Computer Crimes: The Ecuador Case
DOI:
https://doi.org/10.36097/rsan.v1i58.2667Keywords:
internet, computer crimes, criminal code, cyber attack, attack on integrityAbstract
The present study aims to analyze the different types of internet attacks and how they are classified as crimes in the Ecuadorian Comprehensive Organic Penal Code. The research relies on a qualitative method with a descriptive analysis of the collected literature, which involved a thorough review of documents, books, journal articles, and websites about various cybercrimes that occur in Ecuador. The focus is on the vulnerability of users and services on the web, with an emphasis on cyberattacks, and how computer crimes are classified in Ecuadorian laws. In conclusion, it is established that Ecuador lacks a legislative framework to support the security of citizens' information. Additionally, there are shortcomings in relation to the classification of computer crimes, as well as the recognition of different activities that contribute to these crimes and the absence of promotion of secure protocols in response to user vulnerability.
Downloads
References
Código Orgánico Integral Penal [COIP]. (2014, 17 de febrero). Registro Oficial Suplemento 180. https://www.defensa.gob.ec/wp-content/uploads/downloads/2021/03/COIP_act_feb-2021.pdf
Echeverría, M., Garaycoa, M., & Tusev, A. (2020). Are ecuadorian millennials prepared against a cyberattack?. Revista Chakiñan de Ciencias Sociales y Humanidades, (10), 73-86. https://doi.org/10.37135/chk.002.10.05
Fiscalía General del Estado. (2022, 22 de abril). Exfuncionaria de Fiscalía, sentenciada por ataque a sistemas informáticos. Boletín de prensa FGE N.- 280-DC-2022. https://www.fiscalia.gob.ec/exfuncionaria-de-fiscalia-sentenciada-por-ataque-a-sistemas-informaticos/
Fiscalía General del Estado. (2023, 3 de Marzo). Fiscalía obtiene sentencia por los delitos de acceso no consentido a un sistema informático, telemático o de telecomunicaciones y revelación ilegal de base de datos. Boletín de prensa FGE Nº 204-DC-2023. https://www.fiscalia.gob.ec/fiscalia-obtiene-sentencia-por-los-delitos-de-acceso-no-consentido-a-un-sistema-informatico-telematico-o-de-telecomunicaciones-y-revelacion-ilegal-de-base-de-datos/
Lema, H., Simba, F., y Ally, A. (2018). Preventing Utilization of Shared Network Resources by Detecting IP Spoofing Attacks through Validation of source IP Address. 2018 IST-Africa Week Conference (IST-Africa) (pp. 1-8). Botswana. https://ieeexplore.ieee.org/document/8417335
Ley Orgánica de Telecomunicaciones (2015, 12 de febrero). Registro Oficial Nº 439. https://www.telecomunicaciones.gob.ec/wp-content/uploads/downloads/2016/05/Ley-Org%C3%A1nica-de-Telecomunicaciones.pdf
Ley Orgánica de Protección de Datos Personales. (2021, 26 de mayo). Registro Oficial Suplemento 459. https://finanzaspopulares.gob.ec/wp-content/uploads/2021/07/ley_organica_de_proteccion_de_datos_personales.pdf
Liu, S. (2019). MAC Spoofing Attack Detection Based on Physical Layer Characteristics in Wireless Networks. 2019 IEEE International Conference on Computational Electromagnetics (ICCEM). Beijing. https://doi.org/10.1109/COMPEM.2019.8779180
Lujan, S. (2002). Programación de aplicaciones web: historia, principios básicos y clientes web. . En S. Lujan, Programación de aplicaciones web: historia, principios básicos y clientes web. (p. 321). Editorial Club Universitario.
Mandal, S., y Khan, D. (2020). A Study of Security Threats in Cloud: Passive Impact of COVID-19 Pandemic. International Conference on Smart Electronics and Communication (pp. 837-842). India. https://doi.org/10.1109/ICOSEC49089.2020.9215374
Maniou, T., y Veglis, A. (2020). Employing a Chatbot for News Dissemination during. Future Internet , 12(7), 2-14. https://doi.org/10.3390/fi12070109
Min, D., Ko, Y., Walker, R., Lee, J., y Kim, Y. (2022). A Content-Based Ransomware Detection and Backup Solid-State Drive for Ransomware Defense. IEEE Transactions on Computer-aided Design of Integrated Circuits and Systems, 41(7), 2038-2051. https://doi.org/10.1109/TCAD.2021.3099084
Naciones Unidas. (2015). Objetivos del desarrollo sostenible. https://www.un.org/sustainabledevelopment/es/peace-justice/
Narváez, A. (2023). Espacio virtual e imaginarios urbanos. Centro de Estudios en Diseño y Comunicación(204), 31-47. https://www.researchgate.net/publication/372415867_Espacio_virtual_e_imaginarios_urbanos
Saltos Salgado, M. F., Robalino Villafuerte, J. L., & Pazmiño Salazar, L. D. (2021). Análisis conceptual del delito informático en Ecuador. Conrado, 17(78), 343-351. http://scielo.sld.cu/scielo.php?pid=s1990-86442021000100343&script=sci_arttext
Unión Internacional de Telecomunicaciones [ITU]. (2023). Global offline population steadily declines to 2.6 billion people in 2023. https://www.itu.int/itu-d/reports/statistics/2023/10/10/ff23-internet-use/
Unión Internacional de Telecomunicaciones [ITU]. (2022). Cyberattacks Threaten Security in Ecuador. https://dialogo-americas.com/articles/cyberattacks-threaten-security-in-ecuador/
Villavicencio, F. (2014). Delitos Informáticos. Ius Et Veritas, 49(24), 284-304. https://revistas.pucp.edu.pe/index.php/iusetveritas/article/view/13630
Wadha, A.-K., Al-Maadeed, S., Ahmed, A., Sadiq, A., y Khan, M. (2020). Comprehensive Review of Cybercrime Detection Techniques. IEEE Access, 8, 137293-137311. https://doi.org/10.1109/ACCESS.2020.301125
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Manuel Alexander Ponce Tubay
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.