Figure 3 - available via license: Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International
Content may be subject to copyright.
Prototype Algorithm Expressed in A Flow Chart In the Figure 3 describes the algorithm in a flow chart, and what its phases are.
Source publication
The problems of business closures (SMEs) are constant in the world and in Ecuador due to the lack of application of appropriate management models that allow the conversion of strategies. The deductive method was used for exploratory research of the information related to the research topic. The objective is to design a prototype to mitigate risks a...
Similar publications
The purpose of this paper is to investigate the impact of Total Quality Management (TQM) practices on the performance of Small and Medium Enterprises (SMEs) in Pakistan. This study considered how Information Technology Turbulence (ITT) by acting as a moderating factor in the era of technological advancements influenced the firm’s performance. The s...
Citations
... They determine that the lack of adequate models based on information technologies for the management of administrative processes has caused immense damage to public and private companies, higher education institutions, among others. They state that one of the options to improve the management of administrative processes is the generation of a conceptual model to minimize risks, a risk control prototype, a flow chart of the prototype, a process simulation with five scenarios, determination of the formula to detect the probability of a company closing, analysis and evaluation of risks; this structure can be applied in the management of remote laboratories for the optimization of administrative processes (Altamirano et al., 2024). They state that the legal basis must currently be applied in all areas of ICT that are going to be implemented. ...
Problems in managing information security for access to remote laboratories in higher education institutions are persistent worldwide. The objective of this research is to define alternatives to mitigate risks, vulnerabilities and threats in a remote laboratory for the management of information of students, teachers and administrators in a higher education institution. The deductive method and exploratory research were used with the application of seven phases defined by the authors. It resulted a simulation of the evaluation of the information security of a remote laboratory, an Architecture of a remote laboratory integrating virtual learning environments and a Model for the integration of information security in remote laboratories. It was concluded that information security analysis to mitigate risks, vulnerabilities and threats in a remote laboratory of a higher education institution is crucial to guarantee data protection, experiment management and integrity, confidentiality and availability (CIA). for information management of students, teachers and administrators; considering the optimization of administrative processes and the legal basis.