],"years":[28],"these":[29],"have":[31],"been":[32],"fundamental":[34],"pillar":[35],"development":[38],"their":[40,114],"community,":[41],"contributing":[42],"to":[43,60,81,94],"welfare":[45],"families":[47],"that":[48,66,110],"make":[49],"it":[50],"up.":[51],"The":[52],"study":[53],"based":[55],"on":[56],"theoretical":[57],"foundations":[58],"according":[59],"problems":[62],"posed,":[63],"methodology":[65],"will":[67,91],"be":[68,92],"developed":[69,80],"a":[71,122],"quantitative":[72],"-":[74],"analytical,":[75],"because":[76],"special":[77],"examinations":[78],"were":[79],"management":[83,126],"information":[85],"communication":[87],"technologies,":[88],"where":[89],"they":[90],"able":[93],"report":[95],"results":[97],"internal":[102],"control,":[103],"audit":[104],"solve":[106],"frauds":[109],"are":[111],"currently":[112],"peak":[115],"within":[116],"industries":[118],"worldwide,":[119],"using":[120],"as":[121,129],"solution":[123],"security":[125],"tools,":[127],"such":[128],"COBIT,":[130],"ICONTEC":[131],"NTC":[132],"ISO/IEC":[133],"27005:2008,":[134],"ISO":[135],"27001.":[136]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2018-03-29T00:00:00"}
