skip to main content
10.1145/3375900.3375912acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicetmConference Proceedingsconference-collections
research-article

Analysis of Cybersecurity Models Suitable to Apply in an Electoral Process in Ecuador

Published:07 February 2020Publication History

ABSTRACT

Were analyzed different cybersecurity proposals to protect information, such as models, prototypes, approaches, frameworks, algorithms and evaluations. The problem is the lack of application of cybersecurity to electoral processes in Ecuador. The objective is to make an appropriate cybersecurity model to apply in an electoral process in Ecuador. The quantitative, descriptive, deductive reasoning was used to analyze the reference documents. It turned out a Conceptual Cybersecurity Model, a Cybersecurity Algorithm and a General Risk Formula. It was concluded that the model strengthens information security in the electoral process and asset risk assessment prioritizes the attention of vulnerabilities.

References

  1. S. M. T. Toapanta, M. A. M. Anchundia, L. E. G. Mafia, and J. A. T. Orizaga, "Biometric Systems Approach Applied to a Conceptual Model to Mitigate the Integrity of the Information," in 2018 International Conference on Computer, Information and Telecommunication Systems (CITS), 2018, pp. 1--5, DOI 10.1109/CITS.2018.8440178.Google ScholarGoogle Scholar
  2. R. Sabillon, J. Serra-Ruiz, V. Cavaller, and J. Cano, "A Comprehensive Cybersecurity Audit Model to Improve Cybersecurity Assurance: The CyberSecurity Audit Model (CSAM)," in 2017 International Conference on Information Systems and Computer Science (INCISCOS), 2017, vol. 2017-Novem, pp. 253--259, DOI 10.1109/INCISCOS.2017.20.Google ScholarGoogle Scholar
  3. G. Parekh et al., "Identifying Core Concepts of Cybersecurity: Results of Two Delphi Processes," IEEE Trans. Educ., vol. 61, no. 1, pp. 11--20, Feb. 2018, DOI 10.1109/TE.2017.2715174.Google ScholarGoogle ScholarCross RefCross Ref
  4. F. Sharevski, A. Trowbridge, and J. Westbrook, "Novel approach for cybersecurity workforce development: A course in secure design," in 2018 IEEE Integrated STEM Education Conference (ISEC), 2018, vol. 2018-Janua, no. c, pp. 175--180, DOI 10.1109/ISECon.2018.8340471.Google ScholarGoogle Scholar
  5. J. Kosseff, "Developing collaborative and cohesive cybersecurity legal principles," in 2018 10th International Conference on Cyber Conflict (CyCon), 2018, vol. 2018-May, pp. 283--298, DOI 10.23919/CYCON.2018.8405022.Google ScholarGoogle Scholar
  6. Alsmadi and M. Zarour, "Cybersecurity Programs in Saudi Arabia: Issues and Recommendations," in 2018 1st International Conference on Computer Applications & Information Security (ICCAIS), 2018, pp. 1--5, DOI 10.1109/CAIS.2018.8442013.Google ScholarGoogle Scholar
  7. S. M. T. Toapanta, I. F. M. Saá, F. G. M. Quimi, and L. E. M. Gallegos, "An Approach to Vulnerabilities, Threats and Risk in Voting Systems for Popular Elections in Latin America," Adv. Sci. Technol. Eng. Syst. J., vol. 4, no. 3, 2019, DOI 10.25046/aj040315.Google ScholarGoogle ScholarCross RefCross Ref
  8. S. A. Silva et al., "NEC Objectives administrative units," no. 1, pp. 8--9, 2019.Google ScholarGoogle Scholar
  9. P. Rathod and T. Hamalainen, "A Novel Model for Cybersecurity Economics and Analysis," in 2017 IEEE International Conference on Computer and Information Technology (CIT), 2017, pp. 274--279, DOI 10.1109/CIT.2017.65.Google ScholarGoogle Scholar
  10. M. Rea-Guaman, J. A. Calvo-Manzano, and T. S. Feliu, "A prototype to manage cybersecurity in small companies," in 2018 13th Iberian Conference on Information Systems and Technologies (CISTI), 2018, vol. 2018-June, pp. 1--6, DOI 10.23919/CISTI.2018.8399252.Google ScholarGoogle Scholar
  11. M. Toapanta, J. Mero, D. Huilcapi, M. Tandazo, A. Orizaga, and E. Mafla, "A Blockchain Approach to Mitigate Information Security in a Public Organization for Ecuador," IOP Conf. Ser. Mater. Sci. Eng., vol. 423, no. 1, p. 012164, Nov. 2018, DOI 10.1088/1757-899X/423/1/012164.Google ScholarGoogle ScholarCross RefCross Ref
  12. M. Mylrea, S. N. G. Gourisetti, and A. Nicholls, "An introduction to buildings cybersecurity framework," in 2017 IEEE Symposium Series on Computational Intelligence (SSCI), 2017, vol. 2018-Janua, pp. 1--7, DOI 10.1109/SSCI.2017.8285228.Google ScholarGoogle Scholar
  13. M. Chronopoulos, E. Panaousis, and J. Grossklags, "An Options Approach to Cybersecurity Investment," IEEE Access, vol. 6, pp. 12175--12186, 2018, DOI 10.1109/ACCESS.2017.2773366.Google ScholarGoogle ScholarCross RefCross Ref
  14. M. Toapanta, J. Nazareno, R. Tingo, F. Mendoza, A. Orizaga, and E. Mafla, "Analysis of the Appropriate Security Models to Apply in a Distributed Architecture," IOP Conf. Ser. Mater. Sci. Eng., vol. 423, no. 1, p. 012165, Nov. 2018, DOI 10.1088/1757-899X/423/1/012165.Google ScholarGoogle ScholarCross RefCross Ref
  15. N. Gupta Gourisetti, M. Mylrea, and H. Patangia, "Application of Rank-Weight Methods to Blockchain Cybersecurity Vulnerability Assessment Framework," in 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), 2019, pp. 0206--0213, DOI 10.1109/CCWC.2019.8666518.Google ScholarGoogle Scholar
  16. Strielkina, O. Illiashenko, M. Zhydenko, and D. Uzun, "Cybersecurity of healthcare IoT-based systems: Regulation and case-oriented assessment," in 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT), 2018, pp. 67--73, DOI 10.1109/DESSERT.2018.8409101.Google ScholarGoogle Scholar
  17. R. de Bruin and S. H. von Solms, "Humanitarian perspective of cybersecurity and cybersecurity governance," in 2017 IST-Africa Week Conference (IST-Africa), 2017, pp. 1--10, DOI 10.23919/ISTAFRICA.2017.8102388.Google ScholarGoogle Scholar
  18. Mulyadi and D. Rahayu, "Indonesia National Cybersecurity Review: Before and After Establishment National Cyber and Crypto Agency (BSSN)," in 2018 6th International Conference on Cyber and IT Service Management (CITSM), 2018, no. Citsm, pp. 1--6, DOI 10.1109/CITSM.2018.8674265.Google ScholarGoogle Scholar
  19. R. M. Savola, "Current level of cybersecurity competence and future development," in Proceedings of the 11th European Conference on Software Architecture Companion Proceedings - ECSA '17, 2017, vol. Part F1305, pp. 121--124, DOI 10.1145/3129790.3129804.Google ScholarGoogle Scholar
  20. B. Nussbaum and S. Park, "A tough decision made easy?," in Proceedings of the 19th Annual International Conference on Digital Government Research Governance in the Data Age - dgo '18, 2018, pp. 1--9, DOI 10.1145/3209281.3209368.Google ScholarGoogle Scholar
  21. L. Fichtner, W. Pieters, and A. Teixeira, "Cybersecurity as a Politikum," in Proceedings of the 2016 New Security Paradigms Workshop on - NSPW, 2016, vol. 26-29-Sept, pp. 36--48, DOI 10.1145/3011883.3011887.Google ScholarGoogle Scholar
  22. M. Kikuchi and T. Okubo, "Cyber Governance Complex in Firms," in Proceedings of the 2nd International Conference on Control and Computer Vision - ICCCV 2019, 2019, pp. 116--120, DOI 10.1145/3341016.3341037.Google ScholarGoogle Scholar
  23. W. Burke, T. Oseni, A. Jolfaei, and I. Gondal, "Cybersecurity Indexes for eHealth," in Proceedings of the Australasian Computer Science Week Multiconference on - ACSW 2019, 2019, pp. 1--8, DOI 10.1145/3290688.3290721.Google ScholarGoogle Scholar
  24. T. Chen, J. Hammer, and L. Dabbish, "Self-Efficacy-Based Game Design to Encourage Security Behavior Online," in Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems - CHI EA '19, 2019, pp. 1--6, DOI 10.1145/3290607.3312935.Google ScholarGoogle Scholar
  25. Nacional, "Ley-electoral-CodigoDemocria-Ecuador.pdf."Google ScholarGoogle Scholar

Index Terms

  1. Analysis of Cybersecurity Models Suitable to Apply in an Electoral Process in Ecuador

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICETM '19: Proceedings of the 2019 2nd International Conference on Education Technology Management
      December 2019
      126 pages
      ISBN:9781450376297
      DOI:10.1145/3375900

      Copyright © 2019 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 7 February 2020

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)11
      • Downloads (Last 6 weeks)0

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader