Por favor, use este identificador para citar o enlazar este ítem:
http://repositoriodspace.unipamplona.edu.co/jspui/handle/20.500.12744/1436
Registro completo de metadatos
Campo DC | Valor | Lengua/Idioma |
---|---|---|
dc.contributor.author | Acevedo Quintana, Nancy Maria. | - |
dc.date.accessioned | 2022-06-06T13:08:57Z | - |
dc.date.available | 2017-01-14 | - |
dc.date.available | 2022-06-06T13:08:57Z | - |
dc.date.issued | 2017 | - |
dc.identifier.citation | Acevedo Quintana, N. M. (2016). Metodología para la prevención de riesgos en el manejo de la información personal almacenada en el sistema de información académica de la Universidad de Pamplona [Trabajo de Grado Maestría, Universidad de Pamplona]. Repositorio Hulago Universidad de Pamplona. http://repositoriodspace.unipamplona.edu.co/jspui/handle/20.500.12744/1436 | es_CO |
dc.identifier.uri | http://repositoriodspace.unipamplona.edu.co/jspui/handle/20.500.12744/1436 | - |
dc.description | El uso eficiente de las tecnologías de la información se ha convertido en un factor de éxito crítico para la sociedad actual. Uno de los aspectos más descuidados es el manejo adecuado de la información personal. Aunque los sistemas de información académica ayudan a tener acceso a la información fácil y rápidamente, también permiten que esta se vea expuesta a diferentes amenazas, más cuando las personas desconocen su importante rol en la cadena de la seguridad. ACADEMUSOFT, el sistema de información académica de la Universidad de Pamplona, no es ajeno a esta realidad, por lo que en este proyecto se diseñó la Metodología de Prevención de Riesgos para Sistemas de Información Académica (MePRiSIA) con el fin de identificar los riesgos a que está expuesta la información personal manejada por este tipo de sistemas y proponer estrategias que permitan prevenirlos y mitigarlos. Esta metodología se compone de 4 pasos: establecimiento del contexto, identificación de riesgos, análisis de riesgos y prevención de riesgos. Para definir MePRiSIA se elaboró primero un estado del arte y una comparación de las metodologías de gestión y prevención de riesgos encontradas en la literatura. MePRiSIA fue evaluada por 3 expertos, a través una rúbrica y el método Delphi, quienes determinaron que es fácil de entender e incluye el factor humano, pero su implementación es difícil cuando la institución no asigna recursos suficientes para llevarla a cabo. Además, MePRiSIA fue aplicada en el sistema de información académica de la Universidad de Pamplona, donde se evidenció que los mayores riesgos son ocasionados por la falta de políticas, su difusión y, la falta de capacitación y concientización de los docentes, el personal del CIADTI y los estudiantes en seguridad. | es_CO |
dc.description.abstract | The efficient use of information technologies has become a critical success factor for today's society. One of the most neglected aspects is the proper handling of personal information. Although academic information systems help to access the information quickly and easily, also they allow that information can be exposed to different threats, particularly when people don´t know their important role in the security chain. ACADEMUSOFT, the academic information system of Pamplona University, is no divorced from reality, so in this project a Risk Prevention Methodology for Academic Information Systems (MePRiSIA) was designed in order to identify risks which personal information, handled by these systems, is exposed and to propose strategies to prevent and mitigate them. This methodology consists of four steps: establishing the context, risk identification, risk analysis and risk prevention. To define MePRiSIA was first developed a state of the art and a comparison of management and risk prevention methodologies found in the literature. MePRiSIA was evaluated by 3 experts, through a rubric and the Delphi method, who determined that it is easy to understand and includes the human factor, but its implementation is difficult when the institution does not allocate sufficient resources to carry it out. In addition, MePRiSIA was applied in the academic information system of Pamplona University, where it was shown that the greatest risks are caused by the lack of policies, their dissemination and the lack of training and awareness in security of teachers, CIADTI staff and students. | es_CO |
dc.format.extent | 281 | es_CO |
dc.format.mimetype | application/pdf | es_CO |
dc.language.iso | es | es_CO |
dc.publisher | Universidad de Pamplona – Facultad de Ingenierías y Arquitectura. | es_CO |
dc.subject | La autora no proporciona información sobre este ítem. | es_CO |
dc.title | Metodología para la prevención de riesgos en el manejo de la información personal almacenada en el sistema de información académica de la Universidad de Pamplona. | es_CO |
dc.type | http://purl.org/coar/resource_type/c_bdcc | es_CO |
dc.date.accepted | 2016-10-14 | - |
dc.relation.references | Alberts, C., & Dorofee, A. (2001). An Introduction to the OCTAVE Method: Carnegie Mellon University, Software Engineering Institute. | es_CO |
dc.relation.references | Alexander, A. G. (2007). Diseño de un Sistema de Gestión de Seguridad de Información: Óptica ISO 27001:2005. Bogotá: Alfaomega Colombiana S.A | es_CO |
dc.relation.references | Álvarez Marañón, G., & Pérez García, P. P. (2004). Seguridad Informática para Empresas y Particulares. Madrid: McGraw Hill. | es_CO |
dc.relation.references | Bandyopadhyay, K., Mykytyn, P. P., & Mykytyn, K. (1999). A Framework for Integrated Risk Management in Information Technology. Management Decision, 37(5), 437- 444 | es_CO |
dc.relation.references | Barreau, D. K. (1995). Context as a Factor in Personal Information Management Systems. Journal of the American Society for Information Science, 46(5), 327-339. | es_CO |
dc.relation.references | Boardman, R. P. (2004). Improving Tool Support for Personal Information Management. Unpublished Tesis doctoral, Imperial College, Londres. | es_CO |
dc.relation.references | Boutros-Ghali, B. (1995). An Agenda for Peace. New York: United Nations | es_CO |
dc.relation.references | Boutros-Ghali, B. (1996). An Agenda for Democratization. New York: United Nations. | es_CO |
dc.relation.references | Brantingham, P. J., & Faust, F. L. (1976). A Conceptual Model of Crime Prevention. Crime and Delinquency, 22(3), 284-296. | es_CO |
dc.relation.references | British_Standards_Institution. (1991). Quality vocabulary (No. BS4778 [Part 3 Section 3.2 = IEC 1990 50(191)]). London: BSI. | es_CO |
dc.relation.references | BS7799-2. (1999). Information Security Management -Part 2: Specification for Information Security Management Systems. London: British Standards Institution. | es_CO |
dc.relation.references | Ekblom, P. (2003). The Conjunction of Criminal Opportunity: A Framework for Crime Reduction. London: Home Office Crime and Policing Group, Research Development and Statistics Directorate | es_CO |
dc.relation.references | Farrington, D. P., & Welsh, B. C. (2007). Saving Children from a Life of Crime. Oxford: Oxford University Press. | es_CO |
dc.relation.references | Franganillo, J. (2009). Gestión de Información Personal: Elementos, Actividades e Integración. El Profesional de la Información, 18(4), 399-406. | es_CO |
dc.relation.references | Frosdick, S. (1997). The Techniques of Risk Analysis are Insufficient in Themselves. Disaster Prevention and Management, 6(3), 165-177. | es_CO |
dc.relation.references | Fung, P., Kwok, L., & Longley, D. (2003). Electronic Information Security Documentation. Paper presented at the Australasian Information Security Workshop (AISW2003) -Conferences in Research and Practice in Information Technology, Adelaide (Australia). | es_CO |
dc.relation.references | García Mejía, M. (2010). Metodología para el Diagnóstico, Prevención y Control de la Corrupción en Programas de Seguridad Ciudadana (No. Documento de Debate #IDB-DP-117): Banco Interamericano de Desarrollo (BID). | es_CO |
dc.relation.references | Gerber, M., & Von Solms, R. (2005). Management of Risk in the Information Age. Computer & Security, 24, 16-30. | es_CO |
dc.relation.references | Gilling, D. (1997). Crime Prevention Theory, Policy and Politics. London: UCL. | es_CO |
dc.relation.references | Glenn, J. K. (2001). Book Review: Three Social Science Disciplines in Central and Eastern Europe. In Handbook on Economics, Political, Science and Sociology: Columbia University Website. | es_CO |
dc.relation.references | Gómez Fernández, F. (2003). Desarrollo de una Metodología para el Análisis del Riesgo Volcánico en el Marco de un Sistema de Información Geográfica. Unpublished Tesis Doctoral, Universidad Complutense de Madrid. | es_CO |
dc.relation.references | Jones, W. (2007). Keeping Found Things Found: The Study and Practice of Personal Information Management. Burlington, MA: Morgan Kaufmann Publishers. | es_CO |
dc.relation.references | Graham, J., & Bennett, T. (1995). Crime Prevention Strategies in Europe and North America (Vol. 28). Helsinki-New York: European Institute for Crime Prevention and Control. | es_CO |
dc.relation.references | Greene, J. C. (2007). Mixed Methods in Social Inquiry (Vol. 9). San Francisco: John Wiley & Sons, Inc. | es_CO |
dc.relation.references | Hampson, F. O. (2002). Preventive Diplomacy at the United Nations and Beyond (Fen Osler Hampson and David M. Malone ed.). Boulder Colorado: Lynne Rienner Publishers. | es_CO |
dc.relation.references | Hayden, C., & Blaya, C. (2001). Violence et Comportements Agressifs Dans les Écoles Anglaises. In E. Debarbieux & C. Blaya (Eds.), La Violence en Millieu Scolaire-3- Dix Approaches en Europe (pp. 43-70.). Paris: ESF. | es_CO |
dc.relation.references | Hernández Sampieri, R., & Mendoza, C. P. (2008). El Matrimonio Cuantitativo Cualitativo: El Paradigma Mixto. Paper presented at the 6to Congreso de Investigación en Sexología, Villahermosa, Tabasco, México. | es_CO |
dc.relation.references | Holland, C. J., & Van Arsdale, P. W. (1989). Aspectos Antropológicos de los Desastres. In Desastres Consecuencias Psicosociales: La Experiencia Latinoamericana. Mexico. | es_CO |
dc.relation.references | Hope, T. (2002). La Riduzione della Criminalità, la Sicurezza Locale e la Nuova Filosofia del Management Pubblico. AA.VV. Governare la Sicurezza: Attori, Politiche e Istituzioni in Europa, Numero Speciale di Dei Delitti e Delle Pene, 207-229. | es_CO |
dc.relation.references | Humphreys, E. J., Moses, R. H., & Plate, A. E. (1998). Guide to Risk Assessment and Risk Management. London: British Standards Institution. | es_CO |
dc.relation.references | ICONTEC. (2009). NTC-ISO/IEC 27005: Tecnología de la Información. Técnias de Seguridad. Gestión del Riesgo en la Seguridad de la Información. Bogotá: ICONTEC. | es_CO |
dc.relation.references | Infoplease.com.Information Please: On-Line Dictionary. Retrieved 25/11/2003, from http://www.infoplease.com/ipd/A0549812.html | es_CO |
dc.relation.references | Jung, C., Han, I., & Suh, B. (1999). Risk Analysis for Electronic Commerce Using Case-Based Reasoning. International Journal of Intelligent Systems in Accounting, Finance and Management, 8, 61-73. | es_CO |
dc.relation.references | International_Commission_on_Intervention_and_State_Sovereignty(ICISS). (2001). The Responsability to Protect: Supplementary Volume. In (pp. 29). Otawa: International Development Research Center | es_CO |
dc.relation.references | INVESTOPEDIA.Replacement Cost. Retrieved 23/06/2015, from http://www.investopedia.com/terms/r/replacementcost.asp | es_CO |
dc.relation.references | ISO/IEC_TR_13335-1. (1996). Information Technology - Guidelines for the Management of IT Security - Part 1: Concepts and Models for IT Security (1st ed.). Switzerland. | es_CO |
dc.relation.references | Jacobson, R. V. (1996). CORA: Cost-of-Risk Analysis. Painless Risk Management for Small Systems: International Security Technology, Inc. | es_CO |
dc.relation.references | Kailay, M. P., & Jarratt, P. (1995). RAMeX: A Prototype Expert System for Computer Security Analysis and Management. Computers and Security, 14, 449-463. | es_CO |
dc.relation.references | Khan Pathan, A.-S. (2010). The State of the Art in Intrusion Prevention and Detection. Kuala Lumpur: CRC Press. | es_CO |
dc.relation.references | Kirkwood, A. S. (1994). Why Do We Worry When Scientists Say There Is No Risk? Disaster Prevention and Management, 3(2), 15- 22. | es_CO |
dc.relation.references | Knepper, P. (2007). Criminology and Social Policy. London: Sage. | es_CO |
dc.relation.references | Krauskopf, D. (2006). Estado del Arte de los Programas de Prevención de la Violencia en Ámbitos Escolares. Washington: Organización Panamericana de la Salud. | es_CO |
dc.relation.references | Kroeger, A., & Luna, R. (1992). Atención Primaria de Salud: Principios y Métodos. México: COMPILADORES | es_CO |
dc.relation.references | Lansdale, M. W. (1988). The Psychology of Personal Information Management. Applied Ergonomics, 19(1), 55-66. | es_CO |
dc.relation.references | Lara Ruiz, Á. (2013). Algunas Orientaciones para Evaluar los Factores de Riesgo Psicosocial. Madrid: Instituto Nacional de Seguridad e Higiene en el Trabajo. | es_CO |
dc.relation.references | Olsen, G. R. (2002). Promoting Democracy, Preventing Conflict: The European Union and Africa. International Politics, 39, 311-328. | es_CO |
dc.relation.references | Lavrakas, P. J. (1995). Community-Based Crime Prevention: Citizens, Community Organizations and the Police. In L. B. Joseph (Ed.), Crime, Communities and Public Policy. Chicago: University of Chicago, Center for Urban Research and Policy Studies | es_CO |
dc.relation.references | Lichtenstein, S. (1996). Factors in the Selection of a Risk Assessment Method. Information Management and Computer Security, 4(4), 20-25. | es_CO |
dc.relation.references | Lindblom, L. (2003). Democracy and the Evolution of a Culture of Prevention: Lessons from Guatemala 1993-2003: University of Uppsala. | es_CO |
dc.relation.references | Lizarazo Rueda, J. E. (2012). El Ser Humano: Factor Clave en la Seguridad de la Información. Apuntes de Investigación, 3. | es_CO |
dc.relation.references | Lund, M. S. (2001). From Lessons to Action. In Reaction to Conflict Prevention (Fen Osler Hampson and David M. Malone ed., pp. 161). Boulder Colorado: Lynne Rienner Publishers. | es_CO |
dc.relation.references | Mell, P., Kent, K., & Nusbaum, J. (2005). Guide to Malware Incident Prevention and Handling. Gaithersburg: National Institute of Standards and Technology (NIST). | es_CO |
dc.relation.references | Merino Bada, C., & Cañizares Sales, R. (2011). Implementación de un Sistema de Gestión de Seguridad de la Información según ISO 27001: Un Enfoque Práctico. Madrid: FC Editorial. | es_CO |
dc.relation.references | Miami-Dade_Community_College. (2003). Social Science Department: Disciplines. Retrieved 25/11/2003, from http://www.mdcc.edu/kendall/social/disciplines.htm | es_CO |
dc.relation.references | Ministerio_de_Salud. (1993). Ley 60 de 1993. | es_CO |
dc.relation.references | Moses, R. H. (1992). Risk Analysis and Management. In K. M. Jackson & J. Hruska (Eds.), Computer Security Reference Book. Oxford: Butterworth-Heinemann Ltd. | es_CO |
dc.relation.references | Original Roget’s Thesaurus of English Words and Phrases. (5th ed.)(1992). Essex, England: Longman Group UK Limited. | es_CO |
dc.relation.references | Muñoz Giraldo, G. I. (2004). Historia de la Prevención. Hacia la Promoción de la Salud, 9, 27-32. | es_CO |
dc.relation.references | NIST. (1995). An Introduction to Computer Security. Washington: U.S. Department of Commerce. | es_CO |
dc.relation.references | NIST. (2001). Risk Management Guide for Information Technology Systems (Vol. Special publication .). Washington: U.S. Department of Commerce. | es_CO |
dc.relation.references | Norsk_Regnesentral. (2000). CORAS: A Platform for Risk Analysis of Security Critical Systems (No. IST-2000-25031). | es_CO |
dc.relation.references | Owens, S. (1998). Information Security Management: An Introduction. London: British Standards Institution. | es_CO |
dc.relation.references | Oxford Advanced Learner’s Dictionary. (5th ed.)(1995). Oxford: Oxford University Press. | es_CO |
dc.relation.references | Pease, K. (1997). Crime Prevention. In M. Maguire, R. Morgan & R. Reiner (Eds.), The Oxford Handbook of Criminology (2 ed., pp. 963-996). Oxford: Oxford University Press. | es_CO |
dc.relation.references | Peyre, V. (1986). Introduction. Elements d'un Debat Sur la Prévention de la Delinquance. Annales de Vaucresson, 1(24), 9-13. | es_CO |
dc.relation.references | Pfleeger, C. P. (1989). Security in Computing. NJ: Prentice Hall. | es_CO |
dc.relation.references | Pfleeger, C. P. (1997). Security in Computing (2nd ed.): Prentice Hall, Inc. | es_CO |
dc.relation.references | Piper, S. (2011). Intrusion Detection Systems for Dummies: WILEY. | es_CO |
dc.relation.references | Plataforma. (s.f.). Plataform@ Digital. Retrieved 01/05/2014, from http://www.unipamplona.edu.co/unipamplona/hermesoft/portalIG/home_28/recursos/g estasoft/28042008/gestasoft_inicio.jsp | es_CO |
dc.relation.references | SecurityArtWork.Introducción al Análisis de Riesgos - Metodologías (II). Retrieved 03/08/2015, from http://www.securityartwork.es/2012/04/02/introduccion-al-analisis-de-riesgos- %E2%80%93-metodologias-ii/ | es_CO |
dc.relation.references | PMI. (2008). A Guide to the Project Management Body of Knowledge (PMBOK Guide) (4ta ed.). Pennsylvania: Project Management Institute. | es_CO |
dc.relation.references | Ponjuan Dante, G. (2004). Gestión de Información: Dimensiones e Implementación para el Éxito Organizacional. In Nuevo Paradigma. Rosario (Argentina). | es_CO |
dc.relation.references | Qasem, M. M. d. (2013). Information Technology Risk Assessment Methodologies: Current Status and Future Directions. International Journal of Scientific & Engineering Research, 4(12), 966-972. | es_CO |
dc.relation.references | Ragmognino, N., FradJi, D., Soldini, F., & Vergés, P. (1997). L’École Comme Dispositive Simbolique et les Violences: le Example de Trois Ecoles em Marseille. In B. Charlot & J. C. Émin (Eds.), Violences à l’école - État des Savoirs. París: Masson & Armand Colin. | es_CO |
dc.relation.references | Ramos Lara, K. J. (2014). Sistema de Índices para la Valoración de los Activos Intangibles. Contribuciones a la Economía. | es_CO |
dc.relation.references | Real_Academia_Española.Eclecticismo. Retrieved 25/04/2015, from http://lema.rae.es/drae/?val=eclecticismo | es_CO |
dc.relation.references | Real_Academia_Española.Pragmatismo. Retrieved 25/04/2015, from http://lema.rae.es/drae/?val=pragmatismo | es_CO |
dc.relation.references | Robert, P. (1991). Les Chercheurs Face Aux Politiques de Prévention. In P. Robert (Ed.), Les Politiques de Prévention de la Delinquance a L'aune de la Recherche. Un Bilan International (pp. 13-27). Paris: L'Harmattan. | es_CO |
dc.relation.references | Rosenblum-Kumar, D. Deconstructing Prevention: A Systems Approach to Mitigating Violent Conflict. In Reaction to Conflict Prevention (Fen Osler Hampson David M. Malone ed.): Lynne Rienner Publishers. | es_CO |
dc.relation.references | Roth, G. (2003). E-commerce and E-business Have Changed the Profile of Corporate Legal Risk. Retrieved 04/11/2003, from http://estrategy.co.za/news.asp?pklNewsIDZ12125&pklIssueIDZ346&pklCategoryIDZ141 | es_CO |
dc.relation.references | Sinclair, B. (1999). Report on State Implementation of the Gun-Free Schools Act: School Year 1997- 98. Rockville, MD: Westat. | es_CO |
dc.relation.references | Royal_Society. (1992). Risk: Analysis, Perception and Management. London: The Royal Society. | es_CO |
dc.relation.references | Sánchez, A. (2004). La Promoción y Prevención (Escuela de Salud Pública, Universidad de Costa Rica ed.). San José: Casa Costarricense de Seguro Social, CENDESIS. | es_CO |
dc.relation.references | Savona, E. U. (2004). Ipotesi Per uno Scenario Della Prevenzione. In R. Selmini (Ed.), (a cura di) La Sicurezza Urbana, (pp. 273-284). Bologna: Il Mulino. | es_CO |
dc.relation.references | Scarff, F., Carty, A., & Charette, R. (1993). Introduction to the Management of Risk. Norwich: HMSO. | es_CO |
dc.relation.references | SINTEF. (2006). The CORAS Model-Based Method for Security Risk Analysis. Oslo: SINTEF. | es_CO |
dc.relation.references | Stark, H. (2003). Engineering. Retrieved 02/12/2003, from http://encarta.msn.com/text_761570676_1/Engineering.html | es_CO |
dc.relation.references | Stedman, S. J. (1995). Alchemy for a New World Order. Foreign Affairs, p. 20. | es_CO |
dc.relation.references | Strutt, J. (1993). Risk Assessment and Management: The Engineering Approach: Centre for Industrial Safety and Reliability, Cranfield University. | es_CO |
dc.relation.references | Suojanen, T. (2000.). Technical Communication Research: Dissemination, Reception, Utilization. Unpublished Licentiate Thesis in Translation Studies: English translation and Interpretation., University of Tampere. | es_CO |
dc.relation.references | Tapias, E. (2013, 20 de Octubre). Investigan Venta de Notas y Títulos Profesionales en Universidad de Pamplona. Noticias Uno | es_CO |
dc.relation.references | Tashakkori, A., & Teddlie, C. (2008). Quality of Inferences in Mixed Methods Research: Calling for an Integrative Framework. In M. Max Bergman (Ed.), Advances in Mixed Methods Research (pp. 101-119). Londres: SAGE Publications Ltd. | es_CO |
dc.relation.references | Tchankova, L. (2002). Risk Identification - Basic Stage in Risk Management. Environmental Management and Health, 13(3), 290-297 | es_CO |
dc.relation.references | Burnie, D. (2003). Science. Retrieved 02/12/2003, from http://encarta.msn.com/text_761557105_1/Science.html | es_CO |
dc.relation.references | Tonry, M., & Farrington, D. (1995). Strategic Approach to Crime Prevention. In M. Tonry & D. Farrington (Eds.), Building a Safer Society. Strategic Approaches to Crime Prevention, Crime and Justice (Vol. 19, pp. 1-20). | es_CO |
dc.relation.references | U.S._Department_of_Labor. (2003). Occupational Handbook: Bureau of Labor Statistics. | es_CO |
dc.relation.references | U.S._Department_of_State.Democracy. Retrieved 03/09/2003, from http://www.state.gov/g/drl/democ/ | es_CO |
dc.relation.references | University_of_Maryland. (2003). Social Science: Supplemental Major Courses. Retrieved 25/11/2003, from http://www.umuc.edu/prog/ugp/majors/socs.shtml | es_CO |
dc.relation.references | Villalba. (2002). Magerit version 1.0: Risk Analysis and Management Methodology for Information Systems (Procedures Handbook). | es_CO |
dc.relation.references | Walgrave, L., & De Cauter, F. (1986). Une Tentative de Clarification de la Notion de Prévention. Annales de Vaucresson, 1(24), 31-51. | es_CO |
dc.relation.references | Wallensteen, P. (1998). Preventing Violent Conflicts, Past Record and Future Challenges: Department of Peace and Conflict Research, Uppsala University. | es_CO |
dc.relation.references | Wallensteen, P. (2002a). Reassessing Recent Conflicts: Direct vs. Structural Prevention (Fen Osler Hampson and David M. Malone ed.). Boulder Colorado: Lynne Rienner Publishers. | es_CO |
dc.relation.references | Wallensteen, P. (2002b). Understanding Conflict Resolution. In (pp. 271). London: Sage. | es_CO |
dc.relation.references | Weems, B. S. (2003). Computer Science. Retrieved 02/12/2003, from http://encarta.msn.com/text_761563863_1/Computer_Science.htm | es_CO |
dc.relation.references | Bustelo Ruesta, C., & Amarilla Iglesias, R. (2001). Gestión del Conocimiento y Gestión de la Información. Boletín del Instituto Andaluz de Patrimonio Histórico, VIII. | es_CO |
dc.relation.references | Wikipedia.Reduccionismo. Retrieved 25/04/2015, from http://es.wikipedia.org/wiki/Reduccionismo | es_CO |
dc.relation.references | Wilches-Chaux, G. (1998). Auge, Caída y Levantada de Felipe Pinillo, Mecánico y Soldador o Yo Voy a Correr el Riesgo. Quito: La Red. | es_CO |
dc.relation.references | Wordreference.com.Pragmatismo. Retrieved 25/04/2015, from http://www.wordreference.com/definicion/pragmatismo | es_CO |
dc.relation.references | Yu, E. (2004). Information Systems (In the Internet Age). In Practical Handbook of Internet Computing: CRC Press. | es_CO |
dc.relation.references | Byman, D. (2003). Constructing a Democratic Iraq. International Security, 28(1), 47-78. | es_CO |
dc.relation.references | Campos, A. (1999). La Prevención de Desastres como Objeto Educativo. In Educación y Prevención de Desastres (pp. 11-84). San José, Costa Rica: Fondo de las Naciones Unidas para la Infancia, UNICEF. | es_CO |
dc.relation.references | Campos, E., & Pradhan, S. (2007). The Many Faces of the Corruption: Tracking Vulnerabilities at the Sector Level. Washington D.C.: World Bank | es_CO |
dc.relation.references | Cano, J. J., & Saucedo Mesa, G. (2015). VII Encuesta Latinoamericana de Seguridad de la Información: ACIS | es_CO |
dc.relation.references | Caralli, R. A., Stevens, J. F., Young, L. R., & Wilson, W. R. (2007). Introducing OCTAVE Allegro: Improving the Information Security Risk Assesment Process (No. CMU/SEI-2007-TR-12, ESCTR-2007-012). Bedford: Carnegie Mellon University. | es_CO |
dc.relation.references | Carnegie_Commission_on_Preventing_Deadly_Conflict. (1997). Final Report with Executive Summary. New York: Carnegie Corporation. | es_CO |
dc.relation.references | Casassus, J. (2000). Problemas de la Gestión Educativa en América Latina: La Tensión entre los Paradigmas de Tipo A y el Tipo B. Retrieved 10/02/2010, from http://pasosvagabundos.com/archivos/Lecturas%20de%20trabajo%20para%20educadore s/gestion%20educativa/ploblemas%20gestion%20educ%20en%20al.pdf | es_CO |
dc.relation.references | Central_Oregon_Community_College. (2003). Social Science Disciplines. Retrieved 25/11/2003, from http://www.cocc.edu/admit/shells/trans/social_disciplines.htm | es_CO |
dc.relation.references | CNIL. (2012). Methodology for Privacy Risk Management. Paris: Commission Nationale de l´Informatique et des Libertés (CNIL). | es_CO |
dc.relation.references | Collins, B., & Mansell, R. (2004). Cyber Trust and Crime Prevention: A Synthesis of the State-of-theArt Science Reviews. London: RMCS Cranfield University and London School of Economics and Political Science. | es_CO |
dc.relation.references | Concha-EastMan, A. (2004). Violencia Urbana en América Latina y el Caribe: Dimensiones, Explicaciones, Acciones. In S. Rotker (Ed.), Ciudadanías del Miedo (pp. 39-53.). Caracas: Rutgers. | es_CO |
dc.relation.references | Deuchar, S. (2003). Major Organizations Take to Managing Risk. Retrieved 04/11/2003, from http://ebiz.co.za/news.asp?pklNewsidZ9626&pklIssueIDZ308 | es_CO |
dc.relation.references | Dickson, G. (1995). Principles of Risk Management. Quaility in Health Care, 4, 75-79. | es_CO |
dc.relation.references | Douglas, M., & Wildavsky, A. (1982). Risk and Culture. Berkeley, CA: University of California Press. | es_CO |
dc.relation.references | Ekblom, P. (1996). Towards a Discipline of Crime Prevention: a Conceptual Framework: Home Office Research and Statistical Directorate. | es_CO |
dc.rights.accessrights | http://purl.org/coar/access_right/c_abf2 | es_CO |
dc.type.coarversion | http://purl.org/coar/resource_type/c_2df8fbb1 | es_CO |
Aparece en las colecciones: | Maestría en Gestión de Proyectos Informáticos |
Ficheros en este ítem:
Fichero | Descripción | Tamaño | Formato | |
---|---|---|---|---|
Acevedo_2016_TG.pdf | Acevedo_2016_TG | 7,05 MB | Adobe PDF | Visualizar/Abrir |
Los ítems de DSpace están protegidos por copyright, con todos los derechos reservados, a menos que se indique lo contrario.