Likert Scale Design

Likert Scale Design

Source publication
Article
Full-text available
Persistent Challenges in Cybersecurity Governance Project Formulation: A Case Study in Ecuador and Beyond. The formulation of projects aimed at managing cybersecurity governance to optimize organizational resources presents persistent challenges both in Ecuador and globally. Among the most prevalent issues are: A lack of knowledge in identifying re...

Contexts in source publication

Context 1
... Table 3., you can see the different proposed solutions related to the formulation of projects for cybersecurity governance; which must be considered so that this research makes additional contributions aimed at solving the research problem. Table 4 defines 14 relevant actors who facilitate formulating cybersecurity governance projects to optimize an organization's resources. In this phase, the assessment simulation was carried out with the following considerations: ...
Context 2
... Likert scale, evaluation is composed of five ranges of options that correspond to two positive, two negative, and one neutral, this evaluation is supported by applying the expert judgment technique, below, we detail the ranges of the Likert scale with its corresponding rating defined for this case study. Table 4 shows the design of the Likert scale used for the evaluation in Table 5 in the five different scenarios Below, we present in Figure 1, in the corresponding graph, the evaluation of the "Relevant actors for the formulation of projects for cybersecurity governance for the optimization of resources in an organization" with the following details: Ecohumanism 2025Volume: 4, No: 1, pp. 560 -579 ISSN: 2752-6798 (Print) | ISSN 2752 https://ecohumanism.co.uk/joe/ecohumanism DOI: https://doi.org/10.62754/joe.v4i1.5837 ...

Citations

... Ecuador, through the Ministry of Telecommunications and Information Society (MINTEL), is seeking alternatives to improve cybersecurity governance with a plan that addresses the following topics: Information Security and responsible use of ICT, Digital Economy, Emerging Technologies for Sustainable Development, Digital Citizen, Strengthening Digital Inclusion and Protection of Personal Data to define an appropriate framework for cybersecurity governance (Ecuador, 2025). The authors determine that Ecuador lacks legal support for cybersecurity governance management using artificial intelligence and new technologies such as blockchain; they suggest creating a legal structure with the definition of judges specialized in information and communications technologies similar to traffic, criminal, and civil judges, among others (Durango et al., 2025). They determine that it is necessary to define indicators related to the legal basis and information technologies, carry out a statistical analysis of the National Cybersecurity Index (INCIS), and identify the relevant actors for the globalization of information security (Armas et al., 2024). ...
Article
Full-text available
    Cybersecurity governance issues remain persistent worldwide. One of the key causes is the lack of appropriate models, prototypes, or guidelines that effectively incorporate emerging technologies such as blockchain and artificial intelligence, while being grounded in national legal frameworks or aligned with international standards. The objective of this research is to analyze and define a prototype for the integration of a "Framework for Cybersecurity Governance Based on Blockchain, Artificial Intelligence, and Legal Foundations for Organizations." A deductive method and exploratory research approach were employed to analyze scholarly articles, standards, laws, regulations, and official websites related to the topic. The study resulted in the identification of relevant actors for the development of a cybersecurity governance framework, an algorithm for its analysis, and a prototype framework. The findings suggest that all organizations, based on simulations involving the identified actors, should aim for a performance level above 75%. Organizations scoring 75% or lower must seek strategies to reach a higher range—between 76% and 95%—to effectively mitigate risks, threats, and vulnerabilities in cybersecurity governance management.