Recent Submissions

  • Proposing a TAM-SDT-based model to examine the user acceptance of massively multiplayer online games 

    Linares-Barbero, Manuela; Dolores Gallego, M.; Bueno, Salvador (MDPICH, 2021)
    Acceso abierto
    This study is focused on the massively multiplayer online games’ acceptance. In general, while specialized literature reveals that the online gaming industry has grown strongly in recent years, little evidence is identified ...
  • A comparison of classification models to detect cyberbullying in the Peruvian Spanish language on twitter 

    Cuzcano-Chavez, Ximena-Marianne; Ayma-Quirita, Victor-Hugo (Science and Information OrganizationGB, 2020)
    Acceso abierto
    Cyberbullying is a social problem in which bullies’ actions are more harmful than in traditional forms of bullying as they have the power to repeatedly humiliate the victim in front of an entire community through social ...
  • Association Between Substance Use Behaviors, Developmental Assets and Mental Health: A Glance at Latin American Young College Students 

    Manrique-Millones, Denisse; Wiium, Nora; Pineda-Marín, Claudia; Fernández-Arata, Manuel; Alfonso-Murcia, Diego; López-Martínez, José Luis; Millones-Rivalles, Rosa-Bertha (Frontiers MediaCH, 2021)
    Acceso abierto
    Positive Youth Development (PYD) is an approach that promotes resilience and focuses on youth strengths rather than their weaknesses as done by the traditional deficit-based perspective. Research in Europe and North America ...
  • Systematic mapping of the literature on Secure Software Development 

    Nina-Hanco, Hernán; Pow-Sang, Jose Antonio; Villavicencio, Monica (IEEEUS, 2021)
    Acceso abierto
    The accelerated growth in exploiting vulnerabilities due to errors or failures in the software development process is a latent concern in the Software Industry. In this sense, this study aims to provide an overview of the ...
  • Coping Responses During the COVID-19 Pandemic: A Cross-Cultural Comparison of Russia, Kyrgyzstan, and Peru 

    Voronin, Ivan A.; Manrique-Millones, Denisse; Vasin, Georgy M.; Millones-Rivalles, Rosa-Bertha; Manrique-Pino, Oscar; Fernandez-Rios, Nataly; Marakshina, Yulia A.; Lobaskova, M. M.; Symanyuk, Elvira E.; Pecherkina, Anna A.; Ageeva, Irina A. .; Lysenkova, Irina A.; Ismatullina, Victoria I.; Sitnikova, Maria A.; Malykh, Sergey B. (Russsian Psychological SocietyRU, 2020)
    Acceso abierto
    Background. The COVID-19 pandemic has subjected people around the world to severe stress, evoking a variety of coping responses. Coping responses can be broadly classified into four strategies: 1) problem-focused coping; ...
  • The influence of digital transformation of the peruvian public sector on citizen trust 

    Díaz-Parra, José-Raúl; Libaque-Sáenz, Christian Fernando (26th Americas Conference on Information Systems, AMCIS 2020.US, 2020)
    Acceso restringido
    Developing countries have been launching e-government projects; a number of them have, however, failed partially or completely, generating distrust in citizens. E-government implies an internal approach, which has been ...
  • Gender gap in IT in Latin America 

    Guzman, Indira R. Indira R.; Berardi, Rita Cristina Galarraga; Tapia, Patricia Cabero; Rodríguez-Rodríguez, Nadia-Katherine; MacIel, Cristiano; Marín-Raventós, Gabriela; Rodriguez, Michelle (26th Americas Conference on Information Systems, AMCIS 2020.US, 2020)
    Acceso abierto
    The underrepresentation of women in IT related majors such as computer science, computer engineering, and information systems (IS) has been evident all over the world. As a result, many private and public institutions have ...
  • A Comparison of Authentication Methods via Keystroke Dynamics 

    Lo, Aron; Ayma-Quirita, Victor-Hugo; Gutiérrez-Cárdenas, Juan-Manuel (IEEEUS, 2020)
    Acceso restringido
    Authentication systems based on keystroke dynamics analyze the typical typing pattern of a user when interacting with an input device, such as the keyboard of a computer. In the literature, three major approaches on keystroke ...
  • Comparación de técnicas de machine learning para detección de sitios web de phishing 

    Moncada-Vargas, Andrés-Eduardo (Universidad de LimaPE, 2020)
    Acceso abierto
    El phishing es el robo de datos personales a través de páginas web falsas. La víctima de este robo es dirigida a esta página falsa, donde se le solicita ingresar sus datos para validar su identidad. Es en ese momento que ...
  • Software in the Loop para la implementación de un sistema de piloto automático para aeronaves de ala fija 

    Quiroz-Villalobos, Lennin-Paul (Universidad de LimaPE, 2020)
    Acceso abierto
    Cuando se desea desarrollar y probar softwares para sistemas complejos, como aviones, transbordadores espaciales, satélites, automóviles o plantas nucleares, uno de los mayores inconvenientes es la gran complejidad, riesgos ...
  • Revisión de literatura sobre las barreras a la transformación digital y su relación con el rendimiento financiero 

    Ahomed, Rubén (Universidad de LimaPE, 2020)
    Acceso abierto
    La transformación digital es una actividad que han venido adoptando las empresas para aprovechar los desarrollos tecnológicos digitales y mantenerse a la vanguardia empresarial rentablemente. El propósito del presente ...
  • Letter to the Editor: COVID-19 Infections Do Not Change with Increasing Altitudes from 1,000 to 4,700 m 

    Castagnetto-Mizuaray, Jesús-Martin; Segovia-Juárez, José L.; Gonzales, Gustavo Francisco (Mary Ann LieberUS, 2020)
    Acceso abierto
    Coronavirus disease (COVID-19) infection, after the first case reported in Wuhan, China, on December 31, 2019 and declared a pandemic by the World Health Organization in March 2020, has climbed by September 2nd to 26,076,572 ...
  • Comparison of Classifiers Models for Prediction of Intimate Partner Violence 

    Guerrero, Ashly; Gutiérrez-Cárdenas, Juan-Manuel; Romero-Romero, Vilma-Susana; Ayma-Quirita, Víctor-Hugo (SpringerCH, 2021)
    Acceso restringido
    Intimate partner violence (IPV) is a problem that has been studied by different researchers to determine the factors that influence its occurrence, as well as to predict it. In Peru, 68.2% of women have been victims of ...
  • Steganography Application Using Combination of Movements in a 2D Video Game Platform 

    Mandujano, Ricardo; Gutiérrez-Cárdenas, Juan-Manuel; Sotelo-Monge, Marco-Antonio (SpringerCH, 2021)
    Acceso restringido
    Steganography represents the art of hiding information within a harmless medium such as digital images, video, audio, etc. Its purpose is to embed and transmit a message without raising suspicion to a third party or attacker ...
  • Virtual Reality Application to Teach Dangerous Over Exposure to UV Radiation 

    Vargas-Solís, Edgard; Cárdenas-Salas, Daniel-Enrique; Gutiérrez-Cárdenas, Juan-Manuel; Romero-Romero, Vilma-Susana (SpringerCH, 2021)
    Acceso restringido
    The high levels of ultraviolet (UV) radiation in Peru constitute a risk for the population, that does not give it the importance that it should and does not take adequate measures to protect against it and to prevent skin ...
  • Content-Based Learning Object Recommendation System Using a User Profile Ontology for High School Students 

    Morillo-Palacios, Bruna; Gutiérrez-Cárdenas, Juan-Manuel (SpringerCH, 2021)
    Acceso restringido
    The lack of quality of education in Peruvian schools has caused young people to look for other ways to obtain information, of which the web stands out. However, this tool is made up of billions of web pages, which affects ...
  • Matching System for Animal-Assisted Therapy Based on the Levenshtein and Gale-Shapley Algorithms 

    Gutiérrez-Rondón, Giuliana; Gutiérrez-Cárdenas, Juan-Manuel (SpringerCH, 2021)
    Acceso restringido
    This current research is based on the implementation of an algorithm that assigns pets, cats, or dogs to persons with depressive disorders such as low self-esteem. We found that even though different institutions have made ...
  • Are information systems and computer science overlapping more and more? 

    Gutiérrez-Cárdenas, Juan-Manuel (ACM Association for Computing MachineryUS, 2020)
    Acceso abierto
    In this research, we posit the importance of including Computer Science topics in undergraduate Information Systems courses. A review of the existing literature has mentioned the importance of learning some Computer Science ...
  • Proofs of the undecidability of stegananalysis techniques 

    Gutiérrez-Cárdenas, Juan-Manuel (SpringerCH, 2020)
    Acceso restringido
    Steganalysis comprises a set of techniques that strive to find concealed information within diverse types of digital media. On the contrary, Steganography involves a group of methods that, by manipulation of a cover object, ...
  • Dimensionality reduction via an orthogonal autoencoder approach for hyperspectral image classification 

    Ayma-Quirita, Víctor-Hugo; Ayma, V. A.; Gutiérrez-Cárdenas, Juan-Manuel (The International Society for Photogrammetry and Remote SensingDE, 2020)
    Acceso abierto
    Nowadays, the increasing amount of information provided by hyperspectral sensors requires optimal solutions to ease the subsequent analysis of the produced data. A common issue in this matter relates to the hyperspectral ...

View more