Moisés Toapanta T’s scientific contributions

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (5)


Figure 1. Simulation of Relevant Actors for the Definition of a Framework for Cybersecurity Governance.
Perspectives on a Cybersecurity Governance Framework Integrating Blockchain, Artificial Intelligence, and Legal Base for one Organization
  • Article
  • Full-text available

May 2025

·

24 Reads

Journal of Posthumanism

Moisés Toapanta T

·

Jeanette Jordán Buenaño

·

Santiago Vayas C

·

[...]

·

Diego Andrade A

Cybersecurity governance issues remain persistent worldwide. One of the key causes is the lack of appropriate models, prototypes, or guidelines that effectively incorporate emerging technologies such as blockchain and artificial intelligence, while being grounded in national legal frameworks or aligned with international standards. The objective of this research is to analyze and define a prototype for the integration of a "Framework for Cybersecurity Governance Based on Blockchain, Artificial Intelligence, and Legal Foundations for Organizations." A deductive method and exploratory research approach were employed to analyze scholarly articles, standards, laws, regulations, and official websites related to the topic. The study resulted in the identification of relevant actors for the development of a cybersecurity governance framework, an algorithm for its analysis, and a prototype framework. The findings suggest that all organizations, based on simulations involving the identified actors, should aim for a performance level above 75%. Organizations scoring 75% or lower must seek strategies to reach a higher range—between 76% and 95%—to effectively mitigate risks, threats, and vulnerabilities in cybersecurity governance management.

Download

Analysis for the Formulation Of A Project for the Management of Cybersecurity Governance for the Optimization of Resources in an Organization

January 2025

·

77 Reads

·

1 Citation

Journal of Ecohumanism

Persistent Challenges in Cybersecurity Governance Project Formulation: A Case Study in Ecuador and Beyond. The formulation of projects aimed at managing cybersecurity governance to optimize organizational resources presents persistent challenges both in Ecuador and globally. Among the most prevalent issues are: A lack of knowledge in identifying relevant standards and policies, Insufficient human resources with expertise and training in cybersecurity, and Deficiencies in norms, prototypes, and appropriate project management models for cybersecurity governance. The objective of this research is to perform the analysis for the formulation of a project for managing cybersecurity governance to optimize resources in an organization. A deductive approach and exploratory research methods were employed to analyze relevant documents and literature. Key Findings: Indicators to support the formulation of cybersecurity governance projects, Proposed solutions for project formulation in cybersecurity governance, Identification of relevant stakeholders essential for project development and resource optimization, Algorithm development utilizing flowchart techniques for project formulation. Conclusions: Simulation results, evaluated through the Likert scale and expert judgment, revealed varying levels of satisfaction: Scenarios 1 and 3: Satisfaction below 75% – indicating dissatisfaction, Scenarios 2 and 4: Satisfaction between 76% and 94% – indicating satisfaction, Scenario 5: Satisfaction between 95% and 100% – indicating high satisfaction. It is concluded that to ensure successful project formulation, all key stakeholders must achieve satisfaction levels exceeding 75%.


Analysis of possible solutions related to remote laboratories.
Definition of categories with their indicators.
Information Security Management in a Higher Education Institution Based on Standards, Legal Basis for the Optimization of Administrative Resources

December 2024

·

23 Reads

Journal of Ecohumanism

Problems in managing information security for access to remote laboratories in higher education institutions are persistent worldwide. The objective of this research is to define alternatives to mitigate risks, vulnerabilities and threats in a remote laboratory for the management of information of students, teachers and administrators in a higher education institution. The deductive method and exploratory research were used with the application of seven phases defined by the authors. It resulted a simulation of the evaluation of the information security of a remote laboratory, an Architecture of a remote laboratory integrating virtual learning environments and a Model for the integration of information security in remote laboratories. It was concluded that information security analysis to mitigate risks, vulnerabilities and threats in a remote laboratory of a higher education institution is crucial to guarantee data protection, experiment management and integrity, confidentiality and availability (CIA). for information management of students, teachers and administrators; considering the optimization of administrative processes and the legal basis.


Future Prospects for the Application of Artificial Intelligence in Judicial Management

October 2024

·

41 Reads

Journal of Ecohumanism

The problems in judicial management persist regarding the applicability of artificial intelligence (AI) systems. Currently, they have become a challenge as they lack legal foundation and legitimacy, given that to date, only a minimal number of countries have laws addressing the supervision, regulation, management, and control of AI system applicability in judicial settings. The objective of this research is to analyze the future perspectives of the applicability of Artificial Intelligence in Judicial Management. The method employed will be exploratory research to analyze information from reviewed articles, legal reports, and official websites. Possible indicators of issues in AI applicability in judicial management, current and future trends of AI in judicial management, and an appropriate conceptual model for AI applicability in judicial management were identified. It was concluded that the application of artificial intelligence in judicial management remains a challenge and an ongoing issue because it currently does not inspire confidence in decision-making processes.


Prototype to mitigate risks for the closure of a company with the support of Information Technologies

October 2024

·

8 Reads

·

1 Citation

Journal of Ecohumanism

The problems of business closures (SMEs) are constant in the world and in Ecuador due to the lack of application of appropriate management models that allow the conversion of strategies. The deductive method was used for exploratory research of the information related to the research topic. The objective is to design a prototype to mitigate risks and prevent threats to avoid the closure of this type of companies. The result was a conceptual model to minimize risks, a risk control prototype, a prototype flow chart, a simulation of processes with five scenarios, determination of the formula to detect the probability of closure as an SME and risk analysis and evaluation. It was concluded that the proposed prototype to detect threats and vulnerabilities provides an optimal security model for small and medium-sized companies; as a result of the simulations, a security percentage of 77.92% was established, which means that the greater the number of risks and threats, the greater the probability that a small and medium-sized company will close.

Citations (2)


... Ecuador, through the Ministry of Telecommunications and Information Society (MINTEL), is seeking alternatives to improve cybersecurity governance with a plan that addresses the following topics: Information Security and responsible use of ICT, Digital Economy, Emerging Technologies for Sustainable Development, Digital Citizen, Strengthening Digital Inclusion and Protection of Personal Data to define an appropriate framework for cybersecurity governance (Ecuador, 2025). The authors determine that Ecuador lacks legal support for cybersecurity governance management using artificial intelligence and new technologies such as blockchain; they suggest creating a legal structure with the definition of judges specialized in information and communications technologies similar to traffic, criminal, and civil judges, among others (Durango et al., 2025). They determine that it is necessary to define indicators related to the legal basis and information technologies, carry out a statistical analysis of the National Cybersecurity Index (INCIS), and identify the relevant actors for the globalization of information security (Armas et al., 2024). ...

Reference:

Perspectives on a Cybersecurity Governance Framework Integrating Blockchain, Artificial Intelligence, and Legal Base for one Organization
Analysis for the Formulation Of A Project for the Management of Cybersecurity Governance for the Optimization of Resources in an Organization

Journal of Ecohumanism

... They determine that the lack of adequate models based on information technologies for the management of administrative processes has caused immense damage to public and private companies, higher education institutions, among others. They state that one of the options to improve the management of administrative processes is the generation of a conceptual model to minimize risks, a risk control prototype, a flow chart of the prototype, a process simulation with five scenarios, determination of the formula to detect the probability of a company closing, analysis and evaluation of risks; this structure can be applied in the management of remote laboratories for the optimization of administrative processes (Altamirano et al., 2024). They state that the legal basis must currently be applied in all areas of ICT that are going to be implemented. ...

Prototype to mitigate risks for the closure of a company with the support of Information Technologies

Journal of Ecohumanism