Estrategias de Gerencia de Proyectos para la Implementación Ética y segura de IA en Redes Eléctricas con Integración de IoT
| dc.contributor.advisor | Rodríguez Guzmán, Henry Alberto | |
| dc.contributor.author | Ortiz Torres, Luis Ferney | |
| dc.coverage.spatial | Bogotá D.C. | |
| dc.date.accessioned | 2026-02-28T17:13:25Z | |
| dc.date.issued | 2024-08-30 | |
| dc.description | Establecer un marco de gestión de proyectos para la implementación ética de soluciones de inteligencia artificial en la gestión de la red eléctrica, con un enfoque en la privacidad y seguridad de datos al integrar dispositivos IoT y sistemas de monitorización en entornos residenciales e industriales. | |
| dc.description.abstract | Este trabajo de investigación aborda el desarrollo de estrategias para implementar soluciones de inteligencia artificial (IA) de manera ética y segura en la gestión de redes eléctricas, con la integración de dispositivos del Internet de las Cosas (IoT). El objetivo principal es garantizar la privacidad y la seguridad de los datos, así como optimizar la eficiencia operativa de las redes eléctricas. La investigación se enfoca en la identificación de técnicas avanzadas de IA, la evaluación de riesgos y vulnerabilidades, y la adopción de estándares internacionales y mejores prácticas. | |
| dc.format.extent | 72 | |
| dc.identifier.citation | Ortiz Torres, L. (2024). Estrategias de Gerencia de Proyectos para la Implementación Ética y segura de IA en Redes Eléctricas con Integración de IoT. [Monografía, Corporación Universitaria Minuto de Dios - UNIMINUTO]. Repositorio UNIMINUTO | |
| dc.identifier.uri | https://hdl.handle.net/10656/23253 | |
| dc.language.iso | es | |
| dc.publisher | Corporación Universitaria Minuto de Dios – UNIMINUTO | |
| dc.publisher.department | Posgrado (Virtual) | |
| dc.publisher.program | Especialización en Gerencia de Proyectos | |
| dc.rights | Acceso Abierto - http://purl.org/coar/access_right/c_abf2 | |
| dc.rights.license | http://creativecommons.org/licenses/by-nc-nd/4.0/ | |
| dc.rights.uri | https://creativecommons.org/licenses/by-nc-nd/4.0/ | |
| dc.subject.keywords | Inteligencia Artificial (IA) | |
| dc.subject.keywords | Internet de las Cosas (IoT) | |
| dc.subject.keywords | Privacidad de Datos | |
| dc.subject.keywords | Gerencia de Proyectos | |
| dc.subject.keywords | Ética en IA | |
| dc.title | Estrategias de Gerencia de Proyectos para la Implementación Ética y segura de IA en Redes Eléctricas con Integración de IoT | |
| dc.type | Monografía | |
| dc.type.coar | thesis | |
| dcterms.bibliographicCitation | Abd Elazim, S. M., y Ali, E. S. (2016). Optimal Power System Stabilizers design via Cuckoo Search algorithm. International Journal of Electrical Power and Energy Systems, 75, 99– 107. https://doi.org/10.1016/j.ijepes.2015.08.018 Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., y Ayyash, M. (2015). Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications. IEEE Communications Surveys & Tutorials, 17(4), 2347–2376. https://doi.org/10.1109/COMST.2015.2444095 An, J., Ciampaglia, G. L., Grinberg, N., Joseph, K., Mantzarlis, A., Maus, G., Menczer, F., Proferes, N., y Welles, B. F. (2017). Reports of the workshops held at the 2017 international AAAI conference on web and social media. AI Magazine, 38(4), 93–98. https://doi.org/10.1609/aimag.v38i4.2772 Association for Computing Machinery (ACM). (2018). Ingeniería de software Código de Ética y Práctica Profesional 5.2. http://seeri.etsu.edu/Codes/SpanishVersionSECode.htm Atzori, L., Iera, A., y Morabito, G. (2010). The Internet of Things: A survey. Computer Networks, 54(15), 2787–2805. https://doi.org/https://doi.org/10.1016/j.comnet.2010.05.010 Azuero, J. S. C. (2023). Personal data processing and compliance in Colombia; [Tratamiento de datos personales y compliance en Colombia]. Revista de La Facultad de Derecho y Ciencias Politicas, 53(138), 1 – 25. https://doi.org/10.18566/rfdcp.v53n138.a2 Babar, S., Mahalle, P., Stango, A., Prasad, N., y Prasad, R. (2010). Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT). In N. Meghanathan, S. Boumerdassi, N. Chaki, & D. Nagamalai (Eds.), Recent Trends in Network Security and Applications (pp. 420–429). Springer Berlin Heidelberg. Bernabé, M. W., Gonzales, G. R., Campos, H., Lioo, F. de M., Vellón, V. I., de Salinas, F., Solano, T., y Caro, F. G. (2024). Project management based on ISO 21500, to improve productivity in the industry; [Gestión de proyectos basado en la ISO 21500, para mejorar la productividad en la industria]. Salud, Ciencia y Tecnologia - Serie de Conferencias, 3. https://doi.org/10.56294/sctconf2024928 Bock, P., Hauet, J., Françoise, R., y Foley, R. (2020). Ukrainian power grids cyberattack. InTech, 64(2), 32–37. BUREAU VERITAS. (2024). IEC 62443 Ciberseguridad Industrial. BUREAU VERITAS. Burton, J. (2023). Algorithmic extremism? The securitization of artificial intelligence (AI) and its impact on radicalism, polarization and political violence. Technology in Society, 75, 102262. https://doi.org/https://doi.org/10.1016/j.techsoc.2023.102262 CCPA. (2018). Cumplimiento de la Ley de Privacidad del Consumidor de California (CCPA). Chehri, A., Fofana, I., y Yang, X. (2021). Security Risk Modeling in Smart Grid Critical Infrastructures in the Era of Big Data and Artificial Intelligence. Sustainability, 13(6). https://doi.org/10.3390/su13063196 Cintuglu, M. H., Mohammed, O. A., Akkaya, K., & Uluagac, A. S. (2017). A Survey on Smart Grid Cyber-Physical System Testbeds. IEEE Communications Surveys & Tutorials, 19(1), 446–464. https://doi.org/10.1109/COMST.2016.2627399 Cisco, U. (2020). Cisco annual internet report. Cisco: San Jose, CA, USA, 10(1), 1–35. COMISIÓN EUROPEA. (2020). Dictamen del Comité Económico y Social Europeo sobre la «Propuesta de Reglamento del Consejo relativo a la apertura y el modo de gestión de contingentes arancelarios autónomos de la Unión para las importaciones de determinados productos de la pesca en las islas Canarias desde 2021 hasta 2027. https://eur-lex.europa.eu/legal-content/ES/TXT/PDF/?uri=CELEX:52020AE4203 Comité, E., e Interamericano, J. (2021). Carta de la Organización de los Estados Americanos Capítulo XIV. De Boer, P. S., Van Deursen, A., y Van Rompay, T. (2020). Accepting the Internet-of-Things in our homes: The role of user skills. Telematics and Informatics, 36, 147–156. https://doi.org/10.1016/j.tele.2018.12.004 De Montalvo, F. (n.d.). Principios éticos de la inteligencia artificial. https://plato.stanford.edu/entries/ethics-ai/. Deogirikar, J., & Vidhate, A. (2017). Security attacks in IoT: A survey. 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 32–37. https://doi.org/10.1109/I-SMAC.2017.8058363 Diario Oficial de la Unión Europea. (2022). Reglamento (UE) 2016/679 del Parlamento Europeo y del Consejo, de 27 de abril de 2016, relativo a la protección de las personas físicas en lo que respecta al tratamiento de datos personales y a la libre circulación de estos datos y por el que se deroga la Directiva 95/46/CE (Reglamento general de protección de datos). https://www.boe.es/buscar/doc.php?id=DOUE-L-2016-80807 Dignum, V. (2018). Ethics in artificial intelligence: introduction to the special issue. Ethics and Information Technology, 20(1), 1–3. https://doi.org/10.1007/s10676-018-9450-z Dwork, C., & Roth, A. (2013). The algorithmic foundations of differential privacy. Foundations and Trends in Theoretical Computer Science, 9(3–4), 211–487. https://doi.org/10.1561/0400000042 Floridi, L. (2019). Translating Principles into Practices of Digital Ethics: Five Risks of Being Unethical. Philosophy & Technology, 32(2), 185–193. https://doi.org/10.1007/s13347- 019-00354-x Floridi, L., Cowls, J., Beltrametti, M., Chatila, R., Chazerand, P., Dignum, V., Luetge, C., Madelin, R., Pagallo, U., Rossi, F., Schafer, B., Valcke, P., y Vayena, E. (2018). AI4People—An Ethical Framework for a Good AI Society: Opportunities, Risks, Principles, and Recommendations. Minds and Machines, 28(4), 689–707. https://doi.org/10.1007/s11023-018-9482-5 Floridi, L., & Sanders, J. W. (2004). On the Morality of Artificial Agents. Minds and Machines, 14(3), 349–379. https://doi.org/10.1023/B:MIND.0000035461.63578.9d Frank B. Gilbreth. (2006). Motion Study. García, A. (2012). Inteligencia artificial: fundamentos, práctica y aplicaciones. RC Libros. González, A., Moreno, M., Román, A., Fernández, Y., y Pérez, N. (2024). Ethics in Artificial Intelligence: an Approach to Cybersecurity. Inteligencia Artificial, 27(73), 38–54. https://doi.org/10.4114/intartif.vol27iss73pp38-54 Gubbi, J., Buyya, R., Marusic, S., y Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems, 29(7), 1645–1660. https://doi.org/https://doi.org/10.1016/j.future.2013.01.010 Gupta, B., y Quamara, M. (2020). Internet of Things Security: Principles, Applications, Attacks, and Countermeasures. CRC Press. ISO. (2022). ISO/IEC 27001:2022 Information security, cybersecurity and privacy protection — Information security management systems — Requirements. Jackson, C., y Orebaugh, A. (2020). A study of security and privacy issues associated with the Amazon Echo. International Journal of Internet of Things and Cyber-Assurance, 1(1), 91–100. Jacobsson, A., Boldt, M., y Carlsson, B. (2020). A risk analysis of a smart home automation system. Future Generation Computer Systems, 56, 719–733. https://doi.org/10.1016/j.future.2015.09.003 Jog, V., y Murugan, T. (2018). A Critical Analysis on the Security Architectures of Internet of Things: The Road Ahead. 27(2), 149–162. https://doi.org/doi:10.1515/jisys-2016-0032 Kandukuri, B., Ramakrishna ,V., y Rakshit, A. (2009). Cloud Security Issues. IEEE International Conference on Services Computing, 517–520. https://doi.org/10.1109/SCC.2009.84 Kaplan, A., y Haenlein, M. (2020). Rulers of the world, unite! The challenges and opportunities of artificial intelligence. Business Horizons, 63(1), 37–50. https://doi.org/https://doi.org/10.1016/j.bushor.2019.09.003 Kerzner, H. (2009). Project management: a systems approach to planning, scheduling and controlling. J.. Wiley & Sons. Khidzir, N., Mohamed, A., y Arshad, N. (2010). Information security risk factors: Critical threats vulnerabilities in ICT outsourcing. 2010 International Conference on Information Retrieval & Knowledge Management (CAMP), 194–199. Klockmann, V., von Schenk, A., y Villeval, M. C. (2022). Artificial intelligence, ethics, and intergenerational responsibility. Journal of Economic Behavior & Organization, 203, 284–317. https://doi.org/https://doi.org/10.1016/j.jebo.2022.09.010 Kous, K. (2023). Process-oriented model for managing software development projects using the PRINCE2 method. In Innovation, Strategy, and Transformation Frameworks for the Modern Enterprise (pp. 30–59). https://doi.org/10.4018/979-8-3693-0458-7.ch002 Kowatsch, T., y Maass, W. (n.d.). Critical Privacy Factors of Internet of Things Services: An Empirical Investigation with Domain Experts [Discurso principal]. The 7th Mediterranean Conference on Information Systems (MCIS 2012), Zurich, Suiza. Ksibi, S., Jaidi, F., y Bouhoula, A. (2023). A Comprehensive Study of Security and Cyber- Security Risk Management within e-Health Systems: Synthesis, Analysis and a Novel Quantified Approach. Mobile Networks and Applications, 28(1), 107–127. https://doi.org/10.1007/s11036-022-02042-1 Lee, H. (2020). Home IoT resistance: Extended privacy and vulnerability perspective. Telematics and Informatics, 45-49. https://doi.org/10.1016/j.tele.2020.101377 Losavio, M., Chow, K., Koltay, A., y James, J. (2018). The Internet of Things and the Smart City: Legal challenges with digital forensics, privacy, and security. Security and Privacy, 1(3), e23. https://doi.org/10.3390/s23073681 Mayo, E. (1946). The human problems of an industrial civilization, 2nd ed. In The human problems of an industrial civilization, 2nd ed. Harvard University Graduate School. McIntosh, T., Susnjak, T., Liu, T., Watters, P., Xu, D., Liu, D., Nowrozy, R., y Halgamuge, M. N. (2024). From COBIT to ISO 42001: Evaluating cybersecurity frameworks for opportunities, risks, and regulatory compliance in commercializing large language models. Computers and Security, 144. https://doi.org/10.1016/j.cose.2024.103964 Miraz, M., Ali, M., Excell, P., y Picking, R. (2015). A review on Internet of Things (IoT), Internet of Everything (IoE) and Internet of Nano Things (IoNT). 2015 Internet Technologies and Applications (ITA), 219–224. https://doi.org/10.1109/ITechA.2015.7317398 Mohammadi, M., Al-Fuqaha, A., Sorour, S., & Guizani, M. (2018). Deep Learning for IoT Big Data and Streaming Analytics: A Survey. IEEE Communications Surveys & Tutorials, 20(4), 2923–2960. https://doi.org/10.1109/COMST.2018.2844341 Nissenbaum, H. (n.d.). Privacy in Context Technology, Policy, and the Integrity of Social Life. http://www.nyu.edu/projects/nissenbaum/index.htmlhttp://www.sup.org/book.cgi?id=886 2. OECD. (2023). Artificial intelligence. Https://Www.Oecd.Org/Digital/Artificial-Intelligence/. OECD. (2024). Recommendation of the Council on OECD Legal Instruments Artificial Intelligence. http://legalinstruments.oecd.org Ospino, J. (2023). Gobernanza de ti en la aplicación de inteligencia artificial en las organizaciones. http://repository.unipiloto.edu.co/bitstream/handle/20.500.12277/13075/Gobernanza%20 de%20TI%20en%20la%20IA.pdf?sequence=1&isAllowed=y Parliament, E. (2016). Directive (EU) 2016/1148 of the European Parliament and of the Council of 6 July 2016 concerning measures for a high common level of security of network and information systems across the Union. In Official Journal of the European Union. Office for Official Publications of the European Union Luxembourg. Pathmabandu, C., Grundy, J., Chhetri, M. B., y Baig, Z. (2023). Privacy for IoT: Informed consent management in Smart Buildings. Future Generation Computer Systems, 145, 367–383. https://doi.org/https://doi.org/10.1016/j.future.2023.03.045 Pineda, J., Bejarano, O., Roda, P., y Perdomo, F. (2022). Hacia el desarrollo de infraestructuras eficientes y sostenibles en América Latina: Anexo 1. Banco de Desarrollo de America Latina. Ramos, C., Franco, R., y Gómez, E. (2017). Smart grid analysis and management in Colombia towards ETAP Real Time solution. Revista Chilena de Ingeniería. Ruiz, R., y Moreno, N. (n.d.). Predicción de la demanda de energía eléctrica con aprendizaje automático. https://bibliotecadigital.udea.edu.co/handle/10495/37564 Saleem, Y., Crespi, N., Rehmani, M., y Copeland, R. (2019). Internet of things-aided smart grid: technologies, architectures, applications, prototypes, and future research directions. IEEE Access, 7, 62962–63003. doi: 10.1109/ACCESS.2019.2913984. Sánchez, M., Bermejo, J., Bermejo, J, Sicilia, J., y González, R. (2021). A systematic approach to analysis for assessing the security level of cyber-physical systems in the electricity sector. Microprocessors and Microsystems, 87, 104352. https://doi.org/https://doi.org/10.1016/j.micpro.2021.104352 Smith, A. (1794). An Inquiry into the Nature and Causes of the Wealth of Nations (pp.23). En Valladolid: en la Oficina de la Viuda e Hijos de Santander. http://uvadoc.uva.es/handle/10324/16614 Solove, D. (2008). Understanding Privacy. https://ssrn.com/abstract=1127888Electroniccopyavailableat:https://ssrn.com/abstract=11 27888Electroniccopyavailableat:https://ssrn.com/abstract=1127888 Sommerville, I. (2011). Software engineering. (9a edición, pp. 45 -50). Pearson. https://gc.scalahed.com/recursos/files/r161r/w25469w/ingdelsoftwarelibro9_compressed. pdf Taylor, F. (1911). Principios de la administración científica. New York: Harper & Brothers Publishers. First edition Trilles, S., Hammad, S., y Iskandaryan, D. (2024). Anomaly detection based on Artificial Intelligence of Things: A Systematic Literature Mapping. Internet of Things, 25, 101063. https://doi.org/https://doi.org/10.1016/j.iot.2024.101063 UNESCO. (2021). UNESCO’s Input in reply to the OHCHR report on the Human Rights Council Resolution 47/23 entitled “New and emerging digital technologies and human rights” UNESCO Recommendation on the Ethics of Artificial Intelligence. https://www.broadbandcommission.org/ai-capacity-building/ UNESCO. (2022). Recommendation on the Ethics of Artificial Intelligence. www.unesco.org/open- Winter, J., y Davidson, E. (2019). Governance of artificial intelligence and personal health information. Digital Policy, Regulation and Governance, 21(3), 280–290. https://doi.org/10.1108/DPRG-08-2018-0048 Yilmaz, S., Kumar, D., Hada, S., Demirkesen, S., Zhang, C., y Li, H. (2024). A PMBOK-based construction cost management framework for BIM integration in construction projects. International Journal of Construction Management. https://doi.org/10.1080/15623599.2024.2371626 Zarca, A., Bernabe, J., Trapero, R., Rivera, D., Villalobos, J., Skarmeta, A., Bianchi, S., Zafeiropoulos, A., y Gouvas, P. (2019). Security Management Architecture for NFV/SDN-Aware IoT Systems. IEEE Internet of Things Journal, 6(5), 8005–8020. https://doi.org/10.1109/JIOT.2019.2904123 |
