Propuesta de articulación de un modelo de despliegue de transformación digital con un marco de trabajo de ciberseguridad para los bancos colombianos

dc.contributor.advisorSánchez Torres, Jenny Marcela
dc.contributor.advisorGiraldo Ríos, Lucas Adolfo
dc.contributor.authorInsuasty Mejía, Karol Stephany
dc.contributor.researchgroupGriego (Grupo Investigación en Gestión y Organizaciones)
dc.coverage.countryColombia
dc.date.accessioned2026-01-20T15:43:33Z
dc.date.available2026-01-20T15:43:33Z
dc.date.issued2025
dc.descriptionilustraciones a color, diagramas, tablasspa
dc.description.abstractEste estudio tuvo como propósito principal la construcción de una propuesta de articulación de un modelo de despliegue de transformación digital con un marco de trabajo de ciberseguridad para los bancos colombianos, en respuesta a la necesidad de superar el problema de una débil integración de la transformación digital y la ciberseguridad en el sector bancario colombiano y como contribución a la limitada literatura sobre la relación sinérgica entre estos dos grandes componentes de resiliencia digital. Para ello, se caracterizaron inicialmente los modelos de despliegue de transformación digital y se determinó el marco de trabajo de ciberseguridad que se ajustan a los bancos, a través del método de revisión sistemática de literatura propuesto. Con base en este proceso de búsqueda, se seleccionó el modelo de despliegue de transformación digital denominado Digital Transformation Roadmap y el marco de ciberseguridad ISO 27001:2022 para ser focalizados en la construcción de la propuesta de articulación. Para la validación de contenido de la primera versión de la propuesta, se acudió el método de juicio de expertos complementado con una entrevista semiestructurada a los cinco expertos participantes con base en cuyos resultados se elaboró una versión revisada de la propuesta de articulación. Uno de los principales hallazgos generales de este estudio es haber explorado la posibilidad de articular los controles y elementos de ciberseguridad con los pasos de cada etapa del modelo de despliegue de transformación digital focalizado yendo más allá de la manera habitual de concebir, en el mejor de los casos, a la ciberseguridad como un componente más de la transformación digital. (Texto tomado de la fuente)spa
dc.description.abstractThe main purpose of this study was to construct a proposal for the articulation of a digital transformation deployment model with a cybersecurity framework for Colombian banks. This was in response to the need to overcome the problem of weak integration of digital transformation and cybersecurity in the Colombian banking sector and as a contribution to the limited literature on the synergistic relationship between these two major components of digital resilience. To this end, digital transformation deployment models were initially characterized, and the cybersecurity framework appropriate for banks was determined using the systematic literature review method. Based on this search process, the Digital Transformation Roadmap and the ISO 27001:2022 were selected to focus on the construction of the articulation proposal. To validate the content of the first version of the proposal, the expert judgment method was used, complemented by a semi-structured interview with the five participating experts. Based on the results, a revised version of the articulation proposal was developed. One of the main overall findings of this study is the exploration of the possibility of articulating cybersecurity controls and elements with the steps of each stage of the focused digital transformation deployment model, going beyond the usual way of conceiving cybersecurity as, at best, just another component of the digital transformation deployment model.eng
dc.description.degreelevelMaestría
dc.description.degreenameMagíster en Ingeniería de Sistemas y Computación
dc.description.researchareaSistemas y Organizaciones
dc.format.extent220 páginas
dc.format.mimetypeapplication/pdf
dc.identifier.instnameUniversidad Nacional de Colombiaspa
dc.identifier.reponameRepositorio Institucional Universidad Nacional de Colombiaspa
dc.identifier.repourlhttps://repositorio.unal.edu.co/spa
dc.identifier.urihttps://repositorio.unal.edu.co/handle/unal/89259
dc.language.isospa
dc.publisherUniversidad Nacional de Colombia
dc.publisher.branchUniversidad Nacional de Colombia - Sede Bogotá
dc.publisher.facultyFacultad de Ingeniería
dc.publisher.placeBogotá, Colombia
dc.publisher.programBogotá - Ingeniería - Maestría en Ingeniería - Ingeniería de Sistemas y Computación
dc.relation.referencesP. C. Verhoef, T. Broekhuizen, Y. Bart, A. Bhattacharya, J. Q. Dong, N. Fabian, and M. Haenlein, "Digital transformation: A multidisciplinary reflection and research agenda," J. Bus. Res., vol. 122, pp. 889–901, 2021
dc.relation.referencesC. Loebbecke and A. Picot, ""Reflections on societal and business model transformation arising from digitization and big data analytics: A research agenda,"" J. Strategic Inf. Syst., vol. 24, no. 3, pp. 149–157, 2015."
dc.relation.referencesK. Patel and M. P. McCarthy, Digital Transformation: The Essentials of E-Business Leadership. New York, NY, USA: McGraw-Hill, 2000.
dc.relation.referencesG. Westerman, C. Calméjane, D. Bonnet, P. Ferraris, and A. McAfee, Digital Transformation: A Roadmap for Billion-Dollar Organizations. MIT Center for Digital Business and Capgemini Consulting, 2011. [Online]. Available: https://www.capgemini.com/wp-content/uploads/2017/07/Digital_Transformation__A_Road-Map_for_Billion-Dollar_Organizations.pdf
dc.relation.referencesG. Westerman, M. Tannou, D. Bonnet, P. Ferraris, and A. McAfee, The Digital Advantage: How Digital Leaders Outperform Their Peers in Every Industry. MIT Sloan Management and Capgemini Consulting, 2012.
dc.relation.referencesD. Rogers, The Digital Transformation Roadmap: Rebuild Your Organization for Continuous Change. New York, NY, USA: Columbia Univ. Press, 2023.
dc.relation.referencesD. Rogers, The Digital Transformation Playbook: Rethink Your Business for the Digital Age. New York, NY, USA: Columbia Business School, 2016.
dc.relation.referencesG. Westerman, D. Bonnet, and A. McAfee, Leading Digital: Turning Technology into Business Transformation. Boston, MA, USA: Harvard Business Review Press, 2014
dc.relation.referencesR. Schlaepfer, K. Von Radowitz, M. Koch, and P. Merkofer, Digital Future Readiness—How Do Companies Prepare for the Opportunities and Challenges of Digitalisation? Deloitte, 2017."
dc.relation.referencesE. Stolterman and A. C. Fors, "Information technology and the good life," in Information Systems Research: Relevant Theory and Informed Practice, 2004, pp. 687–692.
dc.relation.referencesR. Miralles López, Transformación Digital y Ciberseguridad: Un Binomio Inseparable. 2023.
dc.relation.referencesL. A. Giraldo-Ríos, E. J. Duque Oliva, and J. M. Sanchez-Torres, ""¿Cómo se relacionan la transformación digital, la ciberseguridad y el modelo de negocio?,"" 2021."
dc.relation.referencesJ. V. López Daza and M. F. Rodriguez Puentes, La Ciberseguridad en el Diseño de Productos Financieros, 2022
dc.relation.referencesD. F. Benavides Gaviria and G. A. Flor García, Pilares Estratégicos en la Transición de la Banca Tradicional a la Banca Digital en una Filial del Banco de Occidente y una Filial del Banco BBVA Colombia, Doctoral dissertation, Universidad EAFIT, 2019."
dc.relation.referencesS. Gómez Barrios and N. O. Valbuena Rios, Análisis de las Dinámicas Asociadas a la Implementación de la Transformación Digital en el Sector Financiero Colombiano, 2021."
dc.relation.referencesN. S. Ospina Cardona, Transformación Digital en el Banco Bogotá: Rumbo a la Eficiencia y Calidad en sus Procesos.
dc.relation.referencesD. C. Abuchaibe Torrado and L. A. Peñaloza Becerra, Análisis de la Transformación Digital en la Bancarización en Colombia Durante el Período 2019–2023, 2024.
dc.relation.referencesA. E. Gutiérrez Carbo and N. Polo Espinosa, La Transformación Digital en los Bancos Colombianos, 2020.
dc.relation.referencesM. A. Barbosa Fernandez, Modelo de ciberseguridad dirigido a entidades financieras, alineado a marcos de referencia de gestión y gobierno en TI, 2020
dc.relation.referencesD. M. Miranda Hurtado and M. V. González Orozco, Análisis de riesgos asociados al microcrédito al incursionar en la banca digital: caso Banco W-Colombia, 2019.
dc.relation.referencesJ. C. González Reyes and J. R. Méndez Rozo, Diseño del plan director de ciberseguridad para las aplicaciones expuestas en internet por el Banco Agrario de Colombia basado en la norma ISO/IEC 27032:2012, 2021."
dc.relation.referencesAsobancaria and OEA, Estado de la ciberseguridad en el sistema financiero colombiano, 2020."
dc.relation.referencesGartner, Top Security and Risk Management Trends 2021, 2021."
dc.relation.referencesOEA and CISCO, Reporte sobre el desarrollo de la fuerza laboral de ciberseguridad en una era de escasez del talento y habilidades, 2023.
dc.relation.referencesISC2, Cybersecurity Workforce Study, 2021.
dc.relation.referencesISC2, Cybersecurity Workforce Study, 2022.
dc.relation.referencesV. Ivanyuk, “Forecasting of digital financial crimes in Russia based on machine learning methods,” J. Comput. Virol. Hacking Tech., pp. 1–14, 2023.
dc.relation.referencesT. U. Rehman, “Digital Transformation of E-Commerce Services and Cybersecurity for Modernizing the Banking Sector of Pakistan: A Study of Customer Preferences and Perceived Risks,” in Handbook of Research on Advancing Cybersecurity for Digital Transformation, IGI Global, 2021, pp. 373–403."
dc.relation.referencesA. Peyman, N. Faraby, A. Rossmann, B. Steimel, and K. Wichmann, Digital Transformation Report – eine empirische Studie, 2014.
dc.relation.referencesR. Schlaepfer, K. Von Radowitz, M. Koch, and P. Merkofer, Digital future readiness: How do companies prepare for the opportunities and challenges of digitalisation?, Deloitte, 2017.
dc.relation.referencesJ. Veiga de Cabo and M. Zimmermann Verdejo, “Modelos de estudios en investigación aplicada: conceptos y criterios para el diseño,” Med. Segur. Trab., vol. 54, no. 210, pp. 81–88, 2008.
dc.relation.referencesKITCHENHAM, B, et al. Systematic literature reviews in software engineering–A systematic literature review. Information and Software Technology 51.1 (2009): 7-15.
dc.relation.referencesK. Patel and M. P. McCarthy, Digital transformation: the essentials of e-business leadership. New York, NY, USA: McGraw-Hill Professional, 2000.
dc.relation.referencesC. Ebert and C. H. C. Duarte, “Digital transformation,” IEEE Softw., vol. 35, no. 4, pp. 16–21, 2018.
dc.relation.referencesE. Gökalp and V. Martinez, “Digital transformation capability maturity model enabling the assessment of industrial manufacturers,” Comput. Ind., vol. 132, p. 103522, 2021.
dc.relation.referencesT. Saarikko, U. H. Westergren, and T. Blomquist, “Digital transformation: Five recommendations for the digitally conscious firm,” Bus. Horiz., vol. 63, no. 6, pp. 825–839, 2020.
dc.relation.referencesL. K. Osei, Y. Cherkasova, and K. M. Oware, “Unlocking the full potential of digital transformation in banking: a bibliometric review and emerging trend,” Future Bus. J., vol. 9, no. 1, p. 30, 2023."
dc.relation.referencesA. Bertello, A. Ferraris, S. Bresciani, and P. De Bernardi, “Big data analytics (BDA) and degree of internationalization: the interplay between governance of BDA infrastructure and BDA capabilities,” J. Manag. Gov., vol. 25, no. 4, pp. 1035–1055, 2021, doi: 10.1007/s10997-020-09542.
dc.relation.referencesG. R. Abitia and G. B. Correa, Modelo de Transformación Digital en las Empresas, 2019.
dc.relation.referencesM. Baslyman, “Digital transformation from the industry perspective: definitions, goals, conceptual model, and processes,” IEEE Access, vol. 10, pp. 42961–42970, 2022."
dc.relation.referencesM. H. Schneider, D. K. Kanbach, S. Kraus, and M. Dabić, “Transform me if you can: leveraging dynamic capabilities to manage digital transformation,” IEEE Trans. Eng. Manag., vol. 71, pp. 9094–9108, 2023.
dc.relation.referencesM. P. Pelegrina Romero, “Análisis del grado de madurez de la Transformación Digital de una organización,” Ph.D. dissertation, Univ. Nacional de Colombia, 2023.
dc.relation.referencesM. Wade and J. Shan, “Covid-19 has accelerated digital transformation, but may have made it harder not easier,” MIS Quarterly Executive, vol. 19, no. 3, 2020.
dc.relation.referencesP. Carrijo, B. Alturas, and I. Pedrosa, “Analysis of digital transformation maturity models | Análise de modelos de maturidade de transformação digital,” in Proc. Iberian Conf. Inf. Syst. Technol. (CISTI), 2021, doi: 10.23919/CISTI52073.2021.9476644
dc.relation.referencesD. Proença and J. Borbinha, “Maturity models for information systems - a state of the art,” Procedia Comput. Sci., vol. 100, pp. 1042–1049, 2016, doi: 10.1016/j.procs.2016.09.279.
dc.relation.referencesJ. Becker, R. Knackstedt, and J. Pöppelbuß, “Developing maturity models for IT management,” Bus. Inf. Syst. Eng., vol. 1, no. 3, pp. 213–222, 2009, doi: 10.1007/s12599-009-0044-5."
dc.relation.referencesA. De Carolis, M. Macchi, E. Negri, and S. Terzi, “A maturity model for assessing the digital readiness of manufacturing companies,” in IFIP Adv. Inf. Commun. Technol., vol. 513, 2017, doi: 10.1007/978-3-319-66923-6_2.
dc.relation.referencesM. Nerima and J. Ralyté, “Towards a digital maturity balance model for public organizations,” in Notes Bus. Inf. Process., vol. 415, LNBIP, 2021, doi: 10.1007/978-3-030-75018-3_20.
dc.relation.referencesN. Soares, P. Monteiro, F. J. Duarte, and R. J. Machado, “Extended maturity model for digital transformation,” in Lect. Notes Comput. Sci., vol. 12952, LNCS, 2021, doi: 10.1007/978-3-030-86973-1_13."
dc.relation.referencesP. Parviainen, M. Tihinen, J. Kääriäinen, and S. Teppola, “Tackling the digitalization challenge: how to benefit from digitalization in practice,” Int. J. Inf. Syst. Project Manag., vol. 5, no. 1, pp. 63–77, 2017.
dc.relation.referencesC. M. Fernández, “La norma ISO 27001 del Sistema de Gestión de la Seguridad de la Información,” Calidad, pp. 40–44, 2012.
dc.relation.referencesNIST, “X-ray photoelectron spectroscopy database, version 4.1,” Nat. Inst. Stand. Technol., Gaithersburg, 2013.
dc.relation.referencesISACA, “Information Systems Audit and Control Association.” [Online]. Available: https://www.isaca.org
dc.relation.referencesA. Pérez, Seguridad de la información, un conocimiento imprescindible. OBS Business School, Oct. 09, 2017. [Online]. Available: https://www.obsbusiness.school/blog/seguridad-de-la-informacion-un-conocimiento-imprescindible"
dc.relation.referencesY. Wang, H. Gui, and L. Ma, “A survey on services provision and distribution of official and commercial intellectual property platforms,” Secur. Commun. Netw., vol. 2020, pp. 1–14, 2020.
dc.relation.referencesC. J. Ortega, Ciberseguridad. Manual práctico. Madrid, Spain: Ediciones Paraninfo, 2021.
dc.relation.referencesJ. Cano, Ciberseguridad empresarial: Reflexiones y retos para los ejecutivos del siglo XXI, 2nd ed. Bogotá, Colombia: Ediciones de la U, 2023.
dc.relation.referencesNIST, “Primeros pasos de gestión de riesgo de ciberseguridad | Ransomware,” Nat. Inst. Stand. Technol., 2022.
dc.relation.referencesK. Sandhu, “Advancing cybersecurity for digital transformation: opportunities and challenges,” in Handbook of Research on Advancing Cybersecurity for Digital Transformation, pp. 1–17, 2021.
dc.relation.referencesJ. E. Rosero Cordoba, Recomendar las mejores prácticas en el sector salud basadas en frameworks de ciberseguridad aplicables a hospitales del sector público en Colombia."
dc.relation.referencesNIST, Framework for Improving Critical Infrastructure Cybersecurity, 2018.
dc.relation.referencesNIST, “NIST Releases Version 1.1 of its Popular Cybersecurity Framework,” NIST, 2018. [Online]. Available: https://www.nist.gov/news-events/news/2018/04/nist-releases-version-11-its-popular-cybersecurity-framework
dc.relation.referencesA. Hagiu, “When data creates competitive advantage,” Harvard Business Review, vol. 98, p. 94, 2020.
dc.relation.referencesS. Ohrimenco, G. Borta, and V. Cernei, “Estimation of the key segments of the cyber crime economics,” in 2021 IEEE 8th Int. Conf. on Problems of Infocommunications, Science and Technology (PIC S&T), Oct. 2021, pp. 103–107.
dc.relation.referencesJ. Buzzio-Garcia, V. Salazar-Vilchez, J. Moreno-Torres, and O. Leon-Estofanero, “Review of Cybersecurity in Latin America during the Covid-19 Pandemic. A brief Overview,” in 2021 IEEE Fifth Ecuador Technical Chapters Meeting (ETCM), Oct. 2021, pp. 1–5.
dc.relation.referencesJ. C. Romero, “Ciberseguridad: Evolución y tendencias,” Boletín IEEE BIE3, no. 23, pp. 460–494, 2021.
dc.relation.referencesDeloitte, The future of cyber survey 2019, 2019.
dc.relation.referencesH. Cavusoglu, B. Mishra, and S. Raghunathan, “A model for evaluating IT security investments,” Commun. ACM, vol. 47, no. 7, pp. 87–92, 2004.
dc.relation.referencesOEA and ASOBANCARIA, Desafíos del riesgo cibernético en el sector financiero para Colombia y América Latina, 2019."
dc.relation.referencesLozano M.C “Sistema Financiero Colombiano”, Fundación Universitaria del Área Andina, 2017.
dc.relation.referencesMacías, I. H. G.. Estructura institucional del sector bancario en Colombia. Revista de Derecho del Sistema Financiero: mercados, operadores y contratos,(4), 273-296, 2022.
dc.relation.referencesD. Desmet, E. Duncan, J. Scanlan, and M. Singer, Six building blocks for creating a high-performing digital enterprise, 2015.
dc.relation.referencesC. Anderson and W. Ellerby, Digital Maturity Model: Achieving digital maturity to drive growth, Deloitte, 2018. [Online]. Available: www2.deloitte.com/content/dam/Deloitte/global/Documents/Technology-Media-Telecommunications/deloitte-digital-maturity-model.pdf
dc.relation.referencesR. Berger, The digital transformation of industry. Munich: Federation of German Industries (BDI), 2015. [Online]. Available: www.rolandberger.com/publications/publication_pdf/roland_berger_digital_transformation_of_industry_20150315.pdf
dc.relation.referencesK. Lichtblau, V. Stich, R. Bertenrath, M. Blum, M. Bleider, A. Millack and M. Schröter, Industrie 4.0-Readiness [dt.], 2015."
dc.relation.referencesA. Back and S. Berghaus, “Stages in digital business transformation: Results of an empirical maturity study,” in Mediterranean Conf. on Information Systems (MCIS), 2016, Paper 22, pp. 1–17.
dc.relation.referencesOckenfeld, M. Kooperations-Wirtschaft: Konferenz Mittelstand 4.0 in Darmstadt. Information-Wissenschaft & Praxis, 67(2-3), 151-152, 2016.
dc.relation.referencesJ. Wallner y KPMG, New “Digital Readiness Assessment” from 2b AHEAD and KPMG, 2b AHEAD Think Tank, 2016.
dc.relation.referencesM. Gill y S. VanBoskirk, Digital Maturity Model 4.0. Benchmarks: Digital Transformation Playbook, Forrester Research, Inc., 2016.
dc.relation.referencesG. C. Kane, D. Kiron, D. Palmer, A. N. Phillips y N. Buckley, “Aligning the organization for its digital future,” MIT Sloan Management Review, vol. 58, no. 1, 2016
dc.relation.referencesO. Lorenzo Ochoa, “Modelos de madurez digital: ¿en qué consisten y qué podemos aprender de ellos?,” Boletín de Estudios Económicos, vol. 71, no. 219, p. 573, 2016.
dc.relation.referencesS. Berghaus y A. Back, Digital Maturity & Transformation Report 2016, Institut für Wirtschaftsinformatik, Universität St. Gallen, pp. 1–75, 2016.
dc.relation.referencesO. Valdez-de-Leon, “A digital maturity model for telecommunications service providers,” Technology Innovation Management Review, vol. 6, no. 8, 2016.
dc.relation.referencesA. Schumacher, S. Erol y W. Sihn, “A maturity model for assessing Industry 4.0 readiness and maturity of manufacturing enterprises,” Procedia CIRP, vol. 52, pp. 161–166, 2016
dc.relation.referencesC. Leyh, T. Schäffer, K. Bley y S. Forstenhäusler, “Assessing the IT and software landscapes of Industry 4.0-enterprises: the maturity model SIMMI 4.0,” en Information Technology for Management: New Ideas and Real Solutions, AITM 2016, ISM 2016, FedCSIS, Gdansk, Poland, Sept. 11–14, 2016, Revised Selected Papers 14, Springer, pp. 103–119, 2017.
dc.relation.referencesG. Schuh, R. Anderl, J. Gausemeier, M. ten Hompel y W. Wahlster, Industrie 4.0 Maturity Index: Managing the Digital Transformation of Companies, p. 61, 2017.
dc.relation.referencesG. Remane, A. Hanelt, F. Wiesboeck y L. M. Kolbe, “Digital maturity in traditional industries—an exploratory analysis,” en ECIS, p. 10, Jun. 2017.
dc.relation.referencesS. Berghaus y A. Back, Digital Maturity & Transformation Report 2017, Institut für Wirtschaftsinformatik, Universität St. Gallen, 2017.
dc.relation.referencesA. De Carolis, M. Macchi, E. Negri y S. Terzi, “A maturity model for assessing the digital readiness of manufacturing companies,” en Advances in Production Management Systems. The Path to Intelligent, Collaborative and Sustainable Manufacturing: IFIP WG 5.7 International Conference, APMS 2017, Hamburg, Germany, Sept. 3–7, 2017, Proceedings, Part I, Springer, pp. 13–20, 2017.
dc.relation.referencesM. Peter y J. Bumann, “Action fields of digital transformation – a review and comparative analysis of digital transformation maturity models and frameworks,” Digitalisierung und andere Innovationsformen im Management, vol. 2, Nov. 2019, pp. 13–40.
dc.relation.referencesO. Roads, Introduction to Open Digital Maturity Model, 2017
dc.relation.referencesM. Colli, O. Madsen, U. Berger, C. Møller, B. V. Wæhrens y M. Bockholt, “Contextualizing the outcome of a maturity assessment for Industry 4.0,” IFAC-PapersOnLine, vol. 51, no. 11, pp. 1347–1352, 2018
dc.relation.referencesH. Gimpel, S. Hosseini, R. Huber, L. Probst, M. Röglinger y U. Faisst, “Structuring digital transformation: a framework of action fields and its application at ZEISS,” Journal of Information Technology Theory and Application (JITTA), vol. 19, no. 1, p. 3, 2018.
dc.relation.referencesD. Gunsberg, B. Callow, B. Ryan, J. Suthers, P. A. Baker y J. Richardson, “Applying an organisational agility maturity model,” Journal of Organizational Change Management, vol. 31, no. 6, pp. 1315–1343, 2018
dc.relation.referencesA. Acevedo, Modelo de madurez para la transformación digital, Bogotá D.C.: MinTIC, Subdirección de Comercio Electrónico, INNpulsa Colombia – Desarrollo Empresarial, p. 44, 2018.
dc.relation.referencesD. Ifenthaler y M. Egloffstein, “Development and implementation of a maturity model of digital transformation,” TechTrends, vol. 64, no. 2, pp. 302–309, 2020
dc.relation.referencesG. Salviotti, A. Gaur y F. Pennarola, “Strategic factors enabling digital maturity: An extended survey,” 2019.
dc.relation.referencesMinTIC, Marco de la Transformación Digital para el Estado Colombiano, Viceministerio de Economía Digital, Dirección de Gobierno Digital, versión 1, Jul. 2020
dc.relation.referencesA. Bastos, M. L. Sguario Coelho De Andrade, R. T. Yoshino and M. M. D. Santos, "Industry 4.0 Readiness Assessment Method Based on RAMI 4.0 Standards," in IEEE Access, vol. 9, pp. 119778-119799, 2021, doi: 10.1109/ACCESS.2021.3105456. keywords: {Libraries;Cyber-physical systems;Search problems;Search engines;Industries;Cloud computing;Industry 4.0;Rami 4.0;readiness evaluation method;industrial cyber-physical systems;readiness level assessment
dc.relation.referencesG. Rodríguez-Abitia and G. Bribiesca-Correa, “Assessing digital transformation in universities,” Future Internet, vol. 13, no. 2, p. 52, 2021.
dc.relation.referencesN. Evans, A. Miklosik, R. Bosua, and A. M. A. Qureshi, “Digital business transformation: An experience-based holistic framework,” IEEE Access, vol. 10, pp. 121930–121939, 2022."
dc.relation.referencesO. Maki, M. Alshaikhli, M. Gunduz, K. K. Naji, and M. Abdulwahed, “Development of digitalization road map for healthcare facility management,” IEEE Access, vol. 10, pp. 14450–14462, 2022."
dc.relation.referencesM. Voss, D. Jaspert, C. Ahlfeld, and L. Sucke, “Developing a digital maturity model for the sales processes of industrial projects,” Journal of Personal Selling & Sales Management, vol. 44, no. 1, pp. 7–28, 2023
dc.relation.referencesJ. Xiao, H. Zhang, and L. Han, “How digital transformation improve government performance: the mediating role of partnering agility,” IEEE Access, vol. 11, pp. 59274–59285, 2023
dc.relation.referencesK. O. Hernández, G. Martínez-Arellano, and J. Segal, “Methodology for digital transformation: a continuous improvement approach,” in IET Conference Proceedings CP838, vol. 2023, no. 16, pp. 175–182, Sep. 2023
dc.relation.referencesS. Muammar, D. Shehada, and W. Mansoor, “Digital risk assessment framework for individuals: Analysis and recommendations,” IEEE Access, vol. 11, pp. 85561–85570, 2023
dc.relation.referencesM. I. Sarwar, Q. Abbas, T. Alyas, A. Alzahrani, T. Alghamdi, and Y. Alsaawy, “Digital transformation of public sector governance with IT service management–A pilot study,” IEEE Access, vol. 11, pp. 6490–6512, 2023
dc.relation.referencesN. K. Dicheva, I. U. Rehman, A. Anwar, M. M. Nasralla, L. Husamaldin, and S. Aleshaiker, “Digital transformation in nursing education: A systematic review on computer-aided nursing education pedagogies, recent advancements and outlook on the post-COVID-19 era,” IEEE Access, vol. 11, pp. 135659–135695, 2023.
dc.relation.referencesT. Haryanti, N. A. Rakhmawati, and A. P. Subriadi, “The extended digital maturity model,” Big Data and Cognitive Computing, vol. 7, no. 1, p. 17, 2023
dc.relation.referencesA. S. Prihatmanto, R. Andrian, W. D. Sunindyo, and R. Sutriadi, “Transforming Public Services: A Systematic Review of Smart Government Frameworks, Architectures, and Implementation Challenges,” IEEE Access, 2024.
dc.relation.referencesS. M. Anggara, A. Hariyanto, A. A. Arman, and N. B. Kurniawan, “The development of digital service transformation framework for the public sector,” IEEE Access, 2024
dc.relation.referencesS. R. Coplan, “Unlock the secret to achieving digital transformation success with the delta framework,” IEEE Engineering Management Review, 2024.
dc.relation.referencesW. Aiken, L. Carden, A. Bhabhrawala, P. Branco, G. V. Jourdan, and A. Berg, “Strategic Digitalization in Oil and Gas: A Case Study on Mixed Reality and Digital Twins,” IEEE Access, 2024.
dc.relation.referencesH. N. Nguyen, H. A. Pham, N. Huynh-Tuong, and D. H. Nguyen, “Leveraging blockchain to enhance digital transformation in small and medium enterprises: challenges and a proposed framework,” IEEE Access, 2024
dc.relation.referencesS. Li, A. Aman, D. Fernandez, S. Sanusi, S. Dong, Y. Fan, and Z. Liao, “Value Identification and Its Creation Mechanism of Digital Transformation at Enterprises,” IEEE Access, 2024
dc.relation.referencesM. Syafrizal, S. R. Selamat, and N. A. Zakaria, “Analysis of cybersecurity standard and framework components,” International Journal of Communication Networks and Information Security, vol. 12, no. 3, pp. 417–432, 2020.
dc.relation.referencesMinisterio de Justicia de Colombia, Normograma y Gestión Documental. Memoria Capacitación, 2015
dc.relation.referencesNational Institute of Standards and Technology, "The NIST Cybersecurity Framework (CSF) 2.0," NIST Cybersecurity White Paper (CSWP) NIST CSWP 29, Gaithersburg, MD, USA, 2024. [Online]. Available: https://doi.org/10.6028/NIST.CSWP.29
dc.relation.referencesISO/IEC 27001:2022, Information technology – Security techniques – Information security management systems – Requirements, International Organization for Standardization, 2022
dc.relation.referencesISACA, "COBIT 5: A Business Framework for the Governance and Management of Enterprise IT," . [En línea]. Disponible: https://www.isaca.org, 2012
dc.relation.referencesOlaniyi, O. O., & Omubo, D. S.. The importance of COSO framework compliance in information technology auditing and enterprise resource management. International Journal of Innovative Research & Development, 12(4), 2023.
dc.relation.referencesInstitute of Electrical and Electronics Engineers. "NICE Cybersecurity Workforce Framework." NIST Special Publication 800-181. Retrieved from https://csrc.nist.gov/publications/detail/sp/800-181/final, 2023
dc.relation.referencesKohler, C. The EU Cybersecurity Act and European standards: an introduction to the role of European standardization. International Cybersecurity Law Review, 1(1), 7-12, 2020.
dc.relation.referencesG. L. Verdugo Crespo, Propuesta de un modelo de madurez de ciberseguridad para Ecuador, 2023.
dc.relation.referencesP. Dini, A. Elhanashi, A. Begni, S. Saponara, Q. Zheng, and K. Gasmi, “Overview on intrusion detection systems design exploiting machine learning for networking cybersecurity,” Applied Sciences, vol. 13, no. 13, p. 7507, 2023.
dc.relation.referencesJ. L. Massey, “Cryptography—A selective survey,” Digital Communications, vol. 85, pp. 3–25, 1986.
dc.relation.referencesM. I. Quintero Martínez y S. A. Tovar Balderas, "Sistemas de gestión de información y eventos de seguridad (SIEM)," TIES UNAM, vol. 2, 2019. [En línea]. Disponible en: https://www.ties.unam.mx/
dc.relation.referencesM. Wallace y L. Webber, The Disaster Recovery Handbook. New York, NY, USA: Amacon, 2004
dc.relation.referencesC. F. Herrera M., "Modelo de seguridad informática para la evaluación de dispositivos biomédicos," Tesis de Maestría, Maestría en Gestión y Seguridad de la Información, Univ. Distrital Francisco José de Caldas, Bogotá, Colombia, 2024
dc.relation.referencesS. Rouhani, V. Pourheidari y R. Deters, "Physical access control management system based on permissioned blockchain," en Proc. 2018 IEEE Int. Conf. Internet of Things (iThings), GreenCom, CPSCom and SmartData, Halifax, NS, Canada, Jul. 2018, pp. 1078-1083
dc.relation.referencesM. Wilson y J. Hash, Building an Information Technology Security Awareness and Training Program. Gaithersburg, MD, USA: National Institute of Standards and Technology (NIST), Oct. 2003.
dc.relation.referencesP. Dolan, M. Hallsworth, D. Halpern, D. King y I. Vlaev, MINDSPACE: Influencing Behaviour Through Public Policy. London, U.K.: Institute for Government & Cabinet Office, 2010. [En línea]. Disponible en: http://www.instituteforgovernment.org.uk/sites/default/files/publications/MINDSPACE.pdf
dc.relation.referencesO. F. Keskin, K. M. Caramancion, I. Tatar, O. Raza y U. Tatar, "Cyber third-party risk management: A comparison of non-intrusive risk scoring reports," Electronics, vol. 10, no. 10, p. 1168, May 2021.
dc.relation.referencesR. Hernández, C. Fernández y P. Baptista, Metodología de la investigación. México, D.F., México: McGraw-Hill, 2014.
dc.relation.referencesJ. Escobar-Pérez y Á. Cuervo-Martínez, "Validez de contenido y juicio de expertos: una aproximación a su utilización," Avances en Medición, vol. 6, no. 1, pp. 27-36, 2008
dc.relation.referencesE. Almanasreh, R. Moles y T. F. Chen, "Evaluation of methods used for estimating content validity," Res. Social Adm. Pharm., vol. 15, no. 2, pp. 214-221, Feb. 2019.
dc.relation.referencesJ. C. Almenara y M. D. C. L. Cejudo, "La aplicación del juicio de experto como técnica de evaluación de las tecnologías de la información y comunicación (TIC)," Rev. Eduweb, vol. 7, no. 2, pp. 11-22, 2013
dc.relation.referencesY. J. G. Rangel, A. P. Sánchez, M. D. L. G. Vargas, H. M. Arano y L. M. Ayala, "Diseño y validación de una rúbrica para infografías de revistas indexadas mediante el método de juicio por expertos," 2024
dc.relation.referencesM. S. Valles, Entrevistas cualitativas, vol. 32. Madrid, España: Centro de Investigaciones Sociológicas, 2007
dc.relation.referencesV. Braun y V. Clarke, "Using thematic analysis in psychology," Qual. Res. Psychol., vol. 3, no. 2, pp. 77-101, 2006
dc.rights.accessrightsinfo:eu-repo/semantics/openAccess
dc.rights.licenseAtribución-NoComercial 4.0 Internacional
dc.rights.urihttp://creativecommons.org/licenses/by-nc/4.0/
dc.subject.ddc000 - Ciencias de la computación, información y obras generales::003 - Sistemas
dc.subject.ddc620 - Ingeniería y operaciones afines::629 - Otras ramas de la ingeniería
dc.subject.lembBANCOS-MEDIDAS DE SEGURIDADspa
dc.subject.lembBanks and banking--Security measureseng
dc.subject.lembSISTEMAS DE SEGURIDADspa
dc.subject.lembSecurity systemseng
dc.subject.lembComputer securityeng
dc.subject.lembCIFRADO DE DATOS (INFORMATICA)spa
dc.subject.lembData encryption (computer science)eng
dc.subject.lembFIREWALLS (COMPUTADORES)spa
dc.subject.lembFirewalls (Computer science)eng
dc.subject.lembSEGURIDAD EN BASES DE DATOSspa
dc.subject.lembDatabase securityeng
dc.subject.proposalModelo de despliegue de transformación digitalspa
dc.subject.proposalMarco de ciberseguridadspa
dc.subject.proposalISO 27001:2022spa
dc.subject.proposalDigital transformation Roadmapeng
dc.subject.proposalDigital Transformation Deployment Modeleng
dc.subject.proposalCybersecurity frameworkeng
dc.titlePropuesta de articulación de un modelo de despliegue de transformación digital con un marco de trabajo de ciberseguridad para los bancos colombianosspa
dc.title.translatedProposal for the articulation of a digital transformation deployment model with a cybersecurity framework for colombian bankseng
dc.typeTrabajo de grado - Maestría
dc.type.coarhttp://purl.org/coar/resource_type/c_bdcc
dc.type.coarversionhttp://purl.org/coar/version/c_ab4af688f83e57aa
dc.type.contentText
dc.type.driverinfo:eu-repo/semantics/masterThesis
dc.type.redcolhttp://purl.org/redcol/resource_type/TM
dc.type.versioninfo:eu-repo/semantics/acceptedVersion
dcterms.audience.professionaldevelopmentEstudiantes
dcterms.audience.professionaldevelopmentInvestigadores
dcterms.audience.professionaldevelopmentPúblico general
oaire.accessrightshttp://purl.org/coar/access_right/c_abf2

Archivos

Bloque original

Mostrando 1 - 1 de 1
Cargando...
Miniatura
Nombre:
TrabajoFinalMaestria_1107524471_.pdf
Tamaño:
2.74 MB
Formato:
Adobe Portable Document Format
Descripción:
Tesis de Maestría en Ingeniería de Sistemas y Computación

Bloque de licencias

Mostrando 1 - 1 de 1
Cargando...
Miniatura
Nombre:
license.txt
Tamaño:
5.74 KB
Formato:
Item-specific license agreed upon to submission
Descripción: