Advertisement

Impact on the Information Security Management Due to the Use of Social Networks in a Public Organization in Ecuador

  • Segundo Moisés Toapanta ToapantaEmail author
  • Félix Gustavo Mendoza Quimi
  • Leslie Melanie Romero Lambogglia
  • Luis Enrique Mafla Gallegos
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 165)

Abstract

It analyzed the management for the dissemination of government information in social networks and security management models applied to communicate with society. The problem is the lack of a model that integrates a security scheme to expose information from a government organization on social networks. The objective is to define a generic algorithm prototype for security policies application. It used the deductive method and exploratory research to analyze the information of the reference articles. It turned out the following: Guidelines for defining information security policies, General scheme of information security policies, Mathematical description to measure impact, and Generic algorithm prototype for the security policies application using flowchart techniques. It was concluded that for the exposure and socialization of information from a government organization to society, it is recommended to have alternatives that allow mitigating the risks, threats, and vulnerabilities of information such as integrated security models, security policies, responsible, technologies, and adequate cryptographic algorithms to improve the confidentiality, integrity, and authenticity of the information based on its mission, vision, strategic objectives of each government organization, and legal provisions such as the LOTAIP 2017 among others.

Keywords

Social networks Public organization Information security Security scheme Confidentiality 

Notes

Acknowledgements

The authors thank Universidad Politécnica Salesiana del Ecuador, the research group of the Guayaquil Headquarters “Computing, Security and Information Technology for a Globalized World” (CSITGW) created according to resolution 142-06-2017-07-19, and Secretaría de Educación Superior Ciencia, Tecnología e Innovación (Senescyt).

References

  1. 1.
    Rahmanto, A., Dirgatama, C.: The implementation of e-government through social media use in local government of Solo Raya. In: 2018 International Conference on Information and Communications Technology (ICOIACT), January 2018, vol. 83, pp. 765–768 (2018).  https://doi.org/10.1109/icoiact.2018.8350763
  2. 2.
    Davidekova, M., Gregus, M.: Social network types: an emergency social network approach—a concept of possible inclusion of emergency posts in social networks through an API. In: 2017 IEEE International Conference on Cognitive Computing (ICCC), 40–47 (2017).  https://doi.org/10.1109/ieee.iccc.2017.13
  3. 3.
    Ghodpage, N., Mante, R.: Privacy preserving and information sharing in decentralized online social network. In: 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT), pp. 152–155 (2018).  https://doi.org/10.1109/icicct.2018.8473268
  4. 4.
    Alzahrani, T., Horadam, K.: Analysis of two crime-related networks derived from bi-partite social networks. In: 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014), pp. 890–897 (2014).  https://doi.org/10.1109/asonam.2014.6921691
  5. 5.
    Jain, V., Sakhuja, S.: Structural investigation of a healthcare value chain: a social network analysis approach. In: 2014 IEEE International Conference on Industrial Engineering and Engineering Management, January 2015, pp. 179–183 (2014).  https://doi.org/10.1109/ieem.2014.7058624
  6. 6.
    Rong, Y., Xu E.: Strategies for the management of the government affairs microblogs in China based on the SNA of fifty government affairs microblogs in Beijing. In: 2017 International Conference on Service Systems and Service Management (2017).  https://doi.org/10.1109/icsssm.2017.7996282
  7. 7.
    Al-Wahaibi, H., Al-Mukhaini, E., Al-Badi, A., Ali, S.: A case study of the employment of social media in government agencies in Oman. In: 2015 IEEE 8th GCC Conference and Exhibition, pp. 1–4 (2015).  https://doi.org/10.1109/ieeegcc.2015.7060089
  8. 8.
    Sari, P., Prasetio, A.: Knowledge sharing and electronic word of mouth to promote information security awareness in social network site. In: 2017 International Workshop on Big Data and Information Security (IWBIS), pp. 113–117 (2017).  https://doi.org/10.1109/iwbis.2017.8275111
  9. 9.
    Secretaria Nacional de Planificacion y Desarrollo. Quito: Plan Nacional Buen Vivir 2013–2017 (2013)Google Scholar
  10. 10.
    Straton, N., Vatrapu, R., Rao Mukkamala, R.: Facebook and public health: a study to understand facebook post performance with organizations’ Strategy. In: 2017 IEEE International Conference on Big Data (BIGDATA) Facebook C(60) (2017).  https://doi.org/10.1109/bigdata.2017.8258288
  11. 11.
    Fire, M., Goldschmidt, R., Elovici, Y.: Online social networks: threats and solutions. IEEE Commun. Surv. Tutor. 16(4), 2019–2036 (2014).  https://doi.org/10.1109/comst.2014.2321628CrossRefGoogle Scholar
  12. 12.
    Ismail, W., Widyarto, S., Ahmad, R., Ghani, K.: A generic framework for information security policy development. In: 2017 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), vol. 4, pp. 324–329 (2017).  https://doi.org/10.1109/eecsi.2017.8239132
  13. 13.
    Kalaimannan, E., Gupta, J.: The security development lifecycle in the context of accreditation policies and standards. IEEE Secur. Priv. 15(1), 52–57 (2017).  https://doi.org/10.1109/msp.2017.14CrossRefGoogle Scholar
  14. 14.
    Alotaibi, M., Furnell, S., Clarke, N.: Information security policies: a review of challenges and influencing factors. In: 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 352–358 (2016).  https://doi.org/10.1109/icitst.2016.7856729
  15. 15.
    Pieters, W., Dimkov, T., Pavlovic, D.: Security policy alignment: a formal approach. IEEE Syst. J. 7(2), 275–287 (2013).  https://doi.org/10.1109/jsyst.2012.2221933CrossRefGoogle Scholar
  16. 16.
    Warner, M.: Notes on the evolution of computer security policy in the US government, 1965–2003. IEEE Ann. Hist. Comput. 37(2), 8–18 (2015).  https://doi.org/10.1109/mahc.2015.25CrossRefGoogle Scholar
  17. 17.
    Prayitno, O., Cizela da Costa Tavares, O., Damaini, A., Setyohadi, D.: Regulatory framework creation analysis to reduce security risks the use of social media in companies. In: 2017 4th International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE), pp. 235–238 (2017).  https://doi.org/10.1109/icitacee.2017.8257709
  18. 18.
    Tecnologías de la Información y Comunicación Contenido. INEC (2017)Google Scholar
  19. 19.
    Personas que usan Internet (% de la población)|Data. Datosbancomundialorg. https://datos.bancomundial.org/indica-dor/IT.NET.USER.ZS?end=2017&locations=EC&start=1995. Accessed 5 Jan 2019
  20. 20.
    Ecuador, A.: Agencia de Regulación y Control de las Telecomunicaciones|Ecuador Servicio de acceso a internet (SAI). Agencia de Regulación y Control de las Tele-comunicaciones|Ecuador (2019). http://www.arcotel.gob.ec/servicio-acceso-internet/. Accessed 5 Jan 2019

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.Department Computer ScienceUniversidad Politécnica Salesiana Del EcuadorGuayaquilEcuador
  2. 2.Department Computer ScienceEscuela Politécnica NacionalQuitoEcuador

Personalised recommendations