POSTGRADO EN ADMINISTRACIÓN DE EMPRESAS

Permanent URI for this collectionhttps://repositorio.uees.edu.ec/handle/123456789/159

Browse

Recent Submissions

Now showing 1 - 20 of 633
  • Item
    PROPUESTA DE BLOCKCHAIN EN LA GESTION DE MULTAS DE TRANSITO EN CUENCA
    (2025) TOLEDO JIMENEZ GUSTAVO ALFREDO
    The management of traffic fines by the Public Mobility, Traffic, and Transportation Company of Cuenca (EMOV EP) presents significant structural deficiencies that hinder its efficiency, transparency, and security. The reliance on manual processes and centralized databases creates critical vulnerabilities, including administrative errors, delays in fine processing, and growing public distrust regarding the system’s fairness. In response to these challenges, this research proposes the implementation of blockchain technology as an innovative solution to optimize traffic fine administration. Blockchain provides a decentralized infrastructure that ensures the immutability of records, process automation, and real-time transparent auditing. Through a comprehensive analysis of blockchain’s benefits and limitations, this study evaluates its technical and economic feasibility within the EMOV EP context. The methodology includes an extensive literature review, comparative case studies, and a feasibility assessment for implementation. Findings suggest that adopting blockchain would not only enhance operational efficiency and system reliability but also set a precedent for the modernization of public administration in Ecuador.
  • Item
    SEGURIDAD DE DATOS EN LA GESTIÓN DE MICROCRÉDITOS: EVALUACIÓN DE RIESGOS Y ESTRATEGIAS DE CIBERSEGURIDAD EN BANCO PICHINCHA
    (2025) CAIZABANDA CHICAIZA RUTH ALEXANDRA
    This research project evaluates data security in the management of microcredits at Banco Pichincha, one of the leading financial institutions in Ecuador. The digitalization of services has expanded accessibility and efficiency, but it has also increased exposure to cyber threats such as phishing, malware, digital fraud, and data breaches. Using a mixed methodology that combined interviews and documentary analysis, the main risks were identified and the cybersecurity strategies implemented were evaluated, including multi- factor authentication, data encryption, continuous system monitoring, and regular audits. In addition, the national legal framework was reviewed, highlighting the Organic Law on Personal Data Protection and its alignment with international standards. The results indicate that, although protection measures have reduced vulnerabilities, their effectiveness depends on the continuous updating of technologies and the strengthening of organizational cybersecurity culture. Finally, it is recommended to incorporate emerging technologies, provide ongoing training for employees and clients, and reinforce internal policies, ensuring a safer, more reliable, and digitally resilient microcredit management system.
  • Item
    IMPLEMENTACIÓN DE UN MODELO DE GESTIÓN DE TECNOLOGÍAS DE LA INFORMACIÓN (TI) BASADO EN EL MARCO DE ARQUITECTURA EMPRESARIAL TOGAF PARA LA MODERNIZACIÓN DEL REGISTRO DE LA PROPIEDAD EN AMBATO, ECUADOR.
    (2025) VALLEJO ARMENDARIZ EVELYN PATRICIA
    The Property Registry of Ambato, as a dependency of the Municipal Government, requires a robust technological structure to efficiently manage databases that collect detailed information on properties, estates, and lots, integrating processes related to cadastre, deeds, usufructs, fiscal values, and taxes. This project aims to strengthen the technological infrastructure through the development of an application based on enterprise architecture, ensuring agility, reliability, and efficient maintenance of the software. The evolution of information technology and public communication has promoted the interconnection of management areas, digitizing processes, and reducing information duplication. Implementing a TOGAF-based reference architecture will provide a formal system description, defining relationships between its components and ensuring compliance with a structured model for public service optimization.
  • Item
    IMPACTO DEL CAPITAL INTELECTUAL EN LA EFICIENCIA DEL SECTOR ELÉCTRICO EN ECUADOR, APLICANDO LOS MODELOS DE SKANDIA Y VAICTM ESTUDIO DE CASO EN LA EMPRESA ELÉCTRICA AMBATO REGIONAL CENTRO NORTE S.A
    (2025) VALENCIA MEDINA ANDREA ELIZABETH
    The present research evaluated the intellectual capital efficiency of Empresa Eléctrica Ambato Regional Centro Norte S.A. (EEASA) during 2021-2023, applying the Skandia Navigator models, developed by Leif Edvinsson and Michael Malone in 1994, and the Value Added Intellectual Coefficient (VAICTM) created by Ante Pulic in 1998, with the objective of identifying its impact on organizational growth in the financial area and recommending improvement strategies in 11 weeks. A descriptive case study was employed, combining a quantitative (analysis of financial statements of the Superintendence of Companies and Securities according to the Skandia and VAICTM models) and qualitative (interviews with administrative staff) approach. According to the Skandia Model, the Intellectual Capital Value decreased by 16.86% in 2022 ($1,883,546.64) with respect to 2021 ($2,265,380.31), but recovered in 2023 ($2,590,292.13), with an increase of 37.52%, indicating volatility and a possible lack of sustainability in investments in intangible assets, such as technical and operational staff development. The VAICTM Model showed an efficiency of $6.47 per dollar in 2021, a peak of $8.05 in 2022, and a slight drop to $6.50 in 2023, reflecting instability in human, structural and relational resource management. To improve the performance of technical and operational personnel, strategies such as technical training, performance incentives, digitalization of processes, participative innovation and continuous feedback were proposed, aligned with the human, process and renewal approaches of the Skandia Model, seeking a sustainable impact on EEASA's financial growth.
  • Item
    DISEÑO DE UN PROTOCOLO ESTÁNDAR DE SEGURIDAD DE DATOS PARA MITIGAR LA FUGA DE INFORMACIÓN SENSIBLE EN CADENAS DE RESTAURANTES.
    (2025) TORRES GUARIN ROBERTO XAVIER
    The increasing digitalization of restaurant chains has exposed these companies to significant risks related to the leakage of sensitive information. The objective of the research is to propose the design of a standard data security protocol to mitigate risks. This approach includes analyzing data security, understanding existing data security protocols, and identifying recurring threats to the data security of both restaurants and customers. The methodology used was based on a strategic plan implemented by restaurant chains to understand relevant aspects. In this case, an interview was conducted with three administrative and four operational staff members. The interviews were structured with 10 questions. The results obtained are highlighted through an analysis of the responses and triangulation. Among the most relevant aspects that determine the design of a security protocol are encrypted access, fast data for the security of customer information, ongoing employee training, and an agile protocol that allows for improved collections and information security processes to provide quality service.
  • Item
    IMPLEMENTACIÓN DE ESTRATEGIAS BÁSICAS DE CIBERSEGURIDAD EN ENTORNOS EDUCATIVOS: CASO UNIDAD EDUCATIVA PARTICULAR RAFAELLO SANTI
    (2025) ROSALES CASTAÑEDA EVILEN ROSALIA
    In the current context of the rapid digitalization of schools, online security has become a key component of protecting information and making good use of technology. The overall objective of this study was to analyze the basic cybersecurity strategies implemented at the Rafaello Santi Private Educational Unit in Portoviejo, Ecuador. The methodology used was a mixed-method approach, with a non-experimental design and descriptive scope. Questionnaires were administered to 380 students and semi-structured interviews were conducted with teachers and technical staff. The results revealed several problems such as a lack of incident response, dangerous password use, and a limited amount of online security training. However, it was also evident that the school community had a positive attitude, especially among students who showed interest in learning more. Based on these findings, strategies focused on training, access management, policy outreach, and incident response were proposed. It is concluded that the implementation of these actions will significantly contribute to creating a strong and sustainable institutional cybersecurity culture.
  • Item
    ANÁLISIS DE VULNERABILIDADES E IMPLEMENTACIÓN DE MEJORA DE SEGURIDAD EN NETWORKING
    (2025) RODRIGUEZ DUEÑAS FATIMA ANDREA
    This research project aims to analyze the existing vulnerabilities in the company's network infrastructure and propose and implement improvements in its security. The adopted methodological approach is mixed, combining a theoretical review with empirical analysis, allowing for a comprehensive understanding of security issues and appropriate solutions. The theoretical phase consists of reviewing the literature on common vulnerabilities in networks, detection tools, and best practices in network security. Additionally, recognized methodologies in the industry, such as risk analysis, security audits, and penetration testing (pen testing), will be studied. In the empirical phase, security audits will be conducted using automated tools such as Nessus and Wireshark to identify potential vulnerabilities in the network. Penetration testing will also be carried out to assess the infrastructure's resistance to real attacks, and the company's current security policies, such as password management and access controls, will be analyzed. After analyzing the vulnerabilities, security improvements will be proposed, such as optimized firewall configurations, network segmentation, and the implementation of multi-factor authentication (MFA). Additional tools such as Intrusion Prevention Systems (IPS) will be introduced, and security training will be provided for the company's staff. Finally, the results of the implemented improvements will be evaluated through new security audits, continuous network monitoring, and user satisfaction surveys. This will allow validating the effectiveness of the adopted measures and generating recommendations for securing the network in the long term.
  • Item
    AUTOMATIZACIÓN DE PROCESOS OPERATIVOS CON LA IMPLEMENTACIÓN DE HERRAMIENTAS DE TECNOLOGÍAS DE LA INFORMACIÓN EN UNA AGENCIA DE PUBLICIDAD PARA FOMENTAR LA INNOVACIÓN DIGITAL.
    (2025) REINOSO VELOZ ALEJANDRA SALOME
    The accelerated advancement of technology has enabled potential growth in various digital transformation processes, specifically in information technology (IT) across all companies and industries in Ecuador and around the world, particularly in the advertising sector. These types of tools have enabled innovative processes that optimize time and resources, thereby significantly improving operational processes. The fundamental purpose of this research was to design and execute IT management strategies at Tribu Express, an advertising agency, in order to improve its internal and external processes and thus foster digital innovation. To this end, the main challenges facing the agency were determined, focusing on areas such as information management, supplier-client communication, and campaign efficiency. Likewise, the appropriate tools for automating processes within the advertising agency were evaluated. With the implementation of the IT strategy, product delivery times and execution times for various advertising campaigns were reduced. Internal coordination and communication were also improved, helping to achieve client objectives and ensure efficient advertising campaigns. This research has undoubtedly helped more advertising companies looking to integrate technological tools into their processes that are competitive in today's digital business environment.
  • Item
    ANÁLISIS DEL COMPORTAMIENTO ORGANIZACIONAL Y LA PROTECCIÓN DE DATOS
    (2025) QUIROLA CASTILLO LOURDES PAOLA
    This research study examined the analysis of organizational behavior and its relationship with data protection in companies. It explored how employee conduct, influenced by factors such as motivation, leadership, and organizational culture, affected the management of information security and the mitigation of cyber risks. Data protection, a critical issue in today’s business environment, demanded the integration of ethical principles and sound organizational practices to prevent data breaches and cyberattacks. Several security strategies were analyzed, including the implementation of data protection policies, cybersecurity training programs, and the adoption of advanced technologies to safeguard sensitive information. Moreover, the study assessed the influence of employees’ emotions, attitudes, and perceptions on the application of such policies. These behavioral factors had a significant impact on both the effectiveness of security strategies and overall organizational performance. Through surveys and interviews, data were collected to explore organizational practices regarding data protection and employee behavior across various institutions. The study concluded that organizational culture and ethical employee behavior are fundamental to achieving effective data protection. Finally, it underscored the importance of a comprehensive approach that integrates committed leadership, well-defined policies, and continuous training to enhance information security and reduce cyber risks.
  • Item
    OPTIMIZACIÓN DEL PROCESO DE CONTROL DE PROVEEDORES Y CONTRATISTAS DE UNA EMPRESA INDUSTRIAL MEDIANTE LA UTILIZACIÓN DEL SISTEMA INTEGRAL DE CONTROL DE PROVEEDORES Y CONTRATISTAS (SICOP) QUE INTEGRE TECNOLOGÍAS DE LA INDUSTRIA 4.0.
    (2025) PONCE AGUIRRE KATHERINE VANESSA
    The main objective of this research was to automate and optimize the supplier and contractor management process at the Omega industrial company through the implementation of the Comprehensive Supplier and Contractor Control System (SICOP), which integrates Industry 4.0 technologies. The research focused on solving critical problems associated with manual management, such as administrative delays, data management errors, lack of traceability, and information security risks, which negatively impacted productivity and strategic decision- making. To achieve this objective, a non-experimental mixed methodology (qualitative and quantitative) was adopted, complemented by a bibliographic review based on the review and critical analysis of widely available documentary sources. The research was conducted in two main phases: a system analysis and selection phase, in which four options were evaluated (ERP, SRM, P2P, and E-Procurement), with SICOP being chosen due to its versatility and comprehensive capabilities. The second phase involved administering structured surveys to 18 key users (department heads, supervisors, and coordinators) to measure impact, satisfaction, and areas for improvement. The results showed that SICOP achieved: An 85.7% reduction in administrative delays and data errors. 95.5% acceptance as a tool that improves productivity and information security. 78.6% perceived effectiveness by users. Furthermore, 92.9% of respondents recommended SICOP, highlighting benefits such as agility, greater control, and time savings. However, challenges were identified, such as resistance to change among traditional providers and the need for automatic notifications. In conclusion, SICOP has proven effective as a technological solution for supplier management, although it requires ongoing improvements, such as adaptive training, integration with Artificial Intelligence, and mobility. This study provides a replicable model for industrial companies aspiring to update their processes with 4.0 technologies, underscoring the importance of automation for business competitiveness.
  • Item
    SEGURIDAD DE DATOS EN LA IMPLEMENTACIÓN DE SISTEMAS ERP RETOS Y ESTRATEGIAS DE PROTECCIÓN
    (2025) PALOMEQUE OLVERA MARCOS ESTEBAN
    The overall objective of this final project was to investigate the challenges and protection strategies faced by organizations in a context where digitization and data centralization are critical for business efficiency. To achieve this, an analytical and descriptive study was conducted, combining qualitative and quantitative approaches, as well as a bibliographic review and fieldwork that allowed a more exhaustive analysis of the concepts addressed. The research revealed that while ERP systems streamline processes and facilitate real-time, informed decision-making, they also increase vulnerability to cyberattacks, ransomware, and information breaches. The main challenges include the complexity of cyber threats, a lack of training of staff in good security practices, and non-compliance with regulations such as GDPR. Security breaches can have a significant impact, affecting both the company’s finances and its reputation and the trust of customers and stakeholders. To address these issues, this study proposes a comprehensive strategy that combines strong security measures, continuing education of staff in cybersecurity, and clear data management policies. In addition, the importance of effective leadership in change management is highlighted, which is essential to cultivate a culture of security and ensure success in the implementation of ERP systems. Specific objectives include ensuring the confidentiality, integrity and availability of information, as well as complying with current regulations. This multifaceted approach is crucial to mitigate risks and protect data integrity in an increasingly interconnected business environment. In conclusion, this study establishes a framework for action that enables organizations to proactively address the security challenges associated with ERP systems, aligning themselves with industry best practices and ensuring the protection of critical information.
  • Item
    PROPUESTA DE AUTOMATIZACIÓN DEL CONTROL DE INVENTARIO MEDIANTE TECNOLOGÍAS DE LA INFORMACIÓN EN LA EMPRESA FRIIIOGUAYAS
    (2025) MUÑIZ VASQUEZ LISBETH SOLANGE
    This research analyzes the current inventory situation at Friiioguayas, a family-run microenterprise dedicated to the sale of refrigeration spare parts in Guayaquil, Ecuador. Problems were identified, such as the absence of a formal record-keeping system, frequent errors, and inventory management based on the empirical knowledge of staff. Through surveys of the team and other family-run microenterprises in the same sector, the need to implement an appropriate technological solution was confirmed. The research falls within the Information Technology Management framework and evaluates three options: Odoo Community, Stockpile, and Dora. Using a matrix of weighted criteria, Dora software was determined to be the most viable option due to its Spanish- language interface, local technical support, mass upload capacity, and affordable cost. A phased implementation is proposed, starting with the highest-moving products, using barcodes and upload templates from Excel. The conclusion is that this solution is replicable in other microenterprises in the sector and represents a concrete opportunity to professionalize inventory management and improve operational efficiency.
  • Item
    La Inteligencia Artificial En El Comercio Electrónico: Riesgos De Seguridad Y Estrategias Para La Protección De Datos En La Era Digital
    (2025) MOLINA ESPINOZA MARTIN ANDRES
    This study examines the security risks associated with Artificial Intelligence (AI)-based personalization in e-commerce, aiming to protect user privacy without negatively impacting customer experience. A qualitative, exploratory, and descriptive methodology was used, specifically structured around documentary analysis of relevant secondary sources, including specialized scientific literature, key international regulations (General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA), and selected case studies. The documentary analysis focused on identifying the primary security threats arising from the intensive use of personal data in AI systems, highlighting unauthorized exposure of sensitive information, algorithmic manipulation of consumer behavior, and challenges related to regulatory compliance. Additionally, specific strategies were proposed to mitigate these risks, including advanced data encryption implementation, increased transparency in utilized algorithms, and proactive reinforcement of legal and regulatory compliance. The findings underscore that a balanced integration of technology, ethical principles, and regulations is essential for achieving secure and sustainable personalization in e-commerce. Finally, this research provides practical recommendations aimed at helping companies align technological innovation with high security standards, thus strengthening user trust and improving business competitiveness in today's digital environment.
  • Item
    La Revolución del Blockchain en Ecuador: Ciberseguridad y Protección de Datos como Ejes Clave en la Transformación de Negocios, Economía y Regulación del Sector Financiero
    (2025) LARA DURAN GINA ESTEFANIA
    Blockchain's progress in Ecuador is becoming a transformative engine for the financial sector, driving the digitization of transactions and the strengthening of cybersecurity. This decentralized and secure technology promises to optimize data protection and reduce risks associated with fraud and digital vulnerabilities, which is vital for building trust among institutions and users. However, its implementation in the country faces significant challenges. The lack of a clear regulatory framework creates legal uncertainty and hampers interoperability between financial systems, while cultural resistance to change constitutes an additional barrier that limits the full adoption of blockchain. Moreover, despite its great advantages, current technological vulnerabilities demand the development of robust security mechanisms that minimize exposure to cyberattacks and ensure the integrity of information. In this context, it is necessary to thoroughly analyze how blockchain can serve as a tool to reinforce cybersecurity in financial transactions, positively impacting the digital economy and the efficiency of business processes. Likewise, it is crucial to compare the evolution of this technology in Ecuador with that in other economies in the region, which would allow for the identification of best practices, growth opportunities, and innovative regulatory strategies. The consolidation of an appropriate regulatory framework and the promotion of a culture of innovation will lay the foundations for a secure, efficient, and sustainable digital transformation, establishing new standards in data protection and in the competitiveness of Ecuador's financial sector.
  • Item
    IMPACTO DE LAS ESTRATEGIAS DE CIBERSEGURIDAD PARA LA PROTECCIÓN DE DATOS EN EMPRESAS MANUFACTURERAS: ANÁLISIS DE RIESGOS Y CUMPLIMIENTO NORMATIVO
    (2025) JIMENEZ RODRIGUEZ MELINA NICOLE
    This degree study analyzes the impact of cybersecurity strategies implemented in manufacturing companies in the face of cyberthreats and compliance with current regulations, such as the Ecuadorian Organic Law on Personal Data Protection and ISO 27001. This research project addresses the data protection environment and information confidentiality, highlighting the effectiveness of event management and information security in the application of standards, and safeguarding sensitive data through the implementation of controls and/or procedures in the use of technology. With the aim of identifying threats such as ransomware, industrial espionage, and human error, the methodology applied includes interviews with professionals in the field and surveys in organizations in the manufacturing sector. This provides visibility into the mechanisms necessary to strengthen industries against various cyberattacks and the requirements established by current regulations. Finally, a set of recommendations is proposed to contribute to strengthening data protection and operational continuity.
  • Item
    AUTOMATIZACIÓN DE LA DESCARGA Y EXPORTACIÓN DE COMPROBANTES DEL SRI MEDIANTE RPA UNA PROPUESTA TECNOLÓGICA PARA LA TRANSFORMACIÓN DIGITAL CONTABLE EN ECUADOR
    (2025) HOLGUIN VELEZ YONNY MANUEL
    The project aims to automate the downloading and exporting of SRI receipts using RPA. Currently, Ecuadorian companies invest many hours in this manual process, leading to errors and high operational costs. It is estimated that 78% of small and medium-sized enterprises spend between 10 and 15 hours per week on this task, and 30% of them make errors that may result in penalties. The proposal seeks to develop an RPA system that optimizes this process, reducing time and errors in accounting management. Previous studies in other countries have shown that automation can reduce execution time by 60% and decrease human errors by 85%. The project raises key questions about process optimization, the benefits in accuracy and time, and integration with accounting systems. Its justification lies in the need to modernize the Ecuadorian accounting sector, improving companies' competitiveness through advanced technology. The RPA system will be designed using the Selenium tool, allowing for automatic downloading and data conversion to TXT format. Its impact will be evaluated through comparative tests in companies, analyzing time reduction and improvements in data accuracy. The study will include an empirical approach, with interviews and pilot tests, to validate the system's effectiveness. Its implementation aims to set a precedent in the automation of fiscal processes in Ecuador, aligning companies with global trends in digitalization and operational efficiency.
  • Item
    ANÁLISIS DE LA PERCEPCIÓN DE LOS EMPLEADOS EN INSTITUCIONES PÚBLICAS DE EDUCACIÓN SUPERIOR DE GUAYAQUIL SOBRE EL LIDERAZGO TRANSFORMACIONAL Y SU IMPACTO EN LA IMPLEMENTACIÓN DE INTELIGENCIA ARTIFICIAL
    (2025) HIDALGO ADAMS BARBARA MARIA
    This study analyzed the perception of administrative staff in public higher education institutions in the city of Guayaquil regarding transformational leadership and its impact on the implementation of artificial intelligence (AI). The research was conducted using a mixed- methods approach, applying semi-structured interviews and surveys at two universities: Escuela Superior Politécnica del Litoral (ESPOL) and the University of the Arts (UA). The results revealed a favorable disposition toward the use of AI tools; however, their implementation was hindered by the absence of clear strategies, minimal training, and poorly structured communication from institutional leaders. ESPOL exhibited stronger indicators of positive perception regarding leadership and AI integration, while responses from UA were mostly neutral, highlighting a disconnect in communication and institutional leadership. The study concluded that transformational leadership significantly influenced the acceptance of AI and that its success depended on strategic planning, continuous training, and fostering an organizational culture open to innovation and change.
  • Item
    DISEÑO DE UN MODELO PARA LA EVALUACIÓN Y EL CONTROL DE RIESGOS FINANCIEROS APLICADO A UNA EMPRESA DE PRODUCTOS DE HIGIENE PERSONAL EN ECUADOR.
    (2025) HERAS NARANJO ANTHONNY LUIS
    This study aims to design a financial risk evaluation and control model for Softys Ecuador S.A., a company in the personal hygiene products sector. It begins with a thorough analysis of the company's 2021, 2022 and 2023 financial statements, revealing significant weaknesses in operational profitability, elevated cost structures, and a lack of tools to respond to adverse financial conditions. Based on these findings, a comprehensive model is proposed, structured on the COSO ERM framework and supported by tools such as sensitivity analysis, a financial Balanced Scorecard, and risk matrices. The findings of the research confirm that the model is not only viable but also adaptable to different economic contexts. It offers practical mechanisms to enhance financial oversight and risk management capabilities. Recommendations for implementation include the formation of an internal control committee, continuous professional development for finance staff, and the adoption of financial monitoring technologies. Ultimately, the study concludes that structured financial risk management improves decision- making, strengthens organizational resilience, and ensures long-term sustainability.
  • Item
    CIBERSEGURIDAD EN LA INDUSTRIA MINERA: IDENTIFICACIÓN DE AMENAZAS Y ESTRATEGIAS DE PROTECCIÓN EN SISTEMAS DE INFORMACIÓN
    (2025) GUZMÁN VALAREZO PABLO ANDRÉS
    The research aimed to explore cybersecurity practices in the mining industry, identify the most common cyber threats and determine the most effective security measures to protect information systems. The methodology used was a qualitative approach, which included interviews with cybersecurity experts in the mining industry and a thematic analysis of the data collected. The interviews provided detailed information on cybersecurity practices and the most common cyber threats in the mining industry. The main findings of the research were that most mining companies have security measures in place, but some of them are outdated or ineffective and phishing attacks and data theft are some of the most common cyber threats and in most of the interviewees staff training is considered an immediate priority in terms of cybersecurity. In summary, the research highlights the importance of cybersecurity in the mining industry and provides recommendations for improving the security of information systems, including Implementing updated and effective security measures, training personnel in cybersecurity, protecting internal information, conducting cyber attack drills, and hiring specialized cybersecurity personnel.
  • Item
    ANÁLISIS COSTO BENEFICIO EN LA IMPLEMENTACIÓN DE UN SISTEMA FOTOVOLTAICO CONECTADO A LA RED EN LA CUBIERTA DE UN CENTRO COMERCIAL UBICADO EN GUAYAQUIL.
    (2025) GUERRERO VALENZUELA ANDRES OSWALDO
    Many organizations in Ecuador are seeking to promote sustainable energy practices that provide economic and environmental benefits, which is why investing in the installation of grid- connected photovoltaic (PV) systems offers an attractive outlook that will even allow them to operate during periods when the public grid is not providing this service. The purpose of this Capstone is to demonstrate the technical, economic, and environmental viability of integrating grid-connected photovoltaic self-supply energy technology for a shopping center in the city of Guayaquil, in accordance with energy demand and ARCERNNR 001/2021 legislation. The approach is a mixed methodology that begins with a literature review focused on the system design and its main components, the estimation of energy demand, while the empirical section consists of collecting primary information through interviews with Managers and Heads of a shopping center, which allowed for the sizing of the SF and guidance on strategies for incorporating these technologies within the regulations. Additionally, a financial analysis was conducted using tools such as IRR and NPV to demonstrate that the project is beneficial. The result obtained was that the project is viable due to the considerable economic savings reflected in the financial analysis, with payback periods of approximately 30% of the system's useful life. On the other hand, it is also demonstrated that, being a technology with 0 emissions into the environment, it significantly reduces the carbon footprint that businesses venturing into the use of these clean energies can declare.