Computer planning and its influence on information security

Authors

DOI:

https://doi.org/10.35381/i.p.v5i1.2627

Keywords:

Planning, computing;, data security, technology, information, UNESCO thesaurus)

Abstract

The objective of the research was to analyze current IT planning and its influence on information security. The research was considered quantitative because a survey was carried out on the workers of the institution in order to obtain statistical data. The results showed that the analysis of a computer planning allows to know the difficulties that the institution shows with respect to ICT management, present a correction and generate improvements in information security, with respect to the use of terminals, vulnerable ports on servers. and taking into consideration the integration of the end user to the process. In conclusion, it can be affirmed that the benefit of computer planning affects not only the administrative part of the institution in evaluation of its management, it is also reflected in the citizens, since they access ICT services in the citizen service department with greater efficiency.

Downloads

Download data is not yet available.

References

Blanco Arbe, J. M., Usandizaga, I., & Jaime, A. (2014). Gestión de Proyectos en el Grado en Ingeniería Informática: del PBL a la espiral de proyectos. [Project Management in the Degree in Computer Engineering: from PBL to the spiral of projects]. https://n9.cl/v8n64

Cairampoma, R. (2015). Tipos de Investigación científica: Una simplificación de la complicada incoherente nomenclatura y clasificación. [Types of Scientific Investigation: A Simplification of the Complicated Inconsistent Nomenclature and Classification]. REDVET, vol. 16, núm. 1, pp. 1-14, España. https://n9.cl/vz2u

Carpentier, J.-F. (Jean-F., & Olivares Serrano, J. (2016). La seguridad informática en la PYME : situación actual y mejores prácticas.[ Computer security in SMEs: current situation and best practices]. https://n9.cl/xu4p8

Desongles, J., Cifredo, E. A., Garzón, M. Luis., Sampalo de la Torre, M. d. los A., & Rocha, I. (2006). Técnicos de Soporte Informático de la Comunidad de Castilla Y León. [Computer Support Technicians of the Community of Castilla Y León]. Temario Volumen I Ebook. MAD. https://n9.cl/6knln

Gómez Luis, & Álvarez Ana. (2012). Guía de la aplicación de la Norma UNE- ISO/27001 sobre seguridad en sistemas de información. [Guide to the application of the UNE-ISO/27001 Standard on security in information systems ]. (2ª ed.). España: AENOR. https://n9.cl/gh1km

Maya, E. (2014). Métodos y técnicas de investigación Una propuesta ágil para la presentación de trabajos científicos en las áreas de arquitectura, urbanismo y disciplinas afines. [Research methods and techniques An agile proposal for the presentation of scientific papers in the areas of architecture, urbanism and related discipline ]. (1ª ed.). Mexico. https://n9.cl/kban

Patón Villar, Fernando, Lorente Granados, Gloria, Fernández-Lasquetty Blanc, Blanca, Hernández Martínez, Antonio, Escot Higueras, Sandra, Quero Palomino, Mª Azucena, & Navarro González, Isabel. (2013). Plan de mejora continua en la prevención-tratamiento de las úlceras por presión ciclo Deming. [Plan for continuous improvement in the prevention-treatment of pressure ulcers Deming cycle]. Gerokomos , 24 (3), 125-131. https://n9.cl/yupho

Silva Junior, M. G. da, Araújo, E. da C., Moraes, C. R. S., & Gonçalves, L. H. T. (2018). Software for systematization of nursing care in medical units. Revista Brasileira de Enfermagem, 71(5), 2425–2431. https://doi.org/10.1590/0034-7167-2016-0386

Sheikhpour, R., & Modiri, N. (2012). An Approach to Map COBIT Processes to ISO/IEC 27001. International Journal of Security and Its Applications, 16.

Solarte, F. N. S., Rosero, E. R. E., & Benavides, M. del C. (2015). Metodología de análisis y evaluación de riesgos aplicados a la seguridad informática y de información bajo la norma ISO/IEC 27001. [Risk analysis and assessment methodology applied to computer and information security under the ISO/IEC 27001 standard]. Revista tecnológica. In Revista Tecnológica-ESPOL (Vol.28). https://n9.cl/eej7

Published

2023-05-01

How to Cite

Palma-Rivero, A. D., Romero-Fernández, A. J., Cañizares-Galarza, F. P., & Lozada-Torres, E. F. (2023). Computer planning and its influence on information security. Ingenium Et Potentia, 5(1), 4–13. https://doi.org/10.35381/i.p.v5i1.2627

Issue

Section

De Investigación

Most read articles by the same author(s)

1 2 3 4 5 6 7 8 9 10 > >> 

Similar Articles

You may also start an advanced similarity search for this article.