Mostrando 4 resultados de: 4
Filtros aplicados
Subtipo de publicación
Conference Object(4)
Publisher
Lecture Notes in Networks and Systems(2)
Advances in Intelligent Systems and Computing(1)
Proceedings - 3rd International Conference on Information Systems and Computer Science, INCISCOS 2018(1)
Área temáticas
Funcionamiento de bibliotecas y archivos(2)
Programación informática, programas, datos, seguridad(2)
Ciencias de la computación(1)
Comunicaciones(1)
Criminología(1)
Área de conocimiento
Comunicación(2)
Ciencias de la computación(1)
Red inalámbrica(1)
Red informática(1)
Origen
google(2)
Cybersecurity Mechanisms for Information Security in Patients of Public Hospitals in Ecuador
Conference ObjectAbstract: Information is considered the most important asset for most organizations in the healthcare sector,Palabras claves:Confidentiality, CYBERSECURITY, Integrity, Patient information, privacyAutores:Cesar Moreira-Zambrano, Emilio Cedeño-Palma, Maritza Mendoza-Zambrano, Mauricio Quimiz-Moreira, Walter Zambrano-RomeroFuentes:googlescopusDigital Gap Reduction with Wireless Networks in Rural Areas of Tosagua Town
Conference ObjectAbstract: Access to information and communication technologies in rural areas of Ecuador in Manabí Province isPalabras claves:internet, Radio links, Radio mobile, Wi-fi rural areas, Wireless citiesAutores:Cesar Moreira-Zambrano, Darwin Loor Zamora, Leonardo Chancay-García, Mauricio Quimiz-Moreira, Walter Zambrano-RomeroFuentes:scopusUse of mobile application as a means of communication of academic activities between parents and teachers
Conference ObjectAbstract: A close collaboration between parents and teachers is a very important pillar to improve the academiPalabras claves:Adaptable, Education, internet, mobile app, Mobile learning, parentsAutores:Cesar Moreira-Zambrano, Eudaldo Zamora-Intriago, I. C. Marrufo-Rodríguez, Jhair Patino-Garcia, Walter Zambrano-Romero, Wilner Cuenca-AlavaFuentes:scopusSecurity Mechanisms and Log Correlation Systems
Conference ObjectAbstract: This study proposes several security measures to protect the integrity of the information and avoidPalabras claves:CYBERSECURITY, Cybersecurity strategy, Cyberspace, log, SIEMAutores:Cesar Moreira-Zambrano, Jose Villacreses-Chancay, Josselyn Pita-Valencia, Josselyn Stefania Pita Valencia, Leonardo Chancay-García, Mora-Cruzatty A.Fuentes:googlescopus