Analysis of a comprehensive security system for risk prevention: Cellshop company case study

  • Fausto Raúl Orozco Lara Universidad de Guayaquil, Ecuador
  • Ingrid Kathyuska Giraldo Martínez Universidad de Guayaquil, Ecuador
  • Camilo Geampierre Peñafiel Olaya Universidad de Guayaquil, Ecuador
  • Jefferson Alexander Rugel Cuadrado Universidad de Guayaquil, Ecuador
Keywords: Comprehensive security, risk management, video surveillance, access control, business continuity

Abstract

This article presents the final product of the thesis entitled “Analysis and Evaluation of a Comprehensive Security System for Risk Prevention at Cellshop,” whose objective was to analyze and evaluate the implementation of a comprehensive security system focused on risk prevention at Cellshop, a company dedicated to the sale and management of high-value technological devices in the city of Guayaquil. The research arose from the need to strengthen the physical and digital security of the main warehouse, where vulnerabilities related to access control, monitoring, event traceability, and incident management were identified, affecting operational continuity and the protection of company assets. The methodology employed was a mixed-methods approach, both descriptive and applied, developed as a case study. Techniques such as direct observation, interviews, document review, and checklists based on the international standards ISO 31000 and ISO/IEC 27001 were used, allowing for the diagnosis of the risk level and the design of an integrated technological solution. The proposal includes the implementation of IP video surveillance cameras, biometric access control, electromagnetic locks, and a centralized monitoring system, managed according to PMBOK and ITIL best practices. The results demonstrate significant improvements in access control, a reduction in incidents, optimized response times, and strengthened operational traceability. It is concluded that a comprehensive security system mitigates risks, improves efficiency, and reinforces business sustainability.

Downloads

Download data is not yet available.

References

Adrián, T. B. (06 de 2025). Ecuador : https://repositorio.ug.edu.ec/handle/redug/81408.

Beltrán Tomalá, W. S. (2024). Efectos de la inseguridad en el desarrollo económico de las PYMES de Guayaquil. Efectos de la inseguridad en el desarrollo económico de las PYMES de Guayaquil. http://dspace.ups.edu.ec/handle/123456789/27530.

Cajamarca Sari, M. V. (2022). Diseño, desarrollo e implementación de una bodega inteligente en Ecuador. Repositorio Institucional UPS.

Cajamarca Sari, M. V. (Enero de 2022). Diseño, desarrollo e implementación de una bodega inteligente en la nube, utilizando tecnología de código de barras para la empresa Balnearios Durán. Cuenca, Ecuador: http://dspace.ups.edu.ec/handle/123456789/21597.

eólica, A. e. (28 de 05 de 2025). Asociación empresarial eólica . Obtenido de https://aeeolica.org/la-videovigilancia-con-ia-que-reduce-en-un-998-las-falsas-alarmas/?utm_source=

Fuentes Quichimbo, D. A. (2018). Repositorio Universidad de Guayaquil . Obtenido de http://repositorio.ug.edu.ec/handle/redug/27532

Hopkin, P. (2018). Fundamentals of Risk Management: Understanding, Evaluating and Implementing Effective Risk Management. Londres: Kogan Page. Obtenido de https://www.koganpage.com/product/fundamentals-of-risk-management-9780749483077

International Organization for Standardization. (2019). ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements. International Organization for Standardization, Ginebra. Obtenido de https://www.iso.org/standard/75106.html

Laudon, K. C. (2022). Management Information Systems: Managing the Digital Firm (17th ed.). Pearson Education. Obtenido de https://www.pearson.com/en-us/subject-catalog/p/management-information-systems-managing-the-digital-firm/P200000007462/9780137613759

Morocho, J. A. (2020). Modelo de gestión de riesgos basado en ISO 31000 para organizaciones tecnológicas.

Paredes, D. A. (2021). Implementación de un sistema integral de seguridad física y electrónica para una empresa logística. Repositorio ESPE.

PILAY, M. I. (2018). Repositorio Universidad de Guayaquil. Obtenido de https://repositorio.ug.edu.ec/bitstream/redug/37528/1/TESIS%20SERVARTU%20corregid%20...pdf

Ratcliffe, J. H. (2016). Intelligence-Led Policing (2 ed.). Nueva York: Routledge. Obtenido de https://www.routledge.com/Intelligence-Led-Policing/Ratcliffe/p/book/9781138859039

Standardization, I. O. (2018). ISO 31000. Obtenido de https://www.iso.org/standard/65694.html

Standardization, I. O. (2022). ISO/IEC 27001. Obtenido de https://www.iso.org/standard/27001

Tomalá Bajaña, K. A. (2025). Emulación de un Red Team con herramientas open source para evaluar la seguridad de la infraestructura de red de la empresa SOLINPRO S.A. Repositorio UG.

Von Solms, R. y. (2013). From information security to cyber security. 38, págs. 97–102. doi:10.1016/j.cose.2013.04.004

Whitman, M. E. (2021). Principles of Information Security. Boston: Cengage Learning. Obtenido de https://www.cengage.com/c/principles-of-information-security-6e-whitman/

Yin, R. K. (2018). Case Study Research and Applications: Design and Methods (6 ed.). Thousand Oaks, CA: Sage Publications.

Published
2026-02-24
How to Cite
Orozco Lara, F. R., Giraldo Martínez, I. K., Peñafiel Olaya, C. G., & Rugel Cuadrado, J. A. (2026). Analysis of a comprehensive security system for risk prevention: Cellshop company case study. GADE: Scientific Journal, 6(1), 272-293. https://doi.org/10.63549/rg.v6i1.786