La importancia del uso de las aplicaciones digitales para la protección de nuestros datos personales.

Data in our current context and probably without realizing it has become one of the most important assets of this century, it has become a currency for many aspects, and it is also a key to access and power, for which, the main objective of this research, is to analyze the importance of our data and...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Plaza Zapata, Steeven Enrique (author)
Format: bachelorThesis
Veröffentlicht: 2022
Schlagworte:
Online Zugang:http://dspace.utb.edu.ec/handle/49000/12677
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
_version_ 1863483812376215552
author Plaza Zapata, Steeven Enrique
author_facet Plaza Zapata, Steeven Enrique
author_role author
collection Repositorio Universidad Técnica de Babahoyo
dc.contributor.none.fl_str_mv Delgado Cuadro, Enrique Ismael
dc.creator.none.fl_str_mv Plaza Zapata, Steeven Enrique
dc.date.none.fl_str_mv 2022-10-08T06:49:37Z
2022-10-08T06:49:37Z
2022
dc.format.none.fl_str_mv 42 p.
application/pdf
dc.identifier.none.fl_str_mv http://dspace.utb.edu.ec/handle/49000/12677
dc.language.none.fl_str_mv es
dc.publisher.none.fl_str_mv Babahoyo: UTB-FAFI. 2022
dc.rights.none.fl_str_mv Atribución-NoComercial-SinDerivadas 3.0 Ecuador
http://creativecommons.org/licenses/by-nc-nd/3.0/ec/
info:eu-repo/semantics/openAccess
dc.source.none.fl_str_mv reponame:Repositorio Universidad Técnica de Babahoyo
instname:Universidad Técnica de Babahoyo
instacron:UTB
dc.subject.none.fl_str_mv Datos
Recopilación
Privacidad
Usufructo
Explotación
Vigilancia
Cambridge Analytica
dc.title.none.fl_str_mv La importancia del uso de las aplicaciones digitales para la protección de nuestros datos personales.
dc.type.none.fl_str_mv info:eu-repo/semantics/publishedVersion
info:eu-repo/semantics/bachelorThesis
description Data in our current context and probably without realizing it has become one of the most important assets of this century, it has become a currency for many aspects, and it is also a key to access and power, for which, the main objective of this research, is to analyze the importance of our data and the use of digital applications to protect them, since it is necessary to know that our data has always been valuable, and by interpreting it, we obtain knowledge, and knowledge is an analogy to power, for which it is a priority, given the low popularity of the topic, to know how to protect our data. The methodology used in this research was a non-experimental design, to obtain information the bibliographic method was used, and to process and study the information, the analytical method was used. According to the analysis carried out, it is concluded that, since they began to collect data from citizens, and discovered that by analyzing it, they could obtain valuable information, personal data has become a very important asset, granting power to those who possess it, currently, they collect our personal data all the time, immersed in surveillance, traffic with our data and we do not know exactly how companies use them, becoming a lacerating asset for us, however, we can still take care of our data since there are alternatives for its protection.
eu_rights_str_mv openAccess
format bachelorThesis
id UTB_1950ac970933376a2fa0c3028c5efca1
instacron_str UTB
institution UTB
instname_str Universidad Técnica de Babahoyo
language_invalid_str_mv es
network_acronym_str UTB
network_name_str Repositorio Universidad Técnica de Babahoyo
oai_identifier_str oai:dspace.utb.edu.ec:49000/12677
publishDate 2022
publisher.none.fl_str_mv Babahoyo: UTB-FAFI. 2022
reponame_str Repositorio Universidad Técnica de Babahoyo
repository.mail.fl_str_mv .
repository.name.fl_str_mv Repositorio Universidad Técnica de Babahoyo - Universidad Técnica de Babahoyo
repository_id_str 0
rights_invalid_str_mv Atribución-NoComercial-SinDerivadas 3.0 Ecuador
http://creativecommons.org/licenses/by-nc-nd/3.0/ec/
spelling La importancia del uso de las aplicaciones digitales para la protección de nuestros datos personales.Plaza Zapata, Steeven EnriqueDatosRecopilaciónPrivacidadUsufructoExplotaciónVigilanciaCambridge AnalyticaData in our current context and probably without realizing it has become one of the most important assets of this century, it has become a currency for many aspects, and it is also a key to access and power, for which, the main objective of this research, is to analyze the importance of our data and the use of digital applications to protect them, since it is necessary to know that our data has always been valuable, and by interpreting it, we obtain knowledge, and knowledge is an analogy to power, for which it is a priority, given the low popularity of the topic, to know how to protect our data. The methodology used in this research was a non-experimental design, to obtain information the bibliographic method was used, and to process and study the information, the analytical method was used. According to the analysis carried out, it is concluded that, since they began to collect data from citizens, and discovered that by analyzing it, they could obtain valuable information, personal data has become a very important asset, granting power to those who possess it, currently, they collect our personal data all the time, immersed in surveillance, traffic with our data and we do not know exactly how companies use them, becoming a lacerating asset for us, however, we can still take care of our data since there are alternatives for its protection.Data in our current context and probably without realizing it has become one of the most important assets of this century, it has become a currency for many aspects, and it is also a key to access and power, for which, the main objective of this research, is to analyze the importance of our data and the use of digital applications to protect them, since it is necessary to know that our data has always been valuable, and by interpreting it, we obtain knowledge, and knowledge is an analogy to power, for which it is a priority, given the low popularity of the topic, to know how to protect our data. The methodology used in this research was a non-experimental design, to obtain information the bibliographic method was used, and to process and study the information, the analytical method was used. According to the analysis carried out, it is concluded that, since they began to collect data from citizens, and discovered that by analyzing it, they could obtain valuable information, personal data has become a very important asset, granting power to those who possess it, currently, they collect our personal data all the time, immersed in surveillance, traffic with our data and we do not know exactly how companies use them, becoming a lacerating asset for us, however, we can still take care of our data since there are alternatives for its protection.Los datos en nuestro contexto actual y probablemente sin darnos cuenta, se han convertido en uno de los activos mas importantes de este siglo, se ha convertido en una moneda de cambio para muchos aspectos, también es una llave de acceso y poder, por lo cual, el objetivo principal de esta investigación es analizar la importancia que tienen nuestros datos y el uso de aplicaciones digitales para protegerlos, ya que es menester conocer que nuestros datos han sido valiosos desde siempre, y al interpretarse, obtenemos conocimiento, y el conocimiento es una analogía al poder, por lo cual es prioridad, ante la poca popularidad del tema, saber proteger nuestros datos. La metodología empleada en esta investigación fue un diseño no experimental, para obtener información se ocupó el método bibliográfico y para procesar y estudiar la información, se utilizó el método analítico. Acorde con el análisis efectuado, se concluye que, desde que se comenzó a recopilar datos de los ciudadanos, y descubrieron que al analizarlo, podrían obtener información valiosa, los datos personales se convirtieron en una activo muy importante otorgando poder a quien los posee, actualmente recopilan nuestros datos personales todo el tiempo, sumergidos en una vigilancia, trafican con nuestros datos y no sabemos con exactitud el uso que las empresas les dan, convirtiéndose en un activo lacerante para nosotros, sin embargo, aún podemos cuidar nuestros datos, ya que existen alternativas para su protección.Babahoyo: UTB-FAFI. 2022Delgado Cuadro, Enrique Ismael2022-10-08T06:49:37Z2022-10-08T06:49:37Z2022info:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/bachelorThesis42 p.application/pdfhttp://dspace.utb.edu.ec/handle/49000/12677esAtribución-NoComercial-SinDerivadas 3.0 Ecuadorhttp://creativecommons.org/licenses/by-nc-nd/3.0/ec/info:eu-repo/semantics/openAccessreponame:Repositorio Universidad Técnica de Babahoyoinstname:Universidad Técnica de Babahoyoinstacron:UTB2022-10-08T08:01:13Zoai:dspace.utb.edu.ec:49000/12677Institucionalhttp://dspace.utb.edu.ec/Universidad públicahttps://utb.edu.ec/http://dspace.utb.edu.ec/oai.Ecuador...opendoar:02026-04-25T22:25:30.682Repositorio Universidad Técnica de Babahoyo - Universidad Técnica de Babahoyotrue
spellingShingle La importancia del uso de las aplicaciones digitales para la protección de nuestros datos personales.
Plaza Zapata, Steeven Enrique
Datos
Recopilación
Privacidad
Usufructo
Explotación
Vigilancia
Cambridge Analytica
status_str publishedVersion
title La importancia del uso de las aplicaciones digitales para la protección de nuestros datos personales.
title_full La importancia del uso de las aplicaciones digitales para la protección de nuestros datos personales.
title_fullStr La importancia del uso de las aplicaciones digitales para la protección de nuestros datos personales.
title_full_unstemmed La importancia del uso de las aplicaciones digitales para la protección de nuestros datos personales.
title_short La importancia del uso de las aplicaciones digitales para la protección de nuestros datos personales.
title_sort La importancia del uso de las aplicaciones digitales para la protección de nuestros datos personales.
topic Datos
Recopilación
Privacidad
Usufructo
Explotación
Vigilancia
Cambridge Analytica
url http://dspace.utb.edu.ec/handle/49000/12677