Data security and privacy in the information age in Ecuador.
Main Article Content
Abstract
Digitalization in Ecuador has increased in recent years, and with it the exposure of both personal and organizational data. This exposure increases the risk of cyberattacks. It is necessary to be aware of the risks that currently exist and recommendations for avoiding them. This study presents a systematic literature review with the aim of providing recommendations and recognizing risks in an increasingly digitalized Ecuador, using the PRISMA methodology. It demonstrates that the main threats are sophisticated cyberattacks and a lack of user awareness regarding cybersecurity. Although the Organic Law on Personal Data Protection (LOPDP) exists, there are challenges to its effective implementation. In conclusion, important strategies are presented, such as regulatory frameworks, ongoing staff training on cyberattacks, and the use of new technologies to prevent such cyberattacks. These measures, aligned with international standards, are important for strengthening Ecuador's technological resilience against threats from the digital environment.
Downloads
Article Details
Section

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Authors retain the copyright of their works and grant the journal IDEAS the right of first publication. Articles are published under the Creative Commons Attribution–NonCommercial–NoDerivatives 4.0 International License (CC BY-NC-ND 4.0), which allows reading, downloading, copying, distributing, and sharing the content for non-commercial purposes, provided that proper credit is given to the author(s) and the original publication in the journal, without making modifications or creating derivative works. The journal IDEAS does not charge fees for submission, processing, or publication of manuscripts and guarantees open access to its contents.
How to Cite
References
L. A. Ordóñez Córdova, “El Marco Legal de los Delitos Cibernéticos en Ecuador,” Reincisol., vol. 3, no. 5, pp. 1447–1469, Jun. 2024, doi: 10.59282/reincisol.v3(5)1447-1469.
A. A. Ávila Coello, “Seguridad de la información en instituciones públi-cas: desafíos y buenas prácticas en el contexto ecuatoriano.,” Journal of Economic and Social Science Research, vol. 4, no. 2, pp. 140–156, Apr. 2024, doi: 10.55813/gaea/jessr/v4/n2/96.
M. J. Page et al., “The PRISMA 2020 statement: An updated guideline for reporting systematic reviews,” Mar. 29, 2021, BMJ Publishing Group. doi: 10.1136/bmj.n71.
G. E. Barahona Martinez, Y. G. Barzola Plúas, and L. V. Peñafiel Muñoz, “El Derecho a la Protección de Datos y el Avance de las Nuevas Tecnolo-gías en Ecuador: Implicaciones Legales y Éticas,” Journal of Economic and Social Science Research, vol. 4, no. 3, pp. 46–64, Jul. 2024, doi: 10.55813/gaea/jessr/v4/n3/113.
M. R. Egas, G. Ninahualpa, D. Molina, and J. Diaz, Estrategia Nacional de Ciberseguridad para Paises en Desarrollo National Cybersecurity Stra-tegy for Developing Countries Case study: Ecuador proposal. 2020.
Liu Jia, Research on Information Security of Large Enterprises. IEEE, 2020.
D. Imbaquingo, F. Diaz, T. Saltos, S. Arciniega, D. Leon, and A. Robayo, Problemas de seguridad de la información en Instituciones de Educación Superior. IEEE, 2020.
R. Almeida De Paula and J. Oliveira Castro, “Sistemas de gestão de segu-rança da informação-uma análise comportamental (Information security management systems-a behavioral analysis),” 2023.
Bhaharin Surayahani, Sulaiman Rossilawati, Mokhtar Umi, and Yusof Maryati, Issues and Trends in Information Security Policy Compliance. IEEE, 2019.
N. J. Pinda Román and L. A. Moya Martínez, “Ciberseguridad enfocada en el futuro digital de los estudiantes,” LATAM Revista Latinoamericana de Ciencias Sociales y Humanidades, vol. 5, no. 2, Apr. 2024, doi: 10.56712/latam. v5i2.1910.
F. Arellano, Í. Donoso Barraza, A. Flores Bustos, C. P. Soto, V. Flores Fon-seca, and R. Martínez-Peláez, “Examining cybersecurity culture in Leon city organizations: Insights from 2022 Examinando la cultura de ciberse-guridad en las organizaciones de la ciudad de León: percepción de 2022,” 2024. [Online]. Available: https://orcid.org/0009-0003-5061-7746.
R. Benaichouba, M. Brahmi, and L. Adala, “economic of cyber-security and society databases: protecting the digital ecosystem from cyber-attacks,” International Journal of Pro-fessional Business Review, vol. 9, no. 7, p. e04803, Jul. 2024, doi: 10.26668/businessreview/2024.v9i7.4803.
V. I. Capa Sanmartín, A. J. Romero Fernández, F. P. Cañizares Galarza, and S. A. Machuca Vivar, “La gestión de seguridad de la información para una empresa,” CIENCIAMATRIA, vol. 8, no. 4, pp. 651–666, Aug. 2022, doi: 10.35381/cm.v8i4.877.
A. P. da Silva Sotero and L. R. dos Santos, “O estelionato virtual e a in-eficácia da legislação brasileira para coibir o crime cibernético,” Cuader-nos de Educación y Desarrollo, vol. 16, no. 8, p. e5183, Aug. 2024, doi: 10.55905/cuadv16n8-081.
J. Guaña Moya, “La importancia de la seguridad informática en la educa-ción digital: retos y soluciones,” RECIMUNDO, vol. 7, no. 1, pp. 609–616, Feb. 2023, doi: 10.26820/recimundo/7.(1).enero.2023.609-616.
J. M. Trujillo Torres, C. Rodríguez Jiménez, S. A. García, and B. Berral Ortiz, “Revisión sistemática de la literatura sobre la seguridad digital en estudiantes de educación superior,” Información tecnológica, vol. 35, no. 4, pp. 1–12, Aug. 2024, doi: 10.4067/s0718-07642024000400001.
D. L. Carvajal Portilla, A. Cardona Londoño, and F. J. Valencia Duque, “Una propuesta de gestión de la seguridad de la información aplicado a una entidad pública colombiana,” Entre ciencia e ingeniería, vol. 13, no. 25, pp. 68–76, Jun. 2019, doi: 10.31908/19098367.4016.
M. Ron, G. Ninahualpa, D. Molina, and J. Diaz, Estrategia Nacional de Ciberseguridad para Paises en Desarrollo. IEEE, 2020.
F. Juca Maldonado and R. Medina Peña, “Ciberdelitos en Ecuador y su impacto social; panorama actual y futuras perspectivas.,” Portal de la Ciencia, vol. 4, no. 3, pp. 325–337, Sep. 2023, doi: 10.51247/pdlc.v4i3.394.
C. Su, “Big data security and privacy protection,” in Proceedings - 2019 International Conference on Virtual Reality and Intelligent Systems, ICVRIS 2019, Institute of Electrical and Electronics Engineers Inc., Sep. 2019, pp. 87–89. doi: 10.1109/ICVRIS.2019.00030.
R. D. Estrada Esponda, J. L. Unás Gómez, and O. E. Flórez Rincón, “Prác-ticas de seguridad de la información en tiempos de pandemia. Caso Universidad del Valle, sede Tuluá,” Revista Logos, Ciencia & Tecnología, vol. 13, no. 3, Oct. 2021, doi: 10.22335/rlct.v13i3.1446.
A. K. Zharova and V. M. Elin, “Technical and Legal Principles of Infor-mation Security on the Example of Russia,” in Proceedings of the 2021 IEEE International Conference “Quality Management, Transport and In-formation Security, Information Technologies”, T and QM and IS 2021, Institute of Electrical and Electronics Engineers Inc., 2021, pp. 131–135. doi: 10.1109/ITQMIS53292.2021.9642899.
D. P. A. Peña Martha, “Amenazas emergentes en la computacion en la nube,” 2024.
O. Ñañez, “Modelo de gestión de riesgos de ti para mejorar la gestión de seguridad de la información en la,” 2020.
R. Sabillón and J. J. Cano M., “Auditorías en Ciberseguridad: Un modelo de aplicación general para empresas y naciones,” RISTI - Revista Iberica de Sistemas e Tecnologias de Informacao, vol. 2019, no. 32, pp. 33–48, Jun. 2019, doi: 10.17013/risti.32.33-48.
H. Gao, “Design of Network Data Information Security Monitoring Sys-tem Based on Big Data Technology,” in Procedia Computer Science, Elsevier B.V., 2023, pp. 348–355. doi: 10.1016/j.procs.2023.11.040.
R. Madrigal, “impacto de los ciberataque en la seguridad internacional impact of the ciberataque on international security,” 2020, [Online]. Available: https://www.eumed.net/rev/caribe/2020/01/ciberataque-seguridad-internacional.html.
P. A. Villa Sánchez, J. Gutiérrez Obando, and A. M. López Echeverry, “Elementos de Seguridad para Gestión Documental con Blockchain,” En-tre ciencia e ingeniería, vol. 17, no. 34, pp. 36–42, 2023, doi: 10.31908/19098367.2667.
J. V. Cordero, “Las normas ISO/IEC como mecanismos de responsabilidad proactiva en el Reglamento General de Protección de Datos*,” 2021. [Online]. Available: https://idp.uoc.edu.
A. Irsheid, A. Murad, M. Alnajdawi, and A. Qusef, “Information security risk management models for cloud hosted systems: A comparative study,” in Procedia Computer Science, Elsevier B.V., 2022, pp. 205–217. doi: 10.1016/j.procs.2022.08.025.
L. Isabel, O. Pedro, and G. Teresa, How ISO 27001 can help achieve GDPR compliance. IEEE, 2019.
R. Romansky and I. Noninska, Cyber Space Features – Security and Data Protection Requirements. IEEE, 2019.
P. Genchev, “An approach to support information security risk assess-ment,” in Proceedings of the International Conference on Biomedical In-novations and Applications, BIA 2020, Institute of Electrical and Elec-tronics Engineers Inc., Sep. 2020, pp. 125–128. doi: 10.1109/BIA50171.2020.9244516.
Y. Rojas, P. Tamayo, and M. Moreno, “metodología para la gestión de la seguridad de la información basada en los aspectos más relevantes de la norma cubana NC ISO IEC 27001:2016,” 2020, [Online]. Available: https://www.eumed.net/rev/rilcoDS/12/gestion-seguridadinformacion.html.
J. M. Salazar, C. Cruz, A. Balderas, and H. Diaz, “la seguridad informática en las instituciones de educación superior,” 2021.