Abstract
It analyzed the management for the dissemination of government information in social networks and security management models applied to communicate with society. The problem is the lack of a model that integrates a security scheme to expose information from a government organization on social networks. The objective is to define a generic algorithm prototype for security policies application. It used the deductive method and exploratory research to analyze the information of the reference articles. It turned out the following: Guidelines for defining information security policies, General scheme of information security policies, Mathematical description to measure impact, and Generic algorithm prototype for the security policies application using flowchart techniques. It was concluded that for the exposure and socialization of information from a government organization to society, it is recommended to have alternatives that allow mitigating the risks, threats, and vulnerabilities of information such as integrated security models, security policies, responsible, technologies, and adequate cryptographic algorithms to improve the confidentiality, integrity, and authenticity of the information based on its mission, vision, strategic objectives of each government organization, and legal provisions such as the LOTAIP 2017 among others.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Rahmanto, A., Dirgatama, C.: The implementation of e-government through social media use in local government of Solo Raya. In: 2018 International Conference on Information and Communications Technology (ICOIACT), January 2018, vol. 83, pp. 765–768 (2018). https://doi.org/10.1109/icoiact.2018.8350763
Davidekova, M., Gregus, M.: Social network types: an emergency social network approach—a concept of possible inclusion of emergency posts in social networks through an API. In: 2017 IEEE International Conference on Cognitive Computing (ICCC), 40–47 (2017). https://doi.org/10.1109/ieee.iccc.2017.13
Ghodpage, N., Mante, R.: Privacy preserving and information sharing in decentralized online social network. In: 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT), pp. 152–155 (2018). https://doi.org/10.1109/icicct.2018.8473268
Alzahrani, T., Horadam, K.: Analysis of two crime-related networks derived from bi-partite social networks. In: 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014), pp. 890–897 (2014). https://doi.org/10.1109/asonam.2014.6921691
Jain, V., Sakhuja, S.: Structural investigation of a healthcare value chain: a social network analysis approach. In: 2014 IEEE International Conference on Industrial Engineering and Engineering Management, January 2015, pp. 179–183 (2014). https://doi.org/10.1109/ieem.2014.7058624
Rong, Y., Xu E.: Strategies for the management of the government affairs microblogs in China based on the SNA of fifty government affairs microblogs in Beijing. In: 2017 International Conference on Service Systems and Service Management (2017). https://doi.org/10.1109/icsssm.2017.7996282
Al-Wahaibi, H., Al-Mukhaini, E., Al-Badi, A., Ali, S.: A case study of the employment of social media in government agencies in Oman. In: 2015 IEEE 8th GCC Conference and Exhibition, pp. 1–4 (2015). https://doi.org/10.1109/ieeegcc.2015.7060089
Sari, P., Prasetio, A.: Knowledge sharing and electronic word of mouth to promote information security awareness in social network site. In: 2017 International Workshop on Big Data and Information Security (IWBIS), pp. 113–117 (2017). https://doi.org/10.1109/iwbis.2017.8275111
Secretaria Nacional de Planificacion y Desarrollo. Quito: Plan Nacional Buen Vivir 2013–2017 (2013)
Straton, N., Vatrapu, R., Rao Mukkamala, R.: Facebook and public health: a study to understand facebook post performance with organizations’ Strategy. In: 2017 IEEE International Conference on Big Data (BIGDATA) Facebook C(60) (2017). https://doi.org/10.1109/bigdata.2017.8258288
Fire, M., Goldschmidt, R., Elovici, Y.: Online social networks: threats and solutions. IEEE Commun. Surv. Tutor. 16(4), 2019–2036 (2014). https://doi.org/10.1109/comst.2014.2321628
Ismail, W., Widyarto, S., Ahmad, R., Ghani, K.: A generic framework for information security policy development. In: 2017 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), vol. 4, pp. 324–329 (2017). https://doi.org/10.1109/eecsi.2017.8239132
Kalaimannan, E., Gupta, J.: The security development lifecycle in the context of accreditation policies and standards. IEEE Secur. Priv. 15(1), 52–57 (2017). https://doi.org/10.1109/msp.2017.14
Alotaibi, M., Furnell, S., Clarke, N.: Information security policies: a review of challenges and influencing factors. In: 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 352–358 (2016). https://doi.org/10.1109/icitst.2016.7856729
Pieters, W., Dimkov, T., Pavlovic, D.: Security policy alignment: a formal approach. IEEE Syst. J. 7(2), 275–287 (2013). https://doi.org/10.1109/jsyst.2012.2221933
Warner, M.: Notes on the evolution of computer security policy in the US government, 1965–2003. IEEE Ann. Hist. Comput. 37(2), 8–18 (2015). https://doi.org/10.1109/mahc.2015.25
Prayitno, O., Cizela da Costa Tavares, O., Damaini, A., Setyohadi, D.: Regulatory framework creation analysis to reduce security risks the use of social media in companies. In: 2017 4th International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE), pp. 235–238 (2017). https://doi.org/10.1109/icitacee.2017.8257709
Tecnologías de la Información y Comunicación Contenido. INEC (2017)
Personas que usan Internet (% de la población)|Data. Datosbancomundialorg. https://datos.bancomundial.org/indica-dor/IT.NET.USER.ZS?end=2017&locations=EC&start=1995. Accessed 5 Jan 2019
Ecuador, A.: Agencia de Regulación y Control de las Telecomunicaciones|Ecuador Servicio de acceso a internet (SAI). Agencia de Regulación y Control de las Tele-comunicaciones|Ecuador (2019). http://www.arcotel.gob.ec/servicio-acceso-internet/. Accessed 5 Jan 2019
Acknowledgements
The authors thank Universidad Politécnica Salesiana del Ecuador, the research group of the Guayaquil Headquarters “Computing, Security and Information Technology for a Globalized World” (CSITGW) created according to resolution 142-06-2017-07-19, and Secretaría de Educación Superior Ciencia, Tecnología e Innovación (Senescyt).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Toapanta, S.M.T., Quimi, F.G.M., Lambogglia, L.M.R., Gallegos, L.E.M. (2020). Impact on the Information Security Management Due to the Use of Social Networks in a Public Organization in Ecuador. In: Zhang, YD., Mandal, J., So-In, C., Thakur, N. (eds) Smart Trends in Computing and Communications. Smart Innovation, Systems and Technologies, vol 165. Springer, Singapore. https://doi.org/10.1007/978-981-15-0077-0_6
Download citation
DOI: https://doi.org/10.1007/978-981-15-0077-0_6
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-0076-3
Online ISBN: 978-981-15-0077-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)