{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T16:05:00Z","timestamp":1649174700130},"reference-count":0,"publisher":"IOS Press","license":[{"start":{"date-parts":[[2020,11,9]],"date-time":"2020-11-09T00:00:00Z","timestamp":1604880000000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,9]]},"abstract":"<jats:p>Security and privacy problems in information management are evident in public organizations. The objective of this research is the analisys risks that these organizations run, since computer attacks have increased along with both internal and external threats. Causing information and database thefts, there are risk analysis methodologies which are oriented to the objective for the preservation of guaranteeing the security and privacy of the information. Were used the deductive method and exploratory research to analyze the articles in the references and in the information available online and MAGERIT methodology what protects the information in its integrity, confidentiality and availability guaranteeing the security of the system and processes of public organizations. It turned out a Control of Security and Privacy factors, Threat Probability, Risk Assessment Formula, Prototype of Risk Management for Public Organizations and Privacy and security factor formula. It was concluded that MAGERIT is an alternative what allow mitigate the vulnerabilitys, threat and risks its processes in public organizations for protecting their information.<\/jats:p>","DOI":"10.3233\/faia200716","type":"book-chapter","created":{"date-parts":[[2020,11,10]],"date-time":"2020-11-10T17:50:09Z","timestamp":1605030609000},"source":"Crossref","is-referenced-by-count":0,"title":["Security and Privacy in Information Management in a Distributed Environment for Public Organizations"],"prefix":"10.3233","author":[{"given":"Segundo Mois\u00e9s","family":"Toapanta Toapanta","sequence":"first","affiliation":[{"name":"Computer Science Department, Salesian Polytechnic University of Ecuador (UPS), Chambers 227 and June, Ecuador"}]},{"given":"Yaritza Julieth","family":"Ter\u00e1n Terranova","sequence":"additional","affiliation":[{"name":"Computer Science Department, Salesian Polytechnic University of Ecuador (UPS), Chambers 227 and June, Ecuador"}]},{"given":"Bertha Alice","family":"Naranjo S\u00e1nchez","sequence":"additional","affiliation":[{"name":"Computer Science Department, Salesian Polytechnic University of Ecuador (UPS), Chambers 227 and June, Ecuador"}]},{"given":"Luis Enrique","family":"Mafla Gallegos","sequence":"additional","affiliation":[{"name":"Faculty of Systems Engineering, National Polytechnic School (EPN), Ladr\u00f3n the Guevara E11\u00b7253, Ecuador"}]}],"member":"7437","container-title":["Frontiers in Artificial Intelligence and Applications","Fuzzy Systems and Data Mining VI"],"original-title":[],"link":[{"URL":"http:\/\/ebooks.iospress.nl\/pdf\/doi\/10.3233\/FAIA200716","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,10]],"date-time":"2020-11-10T17:50:10Z","timestamp":1605030610000},"score":1,"resource":{"primary":{"URL":"http:\/\/ebooks.iospress.nl\/doi\/10.3233\/FAIA200716"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,9]]},"references-count":0,"URL":"https:\/\/doi.org\/10.3233\/faia200716","relation":{},"ISSN":["0922-6389","1879-8314"],"issn-type":[{"value":"0922-6389","type":"print"},{"value":"1879-8314","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,11,9]]}}}