Skip to main content

Impact on the Information Security Management Due to the Use of Social Networks in a Public Organization in Ecuador

  • Conference paper
  • First Online:
Book cover Smart Trends in Computing and Communications

Abstract

It analyzed the management for the dissemination of government information in social networks and security management models applied to communicate with society. The problem is the lack of a model that integrates a security scheme to expose information from a government organization on social networks. The objective is to define a generic algorithm prototype for security policies application. It used the deductive method and exploratory research to analyze the information of the reference articles. It turned out the following: Guidelines for defining information security policies, General scheme of information security policies, Mathematical description to measure impact, and Generic algorithm prototype for the security policies application using flowchart techniques. It was concluded that for the exposure and socialization of information from a government organization to society, it is recommended to have alternatives that allow mitigating the risks, threats, and vulnerabilities of information such as integrated security models, security policies, responsible, technologies, and adequate cryptographic algorithms to improve the confidentiality, integrity, and authenticity of the information based on its mission, vision, strategic objectives of each government organization, and legal provisions such as the LOTAIP 2017 among others.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Rahmanto, A., Dirgatama, C.: The implementation of e-government through social media use in local government of Solo Raya. In: 2018 International Conference on Information and Communications Technology (ICOIACT), January 2018, vol. 83, pp. 765–768 (2018). https://doi.org/10.1109/icoiact.2018.8350763

  2. Davidekova, M., Gregus, M.: Social network types: an emergency social network approach—a concept of possible inclusion of emergency posts in social networks through an API. In: 2017 IEEE International Conference on Cognitive Computing (ICCC), 40–47 (2017). https://doi.org/10.1109/ieee.iccc.2017.13

  3. Ghodpage, N., Mante, R.: Privacy preserving and information sharing in decentralized online social network. In: 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT), pp. 152–155 (2018). https://doi.org/10.1109/icicct.2018.8473268

  4. Alzahrani, T., Horadam, K.: Analysis of two crime-related networks derived from bi-partite social networks. In: 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014), pp. 890–897 (2014). https://doi.org/10.1109/asonam.2014.6921691

  5. Jain, V., Sakhuja, S.: Structural investigation of a healthcare value chain: a social network analysis approach. In: 2014 IEEE International Conference on Industrial Engineering and Engineering Management, January 2015, pp. 179–183 (2014). https://doi.org/10.1109/ieem.2014.7058624

  6. Rong, Y., Xu E.: Strategies for the management of the government affairs microblogs in China based on the SNA of fifty government affairs microblogs in Beijing. In: 2017 International Conference on Service Systems and Service Management (2017). https://doi.org/10.1109/icsssm.2017.7996282

  7. Al-Wahaibi, H., Al-Mukhaini, E., Al-Badi, A., Ali, S.: A case study of the employment of social media in government agencies in Oman. In: 2015 IEEE 8th GCC Conference and Exhibition, pp. 1–4 (2015). https://doi.org/10.1109/ieeegcc.2015.7060089

  8. Sari, P., Prasetio, A.: Knowledge sharing and electronic word of mouth to promote information security awareness in social network site. In: 2017 International Workshop on Big Data and Information Security (IWBIS), pp. 113–117 (2017). https://doi.org/10.1109/iwbis.2017.8275111

  9. Secretaria Nacional de Planificacion y Desarrollo. Quito: Plan Nacional Buen Vivir 2013–2017 (2013)

    Google Scholar 

  10. Straton, N., Vatrapu, R., Rao Mukkamala, R.: Facebook and public health: a study to understand facebook post performance with organizations’ Strategy. In: 2017 IEEE International Conference on Big Data (BIGDATA) Facebook C(60) (2017). https://doi.org/10.1109/bigdata.2017.8258288

  11. Fire, M., Goldschmidt, R., Elovici, Y.: Online social networks: threats and solutions. IEEE Commun. Surv. Tutor. 16(4), 2019–2036 (2014). https://doi.org/10.1109/comst.2014.2321628

    Article  Google Scholar 

  12. Ismail, W., Widyarto, S., Ahmad, R., Ghani, K.: A generic framework for information security policy development. In: 2017 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), vol. 4, pp. 324–329 (2017). https://doi.org/10.1109/eecsi.2017.8239132

  13. Kalaimannan, E., Gupta, J.: The security development lifecycle in the context of accreditation policies and standards. IEEE Secur. Priv. 15(1), 52–57 (2017). https://doi.org/10.1109/msp.2017.14

    Article  Google Scholar 

  14. Alotaibi, M., Furnell, S., Clarke, N.: Information security policies: a review of challenges and influencing factors. In: 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 352–358 (2016). https://doi.org/10.1109/icitst.2016.7856729

  15. Pieters, W., Dimkov, T., Pavlovic, D.: Security policy alignment: a formal approach. IEEE Syst. J. 7(2), 275–287 (2013). https://doi.org/10.1109/jsyst.2012.2221933

    Article  Google Scholar 

  16. Warner, M.: Notes on the evolution of computer security policy in the US government, 1965–2003. IEEE Ann. Hist. Comput. 37(2), 8–18 (2015). https://doi.org/10.1109/mahc.2015.25

    Article  Google Scholar 

  17. Prayitno, O., Cizela da Costa Tavares, O., Damaini, A., Setyohadi, D.: Regulatory framework creation analysis to reduce security risks the use of social media in companies. In: 2017 4th International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE), pp. 235–238 (2017). https://doi.org/10.1109/icitacee.2017.8257709

  18. Tecnologías de la Información y Comunicación Contenido. INEC (2017)

    Google Scholar 

  19. Personas que usan Internet (% de la población)|Data. Datosbancomundialorg. https://datos.bancomundial.org/indica-dor/IT.NET.USER.ZS?end=2017&locations=EC&start=1995. Accessed 5 Jan 2019

  20. Ecuador, A.: Agencia de Regulación y Control de las Telecomunicaciones|Ecuador Servicio de acceso a internet (SAI). Agencia de Regulación y Control de las Tele-comunicaciones|Ecuador (2019). http://www.arcotel.gob.ec/servicio-acceso-internet/. Accessed 5 Jan 2019

Download references

Acknowledgements

The authors thank Universidad Politécnica Salesiana del Ecuador, the research group of the Guayaquil Headquarters “Computing, Security and Information Technology for a Globalized World” (CSITGW) created according to resolution 142-06-2017-07-19, and Secretaría de Educación Superior Ciencia, Tecnología e Innovación (Senescyt).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Segundo Moisés Toapanta Toapanta .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Toapanta, S.M.T., Quimi, F.G.M., Lambogglia, L.M.R., Gallegos, L.E.M. (2020). Impact on the Information Security Management Due to the Use of Social Networks in a Public Organization in Ecuador. In: Zhang, YD., Mandal, J., So-In, C., Thakur, N. (eds) Smart Trends in Computing and Communications. Smart Innovation, Systems and Technologies, vol 165. Springer, Singapore. https://doi.org/10.1007/978-981-15-0077-0_6

Download citation

Publish with us

Policies and ethics