{"id":"https://openalex.org/W3040695580","doi":"https://doi.org/10.1145/3404663.3404671","title":"Definition of a Prototype for Performing Computer Audits in a Public Organization of Ecuador","display_name":"Definition of a Prototype for Performing Computer Audits in a Public Organization of Ecuador","publication_year":2020,"publication_date":"2020-05-15","ids":{"openalex":"https://openalex.org/W3040695580","doi":"https://doi.org/10.1145/3404663.3404671","mag":"3040695580"},"language":"en","primary_location":{"id":"doi:10.1145/3404663.3404671","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3404663.3404671","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 the 4th International Conference on Information System and Data Mining","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016709650","display_name":"Segundo Mois\u00e9s Toapanta Toapanta","orcid":"https://orcid.org/0000-0002-9041-0518"},"institutions":[{"id":"https://openalex.org/I3132940433","display_name":"Politecnica Salesiana University","ror":"https://ror.org/00f11af73","country_code":"EC","type":"education","lineage":["https://openalex.org/I3132940433"]}],"countries":["EC"],"is_corresponding":true,"raw_author_name":"Segundo Mois\u00e9s T. Toapanta","raw_affiliation_strings":["Department Computer Science, Salesian Polytechnic University, Guayaquil, Ecuador"],"affiliations":[{"raw_affiliation_string":"Department Computer Science, Salesian Polytechnic University, Guayaquil, Ecuador","institution_ids":["https://openalex.org/I3132940433"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090088087","display_name":"Sandra Elizabeth Marquez Ortiz","orcid":null},"institutions":[{"id":"https://openalex.org/I3132940433","display_name":"Politecnica Salesiana University","ror":"https://ror.org/00f11af73","country_code":"EC","type":"education","lineage":["https://openalex.org/I3132940433"]}],"countries":["EC"],"is_corresponding":false,"raw_author_name":"Sandra Elizabeth Marquez Ortiz","raw_affiliation_strings":["Department Computer Science, Salesian Polytechnic University, Guayaquil, Ecuador"],"affiliations":[{"raw_affiliation_string":"Department Computer Science, Salesian Polytechnic University, Guayaquil, Ecuador","institution_ids":["https://openalex.org/I3132940433"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082456719","display_name":"Luis Enrique Mafla Gallegos","orcid":"https://orcid.org/0000-0002-7808-7738"},"institutions":[{"id":"https://openalex.org/I70764802","display_name":"National Polytechnic School","ror":"https://ror.org/01gb99w41","country_code":"EC","type":"education","lineage":["https://openalex.org/I70764802"]}],"countries":["EC"],"is_corresponding":false,"raw_author_name":"Luis Enrique Mafla Gallegos","raw_affiliation_strings":["National Polytechnic School Quito, Ecuador"],"affiliations":[{"raw_affiliation_string":"National Polytechnic School Quito, Ecuador","institution_ids":["https://openalex.org/I70764802"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5016709650"],"corresponding_institution_ids":["https://openalex.org/I3132940433"],"apc_list":null,"apc_paid":null,"fwci":0.2669,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.63460659,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"31","last_page":"37"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9889000058174133,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9889000058174133,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9764999747276306,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9524000287055969,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/audit","display_name":"Audit","score":0.7783598899841309},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6472647190093994},{"id":"https://openalex.org/keywords/information-security-audit","display_name":"Information security audit","score":0.5981492400169373},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4973903000354767},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.46725958585739136},{"id":"https://openalex.org/keywords/internal-control","display_name":"Internal control","score":0.4599633812904358},{"id":"https://openalex.org/keywords/process-management","display_name":"Process management","score":0.4470670223236084},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.43046483397483826},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.427436888217926},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.41760683059692383},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3901996612548828},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.37950706481933594},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.37690305709838867},{"id":"https://openalex.org/keywords/accounting","display_name":"Accounting","score":0.3428572714328766},{"id":"https://openalex.org/keywords/engineering-management","display_name":"Engineering management","score":0.34093379974365234},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.31192052364349365},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.221491277217865},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.2120426893234253}],"concepts":[{"id":"https://openalex.org/C199521495","wikidata":"https://www.wikidata.org/wiki/Q181487","display_name":"Audit","level":2,"score":0.7783598899841309},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6472647190093994},{"id":"https://openalex.org/C39358052","wikidata":"https://www.wikidata.org/wiki/Q2578632","display_name":"Information security audit","level":5,"score":0.5981492400169373},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4973903000354767},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.46725958585739136},{"id":"https://openalex.org/C199450454","wikidata":"https://www.wikidata.org/wiki/Q1667931","display_name":"Internal control","level":3,"score":0.4599633812904358},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.4470670223236084},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.43046483397483826},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.427436888217926},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.41760683059692383},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3901996612548828},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.37950706481933594},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.37690305709838867},{"id":"https://openalex.org/C121955636","wikidata":"https://www.wikidata.org/wiki/Q4116214","display_name":"Accounting","level":1,"score":0.3428572714328766},{"id":"https://openalex.org/C110354214","wikidata":"https://www.wikidata.org/wiki/Q6314146","display_name":"Engineering management","level":1,"score":0.34093379974365234},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.31192052364349365},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.221491277217865},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.2120426893234253},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3404663.3404671","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3404663.3404671","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 the 4th International Conference on Information System and Data Mining","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17","score":0.4099999964237213}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W1994788755","https://openalex.org/W2110420869","https://openalex.org/W2291474276","https://openalex.org/W2323162780","https://openalex.org/W2330624101","https://openalex.org/W2464757430","https://openalex.org/W2522089301","https://openalex.org/W2585855180","https://openalex.org/W2592527929","https://openalex.org/W2611732255","https://openalex.org/W2612135125","https://openalex.org/W2729902341","https://openalex.org/W2742868326","https://openalex.org/W2757107184","https://openalex.org/W2765994004","https://openalex.org/W2766261656","https://openalex.org/W2772127437","https://openalex.org/W2775844889","https://openalex.org/W2787068418","https://openalex.org/W2891780922","https://openalex.org/W2892599543","https://openalex.org/W2919636346","https://openalex.org/W6759633758"],"related_works":["https://openalex.org/W4386208045","https://openalex.org/W4235956733","https://openalex.org/W2497647994","https://openalex.org/W4226413107","https://openalex.org/W4248680916","https://openalex.org/W2584162156","https://openalex.org/W1991422097","https://openalex.org/W2741061559","https://openalex.org/W1956752644","https://openalex.org/W2393695651"],"abstract_inverted_index":{"The":[0,77],"development":[1,43,190],"of":[2,5,17,44,58,64,71,80,137,145,157,191,214],"a":[3,34,45,65,72,86,92,97,102,108,166,192,220],"prototype":[4,48,60,150],"computer":[6,46,87,196,230],"audits":[7],"has":[8],"become":[9],"more":[10],"important":[11],"for":[12,90,105],"the":[13,30,42,56,59,62,69,112,121,126,134,143,149,153,158,189,212],"administration":[14],"and":[15,54,161,170,178,194,199,203],"auditors":[16,164],"public":[18,35,73,159],"companies.":[19],"In":[20,39,125],"this":[21,81,91,208],"study,":[22],"crucial":[23],"control":[24,52,182],"elements":[25,53],"were":[26,130],"explored":[27],"to":[28,41,67,84,123,188,226,238],"meet":[29,68],"safety":[31],"conditions":[32],"that":[33,115,148],"company":[36],"must":[37],"have;":[38],"addition":[40],"audit":[47,88,155,197],"based":[49,132],"on":[50,133],"recognized":[51],"validate":[55],"applicability":[57],"through":[61],"use":[63],"model":[66],"needs":[70],"organization":[74],"in":[75,96,117,207,232,236],"Ecuador.":[76],"general":[78],"objective":[79],"research":[82],"was":[83,94],"develop":[85],"protocol,":[89],"method":[93],"used":[95],"Cryptographic":[98],"Algorithm,":[99],"giving":[100],"as":[101],"better":[103],"option":[104],"its":[106,162],"understanding":[107],"flow":[109],"chart":[110],"with":[111,165,205],"encryption":[113],"processes":[114],"resulted":[116],"vulnerability":[118],"mitigation.":[119],"within":[120,218],"access":[122],"information.":[124],"experimental":[127],"aspect,":[128],"studies":[129],"conducted":[131],"evaluation":[135],"criteria":[136],"ISO":[138],"/":[139],"IEC":[140],"9126":[141],"software,":[142],"result":[144],"which":[146,174],"showed":[147],"can":[151,175,186],"provide":[152,200],"internal":[154],"staff":[156],"institution":[160],"external":[163],"simple,":[167],"continuous,":[168],"timely":[169],"appropriate":[171],"analysis.":[172],"analytical,":[173],"help":[176],"quickly":[177],"effectively":[179],"detect":[180],"organizational":[181],"problems.":[183],"This":[184],"study":[185],"contribute":[187],"sufficient":[193],"manageable":[195],"system,":[198],"future":[201],"researchers":[202],"companies":[204],"guidance":[206],"thematic":[209],"area.":[210],"Given":[211],"diversity":[213],"IT":[215],"(Information":[216],"Technology),":[217],"such":[219],"document":[221],"it":[222],"is":[223],"not":[224],"possible":[225],"be":[227],"specific":[228,239],"about":[229],"auditing":[231],"particular":[233],"sectors":[234],"or":[235,241],"relation":[237],"hardware":[240],"software.":[242]},"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
