Melissa Valeria Echeverria Joniaux; Melissa Andrea Garaycoa Walker; Aleksandar Tusev
Número 10 / ABRIL, 2020 (73-86)
85
Middleton, B. (2017). A History of Cyber Security
Attacks: 1980 to Present. Boca Raton, FL:
CRC Press.
Nachenberg, C. (1997). Computer virus-antivirus
coevolution. Communications of the ACM,
40(1), 46-51. doi:10.1145/242857.242869
Nakashima, E. (2016, February 17). Apple vows
to resist FBI demand to crack iPho-
ne linked to San Bernardino attacks.
The Washington Post. Retrieved from
https://www.washingtonpost.com/world/
national-security/us-wants-apple-to-
help-unlock-iphone-used-by-san-ber-
nardino-shooter/2016/02/16/69b903ee-
d4d9-11e5-9823-02b905009f99_story.
html
Nastiti, A. & Wimmer, A. (2015). Darknet, So-
cial Media and Extremism: Addressing
Indonesian Counterterrorism on the Inter-
net. Deutsches Asienforschungszentrum
Asian Series Commentaries, 30, 1-13.
Retrieved from https://www.academia.
edu/20813843/Darknet_Social_Media_
nad_Extremism_Addressing_Indone-
sian_Counterterrorism_on_the_Internet
Ng, E. S. & Johnson, J. M. (2015). Millennials:
who are they, how are they different, and
why should we care? The Multi-genera-
tional and Aging Workforce, 121-137.
doi:10.4337/9781783476589.00014
Palmer, D. (2019). PC security warning: That
out-of-date software is putting you at
risk. ZDnet. Retrieved from https://www.
zdnet.com/article/pc-security-warning-
that-out-of-date-software-is-putting-you-
at-risk/
Rad, B. B., Masrom, M. & Ibrahim, S. (2010).
Evolution of computer virus concealment
and anti-virus techniques: a short survey.
IJCSI International Journal of Computer
Science Issues, 7(6), 113-121.
Rajab, M. A., Ballard, L., Mavrommatis, P., Pro-
vos, N. & Zhao, X. (2010). The nocebo
effect on the web: an analysis of fake an-
ti-virus distribution. Login, 35(6), 18-25.
Retrieved from https://www.usenix.org/
system/les/login/articles/rajab.pdf
Redacción Economía. (2017, May 17). Cuentas
virtuales y servicios digitales son las nue-
vas tendencias que impulsa la banca. El
Telégrafo, pp. 1-2. Retrieved from https://
www.eltelegrafo.com.ec/noticias/econo-
mia/4/cuentas-virtuales-y-servicios-digi-
tales-son-las-nuevas-tendencias-que-im-
pulsa-la-banca
Rivadeneira, G. (2019, April 15). Ecuador ha
recibido 40 millones de ataques ciber-
néticos, revela viceministro de Tele-
comunicaciones. El Universo, pp. 1-2.
Retrieved from https://www.eluniverso.
com/noticias/2019/04/15/nota/7287215/
ecuador-ha-recibido-40-mil-
lones-ataques-ciberneticos-revela
Selim, H., Tayeb, S., Kim, Y., Zhan, J. & Pi-
rouz, M. (2016). Vulnerability Analysis
of Iframe Attacks on Websites. Proce-
edings of the The 3rd Multidisciplinary
International Social Networks Confe-
rence on SocialInformatics 2016, Data
Science 2016 - MISNC, SI, DS 2016.
doi:10.1145/2955129.2955180
Smith, A. (2017). Americans and Cybersecu-
rity. USA: Pew Research Center. Re-
trieved from https://www.pewinternet.
org/2017/01/26/methodology-183/
Threatcloud. (2019). Live Cyber Attack Threat
Map. Check Point. Retrieved from https://
threatmap.checkpoint.com/ThreatPortal/
livemap.html
Warner, M. (2012). Cybersecurity: A Pre-history.
Intelligence and National Security, 27(5),
781-799. doi:10.1080/02684527.2012.708
530
Williams, A. (2015, September 18). Move Over,
Millennials, Here Comes Generation Z.
The New York Times, pp. 1-7. https://
www.nytimes.com/2015/09/20/fashion/
move-over-millennials-here-comes-gene-
ration-z.html