Volume 1 , Issue 1 , PP: 56-65, 2022 | Cite this article as | XML | Html | PDF | Full Length Article
D.M.M. Fernández 1 * , M.Y.L. Vázquez 2
Doi: https://doi.org/10.54216/JSPR.010106
The introduction and use of Information and Communication Technologies (ICT) have meant a vertiginous leap in scientific-technical development on a global scale, they have become an indispensable element in all facets of society. Without a doubt, the use of the Internet makes life easier for users, but those benefits become dangerous when unscrupulous people silently infiltrate to damage not only technical equipment but also the finances of individuals, companies, and governments. The objective of the investigation is to determine the main types of computer crimes existing in Ecuador, as well as the possible solutions to avoid them. Different research techniques and methods were studied, such as synthetic analytical, inductive deductive, logical historical, as well as the descriptive method, interviews, and surveys in the same way that tools such as descriptive surveys and referential research were used. To fulfill the proposed objective, the AHP Saaty and Vikor multicriteria methods were used, where the crimes with the highest probability of occurring in the country and the best techniques to combat them were obtained as conclusions.
computer crimes , internet , experts , AHP Saaty , Vikor
[1] M. G. Acosta, M. M. Benavides, and N. P. García, "Computer crimes: organizational impunity and
its complexity in the business world," Venezuelan Journal of Management, vol. 25, pp. 351 -368,
2020.
[2] F. V. Núñez Pérez and B. Carhuancho Zaldaña, "Cybercrime in times of COVID-19: The violation
of constitutional rights?," Lumen: Journal of the Faculty of Law, vol. 16, pp. 93-100, 2020.
[3] T. E. Fuentes Manrufo, R. Manzún Cruz, and G. M. Cancino Mendez, "Perspective on computer
crimes: A point of view of students of the Superior Technological Progreso.," Journal Advances in
Engineering and Innovation, vol. 2, pp. 1-8, 2018.
[4] J. López Gorostidi, "The plurality of victims derived from the high harmfulness in cybercrimes: a
proportional criminal response," Deusto Studies: Journal of the University of Deusto, vol. 68, pp.
201-221, 2020.
[5] M. F. Saltos Salgado, J. L. Robalino Villafuerte, and L. D. Pazmiño Salazar, "Conceptual analysis
of computer crime in Ecuador.," Conrad Magazine,, vol. 17, pp. 343-351, 2021.
[6] J. Zambrano Mendieta, K. Dueñas Zambrano, and L. Macías Ordoñez, "Computer crime: Criminal
procedure in Ecuador.," Scientific Magazine Dominion of Sciences, vol. 2, pp. 204-215, 2016.
[7] F. Linares Miró, "Crime, cybercrime and COVID-19: (accelerating) displacement of opportunities
and situational adaptation of cybercrime," ILP: Magazine of Internet, Law and Politics, pp. 1-17,
2021.
[8] Comprehensive Criminal Organic Code, 2014.
[9] M. L. Peralta Zuñiga and D. N. Aguilar Valarezo, "Cybersecurity and its conception in SMEs in
Cuenca, Ecuador.," Accounting and auditing, vol. 53, pp. 99-126, 2021.
[10] E. Universo. (2020). Computer crimes grow in Ecuador; every click on the web leaves its trail.
Available: https://www.eluniverso.com/noticias/2020/09/27/nota/7991905/delitosinformaticosinternet-
casos-reales-redes-sociales-ecuador/
[11] T. L. Saaty, Decision making for leaders: : RWS Publications, 2014.
[12] J. E. Ricardo, Z. M. M. Rosado, E. K. C. Pataron, and V. Y. V. Vargas, "Measuring Legal and
Socioeconomic Effect of the Declared Debtors Usign The AHP Technique in a Neutrosophic
Framework," Neutrosophic Sets and Systems, vol. 44, pp. 357-366, 2021.
[13] A.-B. Mohamed and M. Mohamed, "Multi-criteria group decision making based on neutrosophic
analytic hierarchy process: Suggested modifications," Neutrosophic Sets and Systems, vol. 43, pp.
247-254, 2021.
[14] I. A. González, M. F. L. Barragán, D. M. L. Domínguez, and F. Adriana López, "Neutrosophic
Analytic Hierarchy Process for the Control of the Economic Resources Assigned as Alimony,"
Neutrosophic Sets and Systems, vol. 44, pp. 82-89, 2021.
[15] C. P. Cisneros Zúñiga, R. C. Jiménez Martínez, and L. R. Miranda Chávez, "Neutrosophic Analytic
Hierarchy Process for the Control of the Economic Resources Assigned as Alimony," Neutrosophic
Sets and Systems, vol. 37, pp. 80-89, 2020.
[16] A.-B. Mohamed and M. Mohamed, "Multi-criteria group decision making based on neutrosophic
analytic hierarchy process: Suggested modifications," Neutrosophic Sets and Systems, vol. 43, 2021.
[17] B. Mallick, B. Sarkar, and S. Das, "Application of the vikor method for multicriteria inventory
classification," Indian Science Cruiser, vol. 31, pp. 15-21, 2017.
[18] H. Paronyan, R. M. Carballido, and M. A. Matos, "Neutrosophic VIKOR for Proposal of Reform to
Article 189 of the Integral Criminal Code in Ecuador," Neutrosophic Sets and Systems, vol. 37, pp.
287-294, 2020.
[19] S. Opricovic, & Tzeng, G. H. , "Extended VIKOR method in comparison with outranking methods,"
European Journal of Operational Research, vol. 178, pp. 514-529, 2007.
[20] M. Abdel-Baset, V. Chang, A. Gamal, and F. Smarandache, "An integrated neutrosophic ANP and
VIKOR method for achieving sustainable supplier selection: A case study in importing field.,"
Computers in Industry, vol. 106, pp. 94-110, 2019.