Rodrigo Humberto Del Pozo Durango’s research while affiliated with Universidad Estatal de Bolívar and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (8)


Figure 1. Simulation of the Evaluation Carried Out on the Relevant Actors
Figure 2. Algorithm for Formulating Projects for Cybersecurity Governance
Indicators To Support the Formulation of a Project for Cybersecurity Governance.
Proposed Solutions Related to the Formulation of Projects for Cybersecurity Governance
Likert Scale Design

+1

Analysis for the Formulation Of A Project for the Management of Cybersecurity Governance for the Optimization of Resources in an Organization
  • Article
  • Full-text available

January 2025

·

67 Reads

Journal of Ecohumanism

Rodrigo Del Pozo Durango

·

Moisés Toapanta T

·

Zharayth Gómez D

·

[...]

·

Roció Maciel A

Persistent Challenges in Cybersecurity Governance Project Formulation: A Case Study in Ecuador and Beyond. The formulation of projects aimed at managing cybersecurity governance to optimize organizational resources presents persistent challenges both in Ecuador and globally. Among the most prevalent issues are: A lack of knowledge in identifying relevant standards and policies, Insufficient human resources with expertise and training in cybersecurity, and Deficiencies in norms, prototypes, and appropriate project management models for cybersecurity governance. The objective of this research is to perform the analysis for the formulation of a project for managing cybersecurity governance to optimize resources in an organization. A deductive approach and exploratory research methods were employed to analyze relevant documents and literature. Key Findings: Indicators to support the formulation of cybersecurity governance projects, Proposed solutions for project formulation in cybersecurity governance, Identification of relevant stakeholders essential for project development and resource optimization, Algorithm development utilizing flowchart techniques for project formulation. Conclusions: Simulation results, evaluated through the Likert scale and expert judgment, revealed varying levels of satisfaction: Scenarios 1 and 3: Satisfaction below 75% – indicating dissatisfaction, Scenarios 2 and 4: Satisfaction between 76% and 94% – indicating satisfaction, Scenario 5: Satisfaction between 95% and 100% – indicating high satisfaction. It is concluded that to ensure successful project formulation, all key stakeholders must achieve satisfaction levels exceeding 75%.

Download

Analysis of possible solutions related to remote laboratories.
Definition of categories with their indicators.
Information Security Management in a Higher Education Institution Based on Standards, Legal Basis for the Optimization of Administrative Resources

December 2024

·

18 Reads

Journal of Ecohumanism

Problems in managing information security for access to remote laboratories in higher education institutions are persistent worldwide. The objective of this research is to define alternatives to mitigate risks, vulnerabilities and threats in a remote laboratory for the management of information of students, teachers and administrators in a higher education institution. The deductive method and exploratory research were used with the application of seven phases defined by the authors. It resulted a simulation of the evaluation of the information security of a remote laboratory, an Architecture of a remote laboratory integrating virtual learning environments and a Model for the integration of information security in remote laboratories. It was concluded that information security analysis to mitigate risks, vulnerabilities and threats in a remote laboratory of a higher education institution is crucial to guarantee data protection, experiment management and integrity, confidentiality and availability (CIA). for information management of students, teachers and administrators; considering the optimization of administrative processes and the legal basis.


Prototype to mitigate risks for the closure of a company with the support of Information Technologies

October 2024

·

8 Reads

·

1 Citation

Journal of Ecohumanism

The problems of business closures (SMEs) are constant in the world and in Ecuador due to the lack of application of appropriate management models that allow the conversion of strategies. The deductive method was used for exploratory research of the information related to the research topic. The objective is to design a prototype to mitigate risks and prevent threats to avoid the closure of this type of companies. The result was a conceptual model to minimize risks, a risk control prototype, a prototype flow chart, a simulation of processes with five scenarios, determination of the formula to detect the probability of closure as an SME and risk analysis and evaluation. It was concluded that the proposed prototype to detect threats and vulnerabilities provides an optimal security model for small and medium-sized companies; as a result of the simulations, a security percentage of 77.92% was established, which means that the greater the number of risks and threats, the greater the probability that a small and medium-sized company will close.






Citations (2)


... They determine that the lack of adequate models based on information technologies for the management of administrative processes has caused immense damage to public and private companies, higher education institutions, among others. They state that one of the options to improve the management of administrative processes is the generation of a conceptual model to minimize risks, a risk control prototype, a flow chart of the prototype, a process simulation with five scenarios, determination of the formula to detect the probability of a company closing, analysis and evaluation of risks; this structure can be applied in the management of remote laboratories for the optimization of administrative processes (Altamirano et al., 2024). They state that the legal basis must currently be applied in all areas of ICT that are going to be implemented. ...

Reference:

Information Security Management in a Higher Education Institution Based on Standards, Legal Basis for the Optimization of Administrative Resources
Prototype to mitigate risks for the closure of a company with the support of Information Technologies

Journal of Ecohumanism

... Additional security measures encompass password management, multi-factor authentication (e.g., security questions, token-based, biometrics), spam filtering, updated antivirus software and systems, use of secure protocols, and digital watermarking, (Aborujilah et al., 2023;Arina & Anatolie, 2021;Huerta Suárez et al., 2024). Additionally, this study also established that an AI-powered security framework, engineered to identify irregularities and recognize prospective threats, can serve as a beneficial technological approach to bolster information security within higher education establishments (Toapanta et al., 2023). ...

Proposal for a security model applying artificial intelligence for administrative management in a higher education institution
  • Citing Conference Paper
  • July 2023