Cybersecurity and Business Continuity in Pandemic Times
Este documento se enmarca en el contexto del proyecto de investigación en curso titulado "Diseño de un mecanismo de resiliencia cibernética para la continuidad del negocio en las organizaciones”, teniendo como objetivo presentan el contexto de la ciberseguridad en este tiempo de pandemia, donde...
- Autores:
-
Hernández Bejarano, Miguel
Simanca Herrera, Fredys Alberto
Páez Páez, Jaime Alberto
Castro, Mario Fernando
Cortés Méndez, Jairo Augusto
- Tipo de recurso:
- Article of journal
- Fecha de publicación:
- 2021
- Institución:
- Universidad Cooperativa de Colombia
- Repositorio:
- Repositorio UCC
- Idioma:
- OAI Identifier:
- oai:repository.ucc.edu.co:20.500.12494/49046
- Acceso en línea:
- https://hdl.handle.net/20.500.12494/49046
- Palabra clave:
- La seguridad cibernética
COVID-19
Continuidad del negocio
Cybersecurity
COVID-19
Business continuity
- Rights
- openAccess
- License
- http://purl.org/coar/access_right/c_abf2
id |
COOPER2_b28823b9e3828f6ad0795d73d423ca36 |
---|---|
oai_identifier_str |
oai:repository.ucc.edu.co:20.500.12494/49046 |
network_acronym_str |
COOPER2 |
network_name_str |
Repositorio UCC |
repository_id_str |
|
dc.title.none.fl_str_mv |
Cybersecurity and Business Continuity in Pandemic Times |
title |
Cybersecurity and Business Continuity in Pandemic Times |
spellingShingle |
Cybersecurity and Business Continuity in Pandemic Times La seguridad cibernética COVID-19 Continuidad del negocio Cybersecurity COVID-19 Business continuity |
title_short |
Cybersecurity and Business Continuity in Pandemic Times |
title_full |
Cybersecurity and Business Continuity in Pandemic Times |
title_fullStr |
Cybersecurity and Business Continuity in Pandemic Times |
title_full_unstemmed |
Cybersecurity and Business Continuity in Pandemic Times |
title_sort |
Cybersecurity and Business Continuity in Pandemic Times |
dc.creator.fl_str_mv |
Hernández Bejarano, Miguel Simanca Herrera, Fredys Alberto Páez Páez, Jaime Alberto Castro, Mario Fernando Cortés Méndez, Jairo Augusto |
dc.contributor.author.none.fl_str_mv |
Hernández Bejarano, Miguel Simanca Herrera, Fredys Alberto Páez Páez, Jaime Alberto Castro, Mario Fernando Cortés Méndez, Jairo Augusto |
dc.subject.none.fl_str_mv |
La seguridad cibernética COVID-19 Continuidad del negocio |
topic |
La seguridad cibernética COVID-19 Continuidad del negocio Cybersecurity COVID-19 Business continuity |
dc.subject.other.none.fl_str_mv |
Cybersecurity COVID-19 Business continuity |
description |
Este documento se enmarca en el contexto del proyecto de investigación en curso titulado "Diseño de un mecanismo de resiliencia cibernética para la continuidad del negocio en las organizaciones”, teniendo como objetivo presentan el contexto de la ciberseguridad en este tiempo de pandemia, donde el cibercrimen busca nuevos caminos para atacar a organizaciones e individuos. Las estrategias de ciberseguridad deben adaptarse a las contexto situacional. La resiliencia organizacional también está presente en las organizaciones para garantizar la continuidad, donde los planes de continuidad de las organizaciones están considerando la pandemia |
publishDate |
2021 |
dc.date.issued.none.fl_str_mv |
2021 |
dc.date.accessioned.none.fl_str_mv |
2023-03-28T19:42:20Z |
dc.date.available.none.fl_str_mv |
2023-03-28T19:42:20Z |
dc.type.none.fl_str_mv |
Artículo |
dc.type.coar.fl_str_mv |
http://purl.org/coar/resource_type/c_2df8fbb1 |
dc.type.coar.none.fl_str_mv |
http://purl.org/coar/resource_type/c_6501 |
dc.type.coarversion.none.fl_str_mv |
http://purl.org/coar/version/c_970fb48d4fbd8a85 |
dc.type.driver.none.fl_str_mv |
info:eu-repo/semantics/article |
dc.type.version.none.fl_str_mv |
info:eu-repo/semantics/publishedVersion |
format |
http://purl.org/coar/resource_type/c_6501 |
status_str |
publishedVersion |
dc.identifier.issn.none.fl_str_mv |
1583-6258 |
dc.identifier.uri.none.fl_str_mv |
https://hdl.handle.net/20.500.12494/49046 |
dc.identifier.bibliographicCitation.none.fl_str_mv |
Simanca, F; Rodríguez. J; Paez, j.; Cortes, J., E y Castro, M. (2021). Cybersecurity and Business Continuity in Pandemic Times. Annals of R.S.C.B. Vol. 25, Issue 6 |
identifier_str_mv |
1583-6258 Simanca, F; Rodríguez. J; Paez, j.; Cortes, J., E y Castro, M. (2021). Cybersecurity and Business Continuity in Pandemic Times. Annals of R.S.C.B. Vol. 25, Issue 6 |
url |
https://hdl.handle.net/20.500.12494/49046 |
dc.relation.isversionof.none.fl_str_mv |
https://scholar.google.es/scholar?oi=bibs&hl=es&cluster=2584272814630191096 |
dc.relation.ispartofjournal.none.fl_str_mv |
Annals of R.S.C.B |
dc.relation.references.none.fl_str_mv |
M. Chen, S. Mao, and Y. Liu, "Big data: A survey," Mob. Netw. Appl. vol. 19, pp. 171-209, 2014. D. S. Reveron and J. E. Savage, "Cybersecurity Convergence: Digital Human and National Security," Orbis, vol. 64, pp. 555-570, 2020. M. Choraś and M. Pawlicki, "Intrusion detection approach based on optimised artificial neural network," artificial neural network, 2020. T. Papadopoulos, K. N. Baltas, and M. E. Balta, "he use of digital technologies by small and medium enterprises during COVID-19: Implications for theory and practice," International Journal of Information Management, vol. 55, p. 102192, 2020. Statista, "FRAUD ONLINE," 1 09 2020. [Online]. Available: https://es.statista.com/grafico/18427/intentos-de-phishing-durante-la-pandemia/. [Last access: 11 04 2021]. C. Pandit, H. Kothari, and C. Neuman, "Privacy in time of a pandemic," from 2020 13th CMI Conference on Cybersecurity and Privacy (CMI) - Digital Transformation - Potentials and Challenges(51275), IEEE, 2020, pp. 1-6. L. Galbusera, M. Cardarilli, and G. Giannopoulos, "The ERNCIP survey on COVID-19: Emergency & Business Continuity for fostering resilience in critical infrastructures,,," Safety Science, p. 105161, 2021. L. Budd, S. Ison, and N. Adrienne, "European airline response to the COVID-19 pandemic - Contraction, consolidation and future considerations for airline business and management,,," Research in Transportation Business & Management, vol. 37, p. 100578, 2020 V. Susukailo, I. Opirskyy, and S. Vasylyshyn, "Analysis of the attack vectors used by threat actors during the pandemic," from 2020 IEEE 15th International Conference on Computer Sciences and Information Technologies (CSIT), IEEE, 2020, pp. 261-264. W. N. Zechariah Wong, "Transforming corporate performance: A L. Tawalbeh, F. Muheidat, T. M., M. Quwaider, and G. Saldamli, "Predicting and Preventing Cyber Attacks During COVID-19 Time Using Data Analysis and Proposed Secure IoT layered Model," from 2020 Fourth International Conference on Multimedia Computing, Networking and Applications (MCNA), Valencia, Spain, IEEE, 2020, pp. 113- 118. |
dc.rights.accessrights.none.fl_str_mv |
info:eu-repo/semantics/openAccess |
dc.rights.coar.none.fl_str_mv |
http://purl.org/coar/access_right/c_abf2 |
eu_rights_str_mv |
openAccess |
rights_invalid_str_mv |
http://purl.org/coar/access_right/c_abf2 |
dc.format.extent.none.fl_str_mv |
7280 - 7289 |
dc.coverage.temporal.none.fl_str_mv |
Vol. 25, Issue 6 |
dc.publisher.none.fl_str_mv |
Universidad Cooperativa de Colombia, Facultad de Ingenierías, Ingeniería de Sistemas, Bogotá |
dc.publisher.program.none.fl_str_mv |
Ingeniería de Sistemas |
dc.publisher.place.none.fl_str_mv |
Bogotá |
publisher.none.fl_str_mv |
Universidad Cooperativa de Colombia, Facultad de Ingenierías, Ingeniería de Sistemas, Bogotá |
institution |
Universidad Cooperativa de Colombia |
bitstream.url.fl_str_mv |
https://repository.ucc.edu.co/bitstreams/8e27c2a6-f35b-4ece-82cb-886cb3a75ae9/download |
bitstream.checksum.fl_str_mv |
3bce4f7ab09dfc588f126e1e36e98a45 |
bitstream.checksumAlgorithm.fl_str_mv |
MD5 |
repository.name.fl_str_mv |
Repositorio Institucional Universidad Cooperativa de Colombia |
repository.mail.fl_str_mv |
bdigital@metabiblioteca.com |
_version_ |
1814246710200762368 |
spelling |
Hernández Bejarano, MiguelSimanca Herrera, Fredys AlbertoPáez Páez, Jaime AlbertoCastro, Mario FernandoCortés Méndez, Jairo AugustoVol. 25, Issue 62023-03-28T19:42:20Z2023-03-28T19:42:20Z20211583-6258https://hdl.handle.net/20.500.12494/49046Simanca, F; Rodríguez. J; Paez, j.; Cortes, J., E y Castro, M. (2021). Cybersecurity and Business Continuity in Pandemic Times. Annals of R.S.C.B. Vol. 25, Issue 6Este documento se enmarca en el contexto del proyecto de investigación en curso titulado "Diseño de un mecanismo de resiliencia cibernética para la continuidad del negocio en las organizaciones”, teniendo como objetivo presentan el contexto de la ciberseguridad en este tiempo de pandemia, donde el cibercrimen busca nuevos caminos para atacar a organizaciones e individuos. Las estrategias de ciberseguridad deben adaptarse a las contexto situacional. La resiliencia organizacional también está presente en las organizaciones para garantizar la continuidad, donde los planes de continuidad de las organizaciones están considerando la pandemiaThis document is framed in the context of the ongoing research project entitled "Design of a cyber resilience mechanism for business continuity in organizations", having as an objective to present the context of cybersecurity in this time of pandemic, where cybercrime seeks new ways to attack organizations and individuals. Cybersecurity strategies must be adapted to the situational context. Organizational resilience is also present in organizations to ensure business continuity, where the continuity plans of organizations are considering the pandemic ahttps://co.linkedin.com/in/jaime-alberto-paez-paez-49548823https://www.researchgate.net/profile/Jairo-Cortes-Mendezhttps://orcid.org/0000-0002-7312-0180INSIGHTJaime.paez@campusucc.edu.cojairo.cortes@campusucc.edu.cofredys.simanca@campusucc.edu.cohttps://scholar.google.com/citations?user=7SOhB48AAAAJ&hl=eshttps://scholar.google.es/citations?hl=es&user=dhHrDtQAAAAJ&view_op=list_works&sortby=pubdatehttps://scholar.google.com.co/citations?user=QnZg_mkAAAAJ&hl=en7280 - 7289Universidad Cooperativa de Colombia, Facultad de Ingenierías, Ingeniería de Sistemas, BogotáIngeniería de SistemasBogotáhttps://scholar.google.es/scholar?oi=bibs&hl=es&cluster=2584272814630191096Annals of R.S.C.BM. Chen, S. Mao, and Y. Liu, "Big data: A survey," Mob. Netw. Appl. vol. 19, pp. 171-209, 2014.D. S. Reveron and J. E. Savage, "Cybersecurity Convergence: Digital Human and National Security," Orbis, vol. 64, pp. 555-570, 2020.M. Choraś and M. Pawlicki, "Intrusion detection approach based on optimised artificial neural network," artificial neural network, 2020.T. Papadopoulos, K. N. Baltas, and M. E. Balta, "he use of digital technologies by small and medium enterprises during COVID-19: Implications for theory and practice," International Journal of Information Management, vol. 55, p. 102192, 2020.Statista, "FRAUD ONLINE," 1 09 2020. [Online]. Available: https://es.statista.com/grafico/18427/intentos-de-phishing-durante-la-pandemia/. [Last access: 11 04 2021].C. Pandit, H. Kothari, and C. Neuman, "Privacy in time of a pandemic," from 2020 13th CMI Conference on Cybersecurity and Privacy (CMI) - Digital Transformation - Potentials and Challenges(51275), IEEE, 2020, pp. 1-6.L. Galbusera, M. Cardarilli, and G. Giannopoulos, "The ERNCIP survey on COVID-19: Emergency & Business Continuity for fostering resilience in critical infrastructures,,," Safety Science, p. 105161, 2021.L. Budd, S. Ison, and N. Adrienne, "European airline response to the COVID-19 pandemic - Contraction, consolidation and future considerations for airline business and management,,," Research in Transportation Business & Management, vol. 37, p. 100578, 2020V. Susukailo, I. Opirskyy, and S. Vasylyshyn, "Analysis of the attack vectors used by threat actors during the pandemic," from 2020 IEEE 15th International Conference on Computer Sciences and Information Technologies (CSIT), IEEE, 2020, pp. 261-264.W. N. Zechariah Wong, "Transforming corporate performance: AL. Tawalbeh, F. Muheidat, T. M., M. Quwaider, and G. Saldamli, "Predicting and Preventing Cyber Attacks During COVID-19 Time Using Data Analysis and Proposed Secure IoT layered Model," from 2020 Fourth International Conference on Multimedia Computing, Networking and Applications (MCNA), Valencia, Spain, IEEE, 2020, pp. 113- 118.La seguridad cibernéticaCOVID-19Continuidad del negocioCybersecurityCOVID-19Business continuityCybersecurity and Business Continuity in Pandemic TimesArtículohttp://purl.org/coar/resource_type/c_6501http://purl.org/coar/resource_type/c_2df8fbb1http://purl.org/coar/version/c_970fb48d4fbd8a85info:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/openAccesshttp://purl.org/coar/access_right/c_abf2PublicationLICENSElicense.txtlicense.txttext/plain; charset=utf-84334https://repository.ucc.edu.co/bitstreams/8e27c2a6-f35b-4ece-82cb-886cb3a75ae9/download3bce4f7ab09dfc588f126e1e36e98a45MD5120.500.12494/49046oai:repository.ucc.edu.co:20.500.12494/490462024-08-10 21:01:42.451metadata.onlyhttps://repository.ucc.edu.coRepositorio Institucional Universidad Cooperativa de Colombiabdigital@metabiblioteca.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 |