Análisis de la influencia de los ciberataques para la generación de políticas públicas en el Ecuador en el ámbito de la gobernanza del Internet.
In Ecuador, according to the Constitution of the Republic in article 313 it considers telecommunications as part of the strategic sector and as such, the state has the right to administer, regulate, control, and manage said sector. Also, it was determinate that access to information is a right of ci...
Saved in:
Main Author: | |
---|---|
Format: | masterThesis |
Language: | spa |
Published: |
2023
|
Subjects: | |
Online Access: | https://dspace.unl.edu.ec/jspui/handle/123456789/27124 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | In Ecuador, according to the Constitution of the Republic in article 313 it considers telecommunications as part of the strategic sector and as such, the state has the right to administer, regulate, control, and manage said sector. Also, it was determinate that access to information is a right of citizens, however, access to information through the Internet implies that special care must be taken with all data due to the digital footprint that we leave in cyberspace. This is important because our personal data is a very valuable resource and we must take all precautionary measures to protect it. Since information today is exposed and relatively easy to access through the Internet, various legal tools are required to protect citizens and ensure their security against cyber-attacks. These attacks are constantly evolving and improving along with technology, so it has been determined that legal instruments must adapt to these changes to significantly mitigate attacks and protect citizens. For this purpose, laws written in our country regarding the protection of users will be examined, such as the Organic Law of Telecomunications, the Organic Law of Protection of Personal Data and the National Cyber security strategy of Ecuador. This will make it possible to generate public policies in the field of Internet governance, which will result in proposals to improve the national security strategy. Keywords: Cyber-attacks, Internet governance, cybersecurity, public policies, multistake-holder model, cyberspace. |
---|