Law, computing, and Corruption. An approach to the Ecuadorian reality.
Abstract
Computer systems are specifically configured according to institutional needs; However, if the administrator exceeds the authorization granted by the owner by executing malicious acts that alter, manipulate or modify computer data, they incur acts of corruption sanctioned by law; therefore, the objective of the work consisted of explaining the importance of strengthening security measures, auditing and access control to automated information systems, which do not allow their violation, and preventing the execution of different illegal behaviors. Methods such as historical-logical, analytical-synthetic, and content analysis as a technique were used, justifying the need to secure computer systems with physical and logical security measures.