ARE ECUADORIAN MILLENNIALS PREPARED AGAINST A CYBERATTACK?

Main Article Content

Melissa Valeria Echeverría Joniaux
http://orcid.org/0000-0002-5453-8530
Melissa Andrea Garaycoa Walker
http://orcid.org/0000-0002-9383-7162
Aleksandar Tusev
http://orcid.org/0000-0003-3794-9669

Abstract

A cyberattack is an attempt to get unauthorized access, expose, alter, disable, steal or make unauthorized use of information. Over the years, cyberattacks are becoming more frequent, considering that Ecuadorian authorities claimed they had received over 40 million cyberattacks such as denial-of-service (DOS) during a week, in April 2019. The objective of this research work is to assess to what extent Ecuadorians are prepared for a cyberattack focused on Millennials, who attend private universities and maintain a high socioeconomic status, due to they are more likely to be targeted by hackers. This study shows the level of importance that Millennial university students give to their private information. A quantitative study was applied to measure the objective mentioned before and was aimed at 103 university students in Samborondón, Ecuador. The obtained results showed that although the sample population takes some security measures to protect their information, there exist vulnerable aspects that can be used by hackers to obtain unauthorized access. 

Downloads

Download data is not yet available.

Article Details

How to Cite
Echeverría Joniaux, M. V., Garaycoa Walker, M. A., & Tusev, A. (2020). ARE ECUADORIAN MILLENNIALS PREPARED AGAINST A CYBERATTACK?. CHAKIÑAN, Journal of Social Sciences and Humanities, 10, 73-86. https://doi.org/10.37135/chk.002.10.05
Section
RESEARCH ARTICLES

How to Cite

Echeverría Joniaux, M. V., Garaycoa Walker, M. A., & Tusev, A. (2020). ARE ECUADORIAN MILLENNIALS PREPARED AGAINST A CYBERATTACK?. CHAKIÑAN, Journal of Social Sciences and Humanities, 10, 73-86. https://doi.org/10.37135/chk.002.10.05

Share

References

Ablon, L. (2018). Data thieves: the motivations of cyber threat actors and their Use and monetization of stolen data. Rand Corporation, 1-16. doi:10.7249/ct490

Alton, L. (2017, December 1). How Millennials Think Differently About Online Security. Forbes. Retrieved from https://www.forbes.com/sites/larryalton/2017/12/01/how-millennials-think-differently-about-online-security/#51fba8da705f

Alzahrani, L., Al-Karaghouli, W. & Weerakkody, V. (2018). Investigating the impact of citizens’ trust toward the successful adoption of e-government: A multigroup analysis of gender, age, and internet experience. Information Systems Management, 35(2), 124-146. doi:10.1080/10580530.2018.1440730

Antoun, C. (2015). Who are the internet users, mobile internet users, and mobile-mostly internet users?: demographic differences across internet-use subgroups in the U.S. Mobile Research Methods: Opportunities and challenges of mobile research methodologies, 99-117. doi:10.5334/bar.g

Bergin, T. & Layne, N. (2016, May 20). Special Report: Cyber thieves exploit banks' faith in SWIFT transfer network. Reuters. Retrieved from https://www.reuters.com/article/us-cyber-heist-swift-specialreport/special-report-cyber-thieves-exploit-banks-faith-in-swift-transfer-network-idUSKCN0YB0DD

Bussa, T. (2000). The Future of Fighting Viruses: A History and Analysis of the Digital Immune System. Bethesda: SANS Institute. Retrieved from http://ivanlef0u.fr/repo/madchat/vxdevl/papers/avers/toby_bussa_gsec.pdf

Ceruzzi, P. E. (1981). The Early Computers of Konrad Zuse, 1935 to 1945. IEEE Annals of the History of Computing, 3(3), 241-262. doi:10.1109/mahc.1981.10034

Chamorro-Premuzic, T., Akhtar, R., Winsborough, D., & Sherman, R. A. (2017). The datafication of talent: how technology is advancing the science of human potential at work. Current Opinion in Behavioral Sciences, 18, 13-16. doi:10.1016/j.cobeha.2017.04.007

Cherapau, I., Muslukhov, I., Asanka, N. & Beznosov, K. (2015). On the Impact of Touch ID on iPhone Passcodes. Symposium on Usable Privacy and Security (SOUPS), 1-20. Retrieved from https://pdfs.semanticscholar.org/e021/f57012562610e8a997963995d00f5cde9b7d.pdf

Choo, K. R. (2011). The cyber threat landscape: Challenges and future research directions. Computers & Security, 30(8), 719-731. doi:10.1016/j.cose.2011.08.004

Deal, J. J., Altman, D. G. & Rogelberg, S. G. (2010). Millennials at Work: What We Know and What We Need to Do (If Anything). Journal of Business and Psychology, 25(1), 191-199. doi:10.1007/s10869-010-9177-2

Fingas, J. (2019). Ecuador says it faced 40 million cyberattacks after giving up Assange. Engadget. Retrieved from https://www.engadget.com/2019/04/16/ecuador-cyberattacks-after-assange-arrest/

Freiberger, P. A., Swaine, M. R. et al. (2020). Computer - History of computing. Encyclopaedia Britannica [electronic version]. New York, EU: Encyclopaedia Britannica Inc. Retrieved from https://www.britannica.com/technology/computer/History-of-computing

Greenberg, A. (2019). Hackers are passing around a megaleak of 2.2 billion records. Wired. Retrieved from https://www.wired.com/story/collection-leak-usernames-passwords-billions/

Hubbard, J. C. & Forcht, K. A. (1998). Computer viruses: how companies can protect their systems. Industrial Management & Data Systems, 98(1), 12-16. doi:10.1108/02635579810199708

Hunt, T. (2019). The 773 million record "Collection #1" data breach. Troy Hunt. Retrieved from https://www.troyhunt.com/the-773-million-record-collection-1-data-reach/

INEC. (2017). Hablando de Millennials. Quito: INEC. Retrieved from http://www.ecuadorencifras.gob.ec/documentos/web-inec/Inforgrafias-INEC/2017/millenials.pdf

Insurance Journal. (2016). Cyber Bank Thieves Stole $12M from Ecuador Bank in 2015, Using SWIFT System. Insurance Journal. Retrieved from https://www.insurancejournal.com/news/international/2016/05/24/409577.htm

International Telecommunication Union. (2012). Internet of Things Global Standards Initiative. ITU. Retrieved from https://www.itu.int/en/ITU-T/gsi/iot/Pages/default.aspx

ISO/IEC 27000. (2018). ISO/IEC 27000:2018(E): Information Technology - Security Techniques - Information Security Management Systems - Overview and Vocabulary. USA: ISO/IEC. Retrieved from https://www.sis.se/api/document/preview/80001198/

McKay, T. (2019). Ecuador Claims It's Been Hit with 40 Million Cyberattacks Since Giving Up Julian Assange. Gizmodo. Retrieved from https://gizmodo.com/ecuador-claims-its-been-hit-with-40-million-cyberattack-1834070219

Middleton, B. (2017). A History of Cyber Security Attacks: 1980 to Present. Boca Raton, FL: CRC Press.

Nachenberg, C. (1997). Computer virus-antivirus coevolution. Communications of the ACM, 40(1), 46-51. doi:10.1145/242857.242869

Nakashima, E. (2016, February 17). Apple vows to resist FBI demand to crack iPhone linked to San Bernardino attacks. The Washington Post. Retrieved from https://www.washingtonpost.com/world/national-security/us-wants-apple-to-help-unlock-iphone-used-by-san-bernardino-shooter/2016/02/16/69b903ee-d4d9-11e5-9823-02b905009f99_story.html

Nastiti, A. & Wimmer, A. (2015). Darknet, Social Media and Extremism: Addressing Indonesian Counterterrorism on the Internet. Deutsches Asienforschungszentrum Asian Series Commentaries, 30, 1-13. Retrieved from https://www.academia.edu/20813843/Darknet_Social_Media_nad_Extremism_Addressing_Indonesian_Counterterrorism_on_the_Internet

Ng, E. S. & Johnson, J. M. (2015). Millennials: who are they, how are they different, and why should we care? The Multi-generational and Aging Workforce, 121-137. doi:10.4337/9781783476589.00014
Palmer, D. (2019). PC security warning: That out-of-date software is putting you at risk. ZDnet. Retrieved from https://www.zdnet.com/article/pc-security-warning-that-out-of-date-software-is-putting-you-at-risk/

Rad, B. B., Masrom, M. & Ibrahim, S. (2010). Evolution of computer virus concealment and anti-virus techniques: a short survey. IJCSI International Journal of Computer Science Issues, 7(6), 113-121.

Rajab, M. A., Ballard, L., Mavrommatis, P., Provos, N. & Zhao, X. (2010). The nocebo effect on the web: an analysis of fake anti-virus distribution. Login, 35(6), 18-25. Retrieved from https://www.usenix.org/system/files/login/articles/rajab.pdf

Redacción Economía. (2017, May 17). Cuentas virtuales y servicios digitales son las nuevas tendencias que impulsa la banca. El Telégrafo, pp. 1-2. Retrieved from https://www.eltelegrafo.com.ec/noticias/economia/4/cuentas-virtuales-y-servicios-digitales-son-las-nuevas-tendencias-que-impulsa-la-banca

Rivadeneira, G. (2019, April 15). Ecuador ha recibido 40 millones de ataques cibernéticos, revela viceministro de Telecomunicaciones. El Universo, pp. 1-2. Retrieved from https://www.eluniverso.com/noticias/2019/04/15/nota/7287215/ecuador-ha-recibido-40-millones-ataques-ciberneticos-revela

Selim, H., Tayeb, S., Kim, Y., Zhan, J. & Pirouz, M. (2016). Vulnerability Analysis of Iframe Attacks on Websites. Proceedings of the The 3rd Multidisciplinary International Social Networks Conference on SocialInformatics 2016, Data Science 2016 - MISNC, SI, DS 2016. doi:10.1145/2955129.2955180

Smith, A. (2017). Americans and Cybersecurity. USA: Pew Research Center. Retrieved from https://www.pewinternet.org/2017/01/26/methodology-183/

Threatcloud. (2019). Live Cyber Attack Threat Map. Check Point. Retrieved from https://threatmap.checkpoint.com/ThreatPortal/livemap.html

Warner, M. (2012). Cybersecurity: A Pre-history. Intelligence and National Security, 27(5), 781-799. doi:10.1080/02684527.2012.708530

Williams, A. (2015, September 18). Move Over, Millennials, Here Comes Generation Z. The New York Times, pp. 1-7. https://www.nytimes.com/2015/09/20/fashion/move-over-millennials-here-comes-generation-z.html

Williams, J. (2014). What is anti-virus? OUCH! Retrieved from https://www.rwu.edu/sites/default/files/downloads/it/what_is_anti_virus.pdf