Mostrando 1 - 13 Resultados de 13 Para Buscar 'Rodríguez Baca, Liset', tiempo de consulta: 0.16s Limitar resultados
1
artículo
Currently, applying regulations oriented to cybersecurity, cyber resilience is relevant to face the high rates of cyberattacks, which have caused an interruption in the operational processes of organizations, generating an economic loss, and affecting the continuity of their business processes on the web. In this scenario, small and medium-sized enterprises (SMEs) are the most affected due to their weak technological infrastructure. Given this, this experimental study was developed to implement a regulatory framework for the improvement of cyber resilience; the criteria anticipate, resist, recover and evolve presented significant statistical values of improvement after the application of the experiment. This research contributes to counteract the refusal to use information technologies for business development; Improvement actions were carried out to face threats and computer vulnerabili...
2
artículo
The advancement of technology in the worldcauses, among other aspects, the handling of important information, which can be considered as fundamental for the strategic interests of companies. The objective of the research was to analyze the influence of the application of ISO 27001 on the information security of a private company in Lima (Peru). Based on the application of a quantitative methodology, a pre-experimental study was used in which the influence of the application of ISO 27001 was determined. To this end, a sample of 30 employees of the company was considered. The quantitative conclusion shows that there is an influence of the application of ISO on information security and the dimensions of confidentiality, integrity and availability.
3
artículo
El avance de la tecnología en el mundo provoca, entre otros aspectos, el manejo de importante información la misma que puede considerarse como fundamental para los intereses estratégicos de las empresas. La investigación tuvo como objetivo el analizar la influencia de la aplicación del ISO 27001 en la seguridad de la información de una empresa privada de Lima (Perú). A partir de la aplicación de una metodología cuantitativa, se empleó un estudio pre experimental en el que se determinó la influencia de la aplicación del ISO 27001.Para ello se consideró a una muestra de 30 colaboradores de la empresa. La conclusión cuantitativa muestra que si existe una influencia de la aplicación del ISO en la seguridad de la información y en las dimensiones confidencialidad, integridad y disponibilidad.
4
tesis doctoral
El objetivo del presente trabajo de investigación es determinar la Influencia de la metodología “AOP –modelo BIG 6” en el desarrollo de habilidades cognitivas y aprendizaje de la experiencia curricular de metodología de programación de los estudiante de Ingeniería de Sistemas, Universidad César Vallejo- 2015. Tipo de investigación aplicada, de diseño cuasi experimental, de corte transversal. La población constituida por los estudiantes del II ciclo de la Escuela Académico Profesional de Ingeniería de Sistemas del campus Ate. La muestra seleccionada por las secciones de II “A1” y II A2” como grupos experimental (28) y control (31), respectivamente. Se aplicaron evaluaciones construidas de acuerdo a los parámetros que establece la Oficina de Desarrollo Académico (ODA) de la Universidad César Vallejo. Se aplicaron 10 sesiones de aprendizaje en el cual se entregó g...
5
tesis de maestría
A medida que las tecnologías de información y comunicación se van empoderando en las organizaciones, también son víctimas de ataques en el ciberespacio, generando una la necesidad de protección del activo más importante, la información. Por esta razón, es importante el desarrollo del marco referencial “HOGO” basado en las buenas prácticas del ISO 27002 y los controles de seguridad del ISO 27032 para la ciberseguridad en las PyMES. Los resultados de la investigación muestran los beneficios de la implementación del marco referencial “HOGO” en las PyMES, aplicando buenas prácticas relacionadas a la seguridad en internet, de las infraestructuras criticas para la información, seguridad de las redes y seguridad de la información.
6
artículo
Faced with adverse circumstances, many people have sought refuge in drug addictions, drug use and abuse, which have negative consequences for their health. The authorities and professionals of different countries have developed a group of actions in the educational, legal, social and environmental fields, and have declared a very marked fight for the prevention of legal drugs. The aim of this article is to characterize the intersectoral link on smoking and its education, attenuation and control based on a study of the situation in the contemporary world.
7
artículo
En el contexto educativo, les corresponde a los educadores ofrecerles a los escolares diferentes vías para prevenir el consumo de del tabaco, acción que se emprende desde la interacción y apoyo con la familia y la comunidad. El propósito de este artículo es realizar un estudio acerca de la protección de escolares en grupos de riesgos ante el tabaquismo y su educación social. 
8
artículo
Ante circunstancias adversas, numerosas personas han buscado refugio en las adicciones a las drogas, el uso y abuso de las mismas, lo que trae consigo consecuencias negativas para su salud. Las autoridades y profesionales de diferentes países han desarrollado un grupo de acciones en los órdenes educativo, jurídico, social y ambiental, y han declarado una lucha muy marcada para la prevención ante las drogas legales. El presente artículo tiene como objetivo: Caracterizar el vínculo intersectorial sobre el tabaquismo y su educación, atenuación y control a partir de un estudio ante la situación en el mundo contemporáneo.
9
artículo
The quality of chilli is prime concern for farmers, traders and chilli processing industries. The effective determination of chilli dryness and ripening stages are important factors in determining its quality and chilli shelf life with respect to manual estimation of ripening/dryness that are complex and time consuming. Chilli dryness and ripeness prediction at post-harvest stage by non-destructive machine vision technologies have potential of fair valuation for chilli produce for the chilli stalk holders. Chilli pericarp color values calculated from RGB, HSV and CIE-L*a*b* color space, texture properties using edge-wrinkles parameters are described by histogram of oriented gradients (HOG). LDA(linear discriminant analysis), RF(random-forest) and SVM(support vector machine) classifiers are analysed for performance accuracy for chilli dryness identification and chilli ripening stages usin...
10
artículo
Emotions are part of every human being; they are part of the biological structural system. They are sensations that are acquired through neurological transmitters. Therefore, they play an important role in the development of people. From the sentimental perspective, which are internal feelings that, in turn, are divided into secondary and adaptive emotions, rumination consists of repetitive, intrusive, and unwanted ideas with feelings of worry, sadness, among others, that generate symptoms of emotional discomfort. Therefore, obsessive and difficult to handle ideas are presented.The general objective of the research was to know the rumination levels of university students according to age and gender. The quantitative approach was used, the descriptive method, the type of study was substantive with a sample of 850 students of the health career under a random probabilistic sampling. The Rum...
11
artículo
At present, sentiment analysis has become a trend; above all, in digital product development companies, as it is essential for rapid and automatic analysis. Sentiment analysis deals with emotions with the help of software, and it is playing an unavoidable role in workplaces. The constant growth of social networks, especially the Twitter social network, has made the ability to understand and comprehend users or clients take a greater scope regarding their needs; and therefore, increase the complexity of analysis of this social network, causing excessive expenses in time, personnel and money. This work presents a solution through the application of Machine Learning (ML) for sentiment analysis and thus improve analysis, execution time and customer satisfaction. The scope of this research is limited to using the Support Vector Machine (SVM) supervised learning technique for the intended anal...
12
artículo
The large branches of Machine Learning represent an immense support for the detection of malicious websites, they can predict whether a URL is malicious or benign, leaving aside the cyber attacks that can generate for net-work users who are unaware of them. The objective of the research was to know the state of the art about Neural Networks and their impact for the Detection of malicious Websites in network users. For this purpose, a systematic literature review (SLR) was conducted from 2017 to 2021. The search identified 561 963 papers from different sources such as Taylor & Francis Online, IEEE Xplore, ARDI, ScienceDirect, Wiley Online Library, ACM Digital Library and Microsoft Academic. Of the papers only 82 were considered based on exclusion criteria formulated by the author. As a result of the SLR, studies focused on machine learning (ML), where it recommends the use of algorithms t...
13
artículo
The present study shows the need to reflect on the sequences of cognitive processes of logical thinking in children with ADHD, andit also provides strategies to promote them. The research was carried out on a sample of 11 children with ADHD within the ages of 5 and 6, identified by the checklist of the DSM_IV in addition to the interview sessions with their teachers and classmates. Due to the characteristics described, the study is based on the qualitative approach of ethnographic design and documentary review. It was concluded that these children often make frequent errors in the resolution of logical operations due to lack of attention and concentration during the algorithmization of arithmetic operations. They cannot combine the implicit data of situations in problems with literal statements, and they also show a high level of dyscalculia. On the other hand, the learning of these chil...