¿ESTÁN PREPARADOS LOS MILLENNIALS ECUATORIANOS CONTRA UN ATAQUE INFORMÁTICO?

Autores/as

DOI:

https://doi.org/10.37135/chk.002.10.05

Palabras clave:

Ataque informático, seguridad informática, seguridad de la información, millennials.

Resumen

Un ataque cibernético es un intento de obtener acceso no autorizado, exponer, alterar, deshabilitar, robar o hacer un uso no autorizado de información. En los últimos años, los ataques cibernéticos han sido más frecuentes, considerando que las autoridades ecuatorianas afirmaron que habían recibido más de 40 millones de ciberataques, como DOS, en el lapso de una semana, en abril de 2019. El objetivo de este trabajo de investigación es tener un estudio objetivo sobre hasta qué punto los ecuatorianos están preparados para un ciberataque con un enfoque en los millennials que asisten a universidades privadas y tienen un alto nivel socioeconómico debido a que son más propensos a ser atacados por hackers. Este estudio muestra el nivel de importancia que los estudiantes universitarios Millennials otorgan a la seguridad de su información privada. Se aplicó un estudio cuantitativo para medir el objetivo mencionado, aplicada a 103 estudiantes universitarios en Samborondón, Ecuador. El resultado obtenido evidenció que, si bien la población estudiada, toma algunas medidas de seguridad para proteger sus datos, todavía hay grietas, que pueden ser utilizadas por los piratas informáticos para obtener acceso no autorizado.

Descargas

Los datos de descargas todavía no están disponibles.

Citas

Ablon, L. (2018). Data thieves: the motivations of cyber threat actors and their Use and monetization of stolen data. Rand Corporation, 1-16. doi:10.7249/ct490

Alton, L. (2017, December 1). How Millennials Think Differently About Online Security. Forbes. Retrieved from https://www.forbes.com/sites/larryalton/2017/12/01/how-millennials-think-differently-about-online-security/#51fba8da705f

Alzahrani, L., Al-Karaghouli, W. & Weerakkody, V. (2018). Investigating the impact of citizens’ trust toward the successful adoption of e-government: A multigroup analysis of gender, age, and internet experience. Information Systems Management, 35(2), 124-146. doi:10.1080/10580530.2018.1440730

Antoun, C. (2015). Who are the internet users, mobile internet users, and mobile-mostly internet users?: demographic differences across internet-use subgroups in the U.S. Mobile Research Methods: Opportunities and challenges of mobile research methodologies, 99-117. doi:10.5334/bar.g

Bergin, T. & Layne, N. (2016, May 20). Special Report: Cyber thieves exploit banks' faith in SWIFT transfer network. Reuters. Retrieved from https://www.reuters.com/article/us-cyber-heist-swift-specialreport/special-report-cyber-thieves-exploit-banks-faith-in-swift-transfer-network-idUSKCN0YB0DD

Bussa, T. (2000). The Future of Fighting Viruses: A History and Analysis of the Digital Immune System. Bethesda: SANS Institute. Retrieved from http://ivanlef0u.fr/repo/madchat/vxdevl/papers/avers/toby_bussa_gsec.pdf

Ceruzzi, P. E. (1981). The Early Computers of Konrad Zuse, 1935 to 1945. IEEE Annals of the History of Computing, 3(3), 241-262. doi:10.1109/mahc.1981.10034

Chamorro-Premuzic, T., Akhtar, R., Winsborough, D., & Sherman, R. A. (2017). The datafication of talent: how technology is advancing the science of human potential at work. Current Opinion in Behavioral Sciences, 18, 13-16. doi:10.1016/j.cobeha.2017.04.007

Cherapau, I., Muslukhov, I., Asanka, N. & Beznosov, K. (2015). On the Impact of Touch ID on iPhone Passcodes. Symposium on Usable Privacy and Security (SOUPS), 1-20. Retrieved from https://pdfs.semanticscholar.org/e021/f57012562610e8a997963995d00f5cde9b7d.pdf

Choo, K. R. (2011). The cyber threat landscape: Challenges and future research directions. Computers & Security, 30(8), 719-731. doi:10.1016/j.cose.2011.08.004

Deal, J. J., Altman, D. G. & Rogelberg, S. G. (2010). Millennials at Work: What We Know and What We Need to Do (If Anything). Journal of Business and Psychology, 25(1), 191-199. doi:10.1007/s10869-010-9177-2

Fingas, J. (2019). Ecuador says it faced 40 million cyberattacks after giving up Assange. Engadget. Retrieved from https://www.engadget.com/2019/04/16/ecuador-cyberattacks-after-assange-arrest/

Freiberger, P. A., Swaine, M. R. et al. (2020). Computer - History of computing. Encyclopaedia Britannica [electronic version]. New York, EU: Encyclopaedia Britannica Inc. Retrieved from https://www.britannica.com/technology/computer/History-of-computing

Greenberg, A. (2019). Hackers are passing around a megaleak of 2.2 billion records. Wired. Retrieved from https://www.wired.com/story/collection-leak-usernames-passwords-billions/

Hubbard, J. C. & Forcht, K. A. (1998). Computer viruses: how companies can protect their systems. Industrial Management & Data Systems, 98(1), 12-16. doi:10.1108/02635579810199708

Hunt, T. (2019). The 773 million record "Collection #1" data breach. Troy Hunt. Retrieved from https://www.troyhunt.com/the-773-million-record-collection-1-data-reach/

INEC. (2017). Hablando de Millennials. Quito: INEC. Retrieved from http://www.ecuadorencifras.gob.ec/documentos/web-inec/Inforgrafias-INEC/2017/millenials.pdf

Insurance Journal. (2016). Cyber Bank Thieves Stole $12M from Ecuador Bank in 2015, Using SWIFT System. Insurance Journal. Retrieved from https://www.insurancejournal.com/news/international/2016/05/24/409577.htm

International Telecommunication Union. (2012). Internet of Things Global Standards Initiative. ITU. Retrieved from https://www.itu.int/en/ITU-T/gsi/iot/Pages/default.aspx

ISO/IEC 27000. (2018). ISO/IEC 27000:2018(E): Information Technology - Security Techniques - Information Security Management Systems - Overview and Vocabulary. USA: ISO/IEC. Retrieved from https://www.sis.se/api/document/preview/80001198/

McKay, T. (2019). Ecuador Claims It's Been Hit with 40 Million Cyberattacks Since Giving Up Julian Assange. Gizmodo. Retrieved from https://gizmodo.com/ecuador-claims-its-been-hit-with-40-million-cyberattack-1834070219

Middleton, B. (2017). A History of Cyber Security Attacks: 1980 to Present. Boca Raton, FL: CRC Press.

Nachenberg, C. (1997). Computer virus-antivirus coevolution. Communications of the ACM, 40(1), 46-51. doi:10.1145/242857.242869

Nakashima, E. (2016, February 17). Apple vows to resist FBI demand to crack iPhone linked to San Bernardino attacks. The Washington Post. Retrieved from https://www.washingtonpost.com/world/national-security/us-wants-apple-to-help-unlock-iphone-used-by-san-bernardino-shooter/2016/02/16/69b903ee-d4d9-11e5-9823-02b905009f99_story.html

Nastiti, A. & Wimmer, A. (2015). Darknet, Social Media and Extremism: Addressing Indonesian Counterterrorism on the Internet. Deutsches Asienforschungszentrum Asian Series Commentaries, 30, 1-13. Retrieved from https://www.academia.edu/20813843/Darknet_Social_Media_nad_Extremism_Addressing_Indonesian_Counterterrorism_on_the_Internet

Ng, E. S. & Johnson, J. M. (2015). Millennials: who are they, how are they different, and why should we care? The Multi-generational and Aging Workforce, 121-137. doi:10.4337/9781783476589.00014
Palmer, D. (2019). PC security warning: That out-of-date software is putting you at risk. ZDnet. Retrieved from https://www.zdnet.com/article/pc-security-warning-that-out-of-date-software-is-putting-you-at-risk/

Rad, B. B., Masrom, M. & Ibrahim, S. (2010). Evolution of computer virus concealment and anti-virus techniques: a short survey. IJCSI International Journal of Computer Science Issues, 7(6), 113-121.

Rajab, M. A., Ballard, L., Mavrommatis, P., Provos, N. & Zhao, X. (2010). The nocebo effect on the web: an analysis of fake anti-virus distribution. Login, 35(6), 18-25. Retrieved from https://www.usenix.org/system/files/login/articles/rajab.pdf

Redacción Economía. (2017, May 17). Cuentas virtuales y servicios digitales son las nuevas tendencias que impulsa la banca. El Telégrafo, pp. 1-2. Retrieved from https://www.eltelegrafo.com.ec/noticias/economia/4/cuentas-virtuales-y-servicios-digitales-son-las-nuevas-tendencias-que-impulsa-la-banca

Rivadeneira, G. (2019, April 15). Ecuador ha recibido 40 millones de ataques cibernéticos, revela viceministro de Telecomunicaciones. El Universo, pp. 1-2. Retrieved from https://www.eluniverso.com/noticias/2019/04/15/nota/7287215/ecuador-ha-recibido-40-millones-ataques-ciberneticos-revela

Selim, H., Tayeb, S., Kim, Y., Zhan, J. & Pirouz, M. (2016). Vulnerability Analysis of Iframe Attacks on Websites. Proceedings of the The 3rd Multidisciplinary International Social Networks Conference on SocialInformatics 2016, Data Science 2016 - MISNC, SI, DS 2016. doi:10.1145/2955129.2955180

Smith, A. (2017). Americans and Cybersecurity. USA: Pew Research Center. Retrieved from https://www.pewinternet.org/2017/01/26/methodology-183/

Threatcloud. (2019). Live Cyber Attack Threat Map. Check Point. Retrieved from https://threatmap.checkpoint.com/ThreatPortal/livemap.html

Warner, M. (2012). Cybersecurity: A Pre-history. Intelligence and National Security, 27(5), 781-799. doi:10.1080/02684527.2012.708530

Williams, A. (2015, September 18). Move Over, Millennials, Here Comes Generation Z. The New York Times, pp. 1-7. https://www.nytimes.com/2015/09/20/fashion/move-over-millennials-here-comes-generation-z.html

Williams, J. (2014). What is anti-virus? OUCH! Retrieved from https://www.rwu.edu/sites/default/files/downloads/it/what_is_anti_virus.pdf

Publicado

2020-03-17

Cómo citar

Echeverría Joniaux, M. V., Garaycoa Walker, M. A., & Tusev, A. (2020). ¿ESTÁN PREPARADOS LOS MILLENNIALS ECUATORIANOS CONTRA UN ATAQUE INFORMÁTICO?. Chakiñan, Revista De Ciencias Sociales Y Humanidades, (10), 73–86. https://doi.org/10.37135/chk.002.10.05

Número

Sección

ARTÍCULOS DE INVESTIGACIÓN

Artículos similares

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 > >> 

También puede {advancedSearchLink} para este artículo.