Computer Crimes: The Ecuador Case

Authors

DOI:

https://doi.org/10.36097/rsan.v1i58.2667

Keywords:

internet, computer crimes, criminal code, cyber attack, attack on integrity

Abstract

The present study aims to analyze the different types of internet attacks and how they are classified as crimes in the Ecuadorian Comprehensive Organic Penal Code. The research relies on a qualitative method with a descriptive analysis of the collected literature, which involved a thorough review of documents, books, journal articles, and websites about various cybercrimes that occur in Ecuador. The focus is on the vulnerability of users and services on the web, with an emphasis on cyberattacks, and how computer crimes are classified in Ecuadorian laws. In conclusion, it is established that Ecuador lacks a legislative framework to support the security of citizens' information. Additionally, there are shortcomings in relation to the classification of computer crimes, as well as the recognition of different activities that contribute to these crimes and the absence of promotion of secure protocols in response to user vulnerability.

References

Código Orgánico Integral Penal [COIP]. (2014, 17 de febrero). Registro Oficial Suplemento 180. https://www.defensa.gob.ec/wp-content/uploads/downloads/2021/03/COIP_act_feb-2021.pdf

Echeverría, M., Garaycoa, M., & Tusev, A. (2020). Are ecuadorian millennials prepared against a cyberattack?. Revista Chakiñan de Ciencias Sociales y Humanidades, (10), 73-86. https://doi.org/10.37135/chk.002.10.05

Fiscalía General del Estado. (2022, 22 de abril). Exfuncionaria de Fiscalía, sentenciada por ataque a sistemas informáticos. Boletín de prensa FGE N.- 280-DC-2022. https://www.fiscalia.gob.ec/exfuncionaria-de-fiscalia-sentenciada-por-ataque-a-sistemas-informaticos/

Fiscalía General del Estado. (2023, 3 de Marzo). Fiscalía obtiene sentencia por los delitos de acceso no consentido a un sistema informático, telemático o de telecomunicaciones y revelación ilegal de base de datos. Boletín de prensa FGE Nº 204-DC-2023. https://www.fiscalia.gob.ec/fiscalia-obtiene-sentencia-por-los-delitos-de-acceso-no-consentido-a-un-sistema-informatico-telematico-o-de-telecomunicaciones-y-revelacion-ilegal-de-base-de-datos/

Lema, H., Simba, F., y Ally, A. (2018). Preventing Utilization of Shared Network Resources by Detecting IP Spoofing Attacks through Validation of source IP Address. 2018 IST-Africa Week Conference (IST-Africa) (pp. 1-8). Botswana. https://ieeexplore.ieee.org/document/8417335

Ley Orgánica de Telecomunicaciones (2015, 12 de febrero). Registro Oficial Nº 439. https://www.telecomunicaciones.gob.ec/wp-content/uploads/downloads/2016/05/Ley-Org%C3%A1nica-de-Telecomunicaciones.pdf

Ley Orgánica de Protección de Datos Personales. (2021, 26 de mayo). Registro Oficial Suplemento 459. https://finanzaspopulares.gob.ec/wp-content/uploads/2021/07/ley_organica_de_proteccion_de_datos_personales.pdf

Liu, S. (2019). MAC Spoofing Attack Detection Based on Physical Layer Characteristics in Wireless Networks. 2019 IEEE International Conference on Computational Electromagnetics (ICCEM). Beijing. https://doi.org/10.1109/COMPEM.2019.8779180

Lujan, S. (2002). Programación de aplicaciones web: historia, principios básicos y clientes web. . En S. Lujan, Programación de aplicaciones web: historia, principios básicos y clientes web. (p. 321). Editorial Club Universitario.

Mandal, S., y Khan, D. (2020). A Study of Security Threats in Cloud: Passive Impact of COVID-19 Pandemic. International Conference on Smart Electronics and Communication (pp. 837-842). India. https://doi.org/10.1109/ICOSEC49089.2020.9215374

Maniou, T., y Veglis, A. (2020). Employing a Chatbot for News Dissemination during. Future Internet , 12(7), 2-14. https://doi.org/10.3390/fi12070109

Min, D., Ko, Y., Walker, R., Lee, J., y Kim, Y. (2022). A Content-Based Ransomware Detection and Backup Solid-State Drive for Ransomware Defense. IEEE Transactions on Computer-aided Design of Integrated Circuits and Systems, 41(7), 2038-2051. https://doi.org/10.1109/TCAD.2021.3099084

Naciones Unidas. (2015). Objetivos del desarrollo sostenible. https://www.un.org/sustainabledevelopment/es/peace-justice/

Narváez, A. (2023). Espacio virtual e imaginarios urbanos. Centro de Estudios en Diseño y Comunicación(204), 31-47. https://www.researchgate.net/publication/372415867_Espacio_virtual_e_imaginarios_urbanos

Saltos Salgado, M. F., Robalino Villafuerte, J. L., & Pazmiño Salazar, L. D. (2021). Análisis conceptual del delito informático en Ecuador. Conrado, 17(78), 343-351. http://scielo.sld.cu/scielo.php?pid=s1990-86442021000100343&script=sci_arttext

Unión Internacional de Telecomunicaciones [ITU]. (2023). Global offline population steadily declines to 2.6 billion people in 2023. https://www.itu.int/itu-d/reports/statistics/2023/10/10/ff23-internet-use/

Unión Internacional de Telecomunicaciones [ITU]. (2022). Cyberattacks Threaten Security in Ecuador. https://dialogo-americas.com/articles/cyberattacks-threaten-security-in-ecuador/

Villavicencio, F. (2014). Delitos Informáticos. Ius Et Veritas, 49(24), 284-304. https://revistas.pucp.edu.pe/index.php/iusetveritas/article/view/13630

Wadha, A.-K., Al-Maadeed, S., Ahmed, A., Sadiq, A., y Khan, M. (2020). Comprehensive Review of Cybercrime Detection Techniques. IEEE Access, 8, 137293-137311. https://doi.org/10.1109/ACCESS.2020.301125

Published

2024-06-30

How to Cite

Ponce Tubay, M. A. (2024). Computer Crimes: The Ecuador Case. Revista San Gregorio, 1(58), 119–123. https://doi.org/10.36097/rsan.v1i58.2667

Issue

Section

ARTÍCULOS DE REVISIÓN