2020 3rd International Conference on Information and Computer Technologies (ICICT) 2020
DOI: 10.1109/icict50521.2020.00052
|View full text |Cite
|
Sign up to set email alerts
|

Hyperledger Technology in Public Organizations in Ecuador

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
1
1
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 20 publications
0
2
0
Order By: Relevance
“…The information gathered through data analysis and big data techniques can guide specialized marketing campaigns for specific sectors. Furthermore, daily data generated from customers can be utilized to predict and cater to their future needs [56]. These techniques also provide an opportunity to identify and anticipate auxiliary services customers may require, like extended stays or gym renovations (infrastructure management).…”
Section: Discussionmentioning
confidence: 99%
“…The information gathered through data analysis and big data techniques can guide specialized marketing campaigns for specific sectors. Furthermore, daily data generated from customers can be utilized to predict and cater to their future needs [56]. These techniques also provide an opportunity to identify and anticipate auxiliary services customers may require, like extended stays or gym renovations (infrastructure management).…”
Section: Discussionmentioning
confidence: 99%
“…This is why this article will reveal the help provided by this methodology, it is important to take into account the recommendations on this model since it is considered a timely way to help when public organizations faces risks that affect them. Methodology to ensure information security in a distributed architecture for a public organization of Ecuador [2], Hyperledger technology in public organizations in Ecuador [3], Study of the evolution of information security in Colombia: 2000-2018 [4], Information security methods to protect rest web services communication and data in http requests using json web token and keycloak red hat single sign on [5], El rol de la seguridad informática en el ámbito académico y los sistemas de información asociados [6], Security of networks and information systems in the European Union: A comprehensive approach? [7], WSN security applied to smart metering systems based on cryptography techniques [8], The reduction of number of parliamentary members and the modification of remuneration schemes for deputies in autonomous community [9], A new data protection law [10], From «computing freedom» towards the constitutionalization of new digital rights [11], Securing the human: Broadening diversity in cybersecurity [12], Intruder attacks on wireless sensor networks: A soft decision and prevention mechanism [13], Transposition of EU network and information security directive into national law [14] and An Approach to Optimize the Management of Information Security in Public Organizations of Ecuador [15].…”
Section: Introductionmentioning
confidence: 99%