Journal of Social Problems Research

Submit Your Paper

2995-3200ISSN (Online)
Full Length Article

Journal of Social Problems Research

Volume 1, Issue 1, PP: 56-65, 2022 | Cite this article as | XML | | Html PDF

Main types of computer crimes existing in Ecuador

D.M.M. Fernández   1 * , M.Y.L. Vázquez   2

  • 1 Universidad Nacional Mayor de San Marcos, Lima , Peru - (dmacazanaf_af@unmsm.edu.pe)
  • 2 Universidad Regional Autónoma de Los Andes. Ecuador - (ub.c.investigacion@uniandes.edu.ec)
  • Doi: https://doi.org/10.54216/JSPR.010106

    Received: October 25, 2021 Accepted: January 20, 2022
    Abstract

    The introduction and use of Information and Communication Technologies (ICT) have meant a vertiginous leap in scientific-technical development on a global scale, they have become an indispensable element in all facets of society. Without a doubt, the use of the Internet makes life easier for users, but those benefits become dangerous when unscrupulous people silently infiltrate to damage not only technical equipment but also the finances of individuals, companies, and governments. The objective of the investigation is to determine the main types of computer crimes existing in Ecuador, as well as the possible solutions to avoid them. Different research techniques and methods were studied, such as synthetic analytical, inductive deductive, logical historical, as well as the descriptive method, interviews, and surveys in the same way that tools such as descriptive surveys and referential research were used. To fulfill the proposed objective, the AHP Saaty and Vikor multicriteria methods were used, where the crimes with the highest probability of occurring in the country and the best techniques to combat them were obtained as conclusions.

    Keywords :

    computer crimes , internet , experts , AHP Saaty , Vikor

    References

    [1] M. G. Acosta, M. M. Benavides, and N. P. García, "Computer crimes: organizational impunity and

    its complexity in the business world," Venezuelan Journal of Management, vol. 25, pp. 351 -368,

    2020.

    [2] F. V. Núñez Pérez and B. Carhuancho Zaldaña, "Cybercrime in times of COVID-19: The violation

    of constitutional rights?," Lumen: Journal of the Faculty of Law, vol. 16, pp. 93-100, 2020.

    [3] T. E. Fuentes Manrufo, R. Manzún Cruz, and G. M. Cancino Mendez, "Perspective on computer

    crimes: A point of view of students of the Superior Technological Progreso.," Journal Advances in

    Engineering and Innovation, vol. 2, pp. 1-8, 2018.

    [4] J. López Gorostidi, "The plurality of victims derived from the high harmfulness in cybercrimes: a

    proportional criminal response," Deusto Studies: Journal of the University of Deusto, vol. 68, pp.

    201-221, 2020.

    [5] M. F. Saltos Salgado, J. L. Robalino Villafuerte, and L. D. Pazmiño Salazar, "Conceptual analysis

    of computer crime in Ecuador.," Conrad Magazine,, vol. 17, pp. 343-351, 2021.

    [6] J. Zambrano Mendieta, K. Dueñas Zambrano, and L. Macías Ordoñez, "Computer crime: Criminal

    procedure in Ecuador.," Scientific Magazine Dominion of Sciences, vol. 2, pp. 204-215, 2016.

    [7] F. Linares Miró, "Crime, cybercrime and COVID-19: (accelerating) displacement of opportunities

    and situational adaptation of cybercrime," ILP: Magazine of Internet, Law and Politics, pp. 1-17,

    2021.

    [8] Comprehensive Criminal Organic Code, 2014.

    [9] M. L. Peralta Zuñiga and D. N. Aguilar Valarezo, "Cybersecurity and its conception in SMEs in

    Cuenca, Ecuador.," Accounting and auditing, vol. 53, pp. 99-126, 2021.

    [10] E. Universo. (2020). Computer crimes grow in Ecuador; every click on the web leaves its trail.

    Available: https://www.eluniverso.com/noticias/2020/09/27/nota/7991905/delitosinformaticosinternet-

    casos-reales-redes-sociales-ecuador/

    [11] T. L. Saaty, Decision making for leaders: : RWS Publications, 2014.

    [12] J. E. Ricardo, Z. M. M. Rosado, E. K. C. Pataron, and V. Y. V. Vargas, "Measuring Legal and

    Socioeconomic Effect of the Declared Debtors Usign The AHP Technique in a Neutrosophic

    Framework," Neutrosophic Sets and Systems, vol. 44, pp. 357-366, 2021.

    [13] A.-B. Mohamed and M. Mohamed, "Multi-criteria group decision making based on neutrosophic

    analytic hierarchy process: Suggested modifications," Neutrosophic Sets and Systems, vol. 43, pp.

    247-254, 2021.

    [14] I. A. González, M. F. L. Barragán, D. M. L. Domínguez, and F. Adriana López, "Neutrosophic

    Analytic Hierarchy Process for the Control of the Economic Resources Assigned as Alimony,"

    Neutrosophic Sets and Systems, vol. 44, pp. 82-89, 2021.

    [15] C. P. Cisneros Zúñiga, R. C. Jiménez Martínez, and L. R. Miranda Chávez, "Neutrosophic Analytic

    Hierarchy Process for the Control of the Economic Resources Assigned as Alimony," Neutrosophic

    Sets and Systems, vol. 37, pp. 80-89, 2020.

    [16] A.-B. Mohamed and M. Mohamed, "Multi-criteria group decision making based on neutrosophic

    analytic hierarchy process: Suggested modifications," Neutrosophic Sets and Systems, vol. 43, 2021.

    [17] B. Mallick, B. Sarkar, and S. Das, "Application of the vikor method for multicriteria inventory

    classification," Indian Science Cruiser, vol. 31, pp. 15-21, 2017.

    [18] H. Paronyan, R. M. Carballido, and M. A. Matos, "Neutrosophic VIKOR for Proposal of Reform to

    Article 189 of the Integral Criminal Code in Ecuador," Neutrosophic Sets and Systems, vol. 37, pp.

    287-294, 2020.

    [19] S. Opricovic, & Tzeng, G. H. , "Extended VIKOR method in comparison with outranking methods,"

    European Journal of Operational Research, vol. 178, pp. 514-529, 2007.

    [20] M. Abdel-Baset, V. Chang, A. Gamal, and F. Smarandache, "An integrated neutrosophic ANP and

    VIKOR method for achieving sustainable supplier selection: A case study in importing field.,"

    Computers in Industry, vol. 106, pp. 94-110, 2019.

    Cite This Article As :
    D.M.M. Fernández, M.Y.L. Vázquez. "Main types of computer crimes existing in Ecuador." Full Length Article, Vol. 1, No. 1, 2022 ,PP. 56-65 (Doi   :  https://doi.org/10.54216/JSPR.010106)
    D.M.M. Fernández, M.Y.L. Vázquez. (2022). Main types of computer crimes existing in Ecuador. Journal of , 1 ( 1 ), 56-65 (Doi   :  https://doi.org/10.54216/JSPR.010106)
    D.M.M. Fernández, M.Y.L. Vázquez. "Main types of computer crimes existing in Ecuador." Journal of , 1 no. 1 (2022): 56-65 (Doi   :  https://doi.org/10.54216/JSPR.010106)
    D.M.M. Fernández, M.Y.L. Vázquez. (2022). Main types of computer crimes existing in Ecuador. Journal of , 1 ( 1 ), 56-65 (Doi   :  https://doi.org/10.54216/JSPR.010106)
    D.M.M. Fernández, M.Y.L. Vázquez. Main types of computer crimes existing in Ecuador. Journal of , (2022); 1 ( 1 ): 56-65 (Doi   :  https://doi.org/10.54216/JSPR.010106)
    D.M.M. Fernández, M.Y.L. Vázquez, Main types of computer crimes existing in Ecuador, Journal of , Vol. 1 , No. 1 , (2022) : 56-65 (Doi   :  https://doi.org/10.54216/JSPR.010106)