ARE ECUADORIAN MILLENNIALS PREPARED AGAINST A CYBERATTACK?
Conteúdo do artigo principal
Resumo
A cyberattack is an attempt to get unauthorized access, expose, alter, disable, steal or make unauthorized use of information. Over the years, cyberattacks are becoming more frequent, considering that Ecuadorian authorities claimed they had received over 40 million cyberattacks such as denial-of-service (DOS) during a week, in April 2019. The objective of this research work is to assess to what extent Ecuadorians are prepared for a cyberattack focused on Millennials, who attend private universities and maintain a high socioeconomic status, due to they are more likely to be targeted by hackers. This study shows the level of importance that Millennial university students give to their private information. A quantitative study was applied to measure the objective mentioned before and was aimed at 103 university students in Samborondón, Ecuador. The obtained results showed that although the sample population takes some security measures to protect their information, there exist vulnerable aspects that can be used by hackers to obtain unauthorized access.
##plugins.themes.bootstrap3.displayStats.downloads##
Detalhes do artigo
Edição
Seção
Responsabilidade dos autores:
São responsáveis pelas ideias e dados recopilados nos manuscritos, pela fidelidade da informação, pela correção das citações, pelos direitos para publicar qualquer material incluído no texto pela apresentação do manuscrito no formato requerido pela Revista (arquivo web). Um manuscrito enviado a CHAKIÑAN não deve estar publicado com anterioridade, nem mesmo haver sido apresentado da mesma forma a outro meio de publicação.
Direitos do Autor:
Os artigos publicados não comprometem necessariamente o ponto de vista da REVISTA CHAKIÑAN. A revista se alinha a política da licencia de Creative Commons Reconocimiento-No comercial 4.0 Internacional (CC BY-NC 4.0). Cada autor conserva o direito sobre o artigo pulicado na Chakiñan.
Declaração de privacidade
Os dados pessoais e endereços de e-mail inseridos nesta revista serão usados exclusivamente para os fins declarados na publicação e não estarão disponíveis para nenhum outro objetivo ou pessoa
Como Citar
##plugins.generic.shariff.share##
Referências
Alton, L. (2017, December 1). How Millennials Think Differently About Online Security. Forbes. Retrieved from https://www.forbes.com/sites/larryalton/2017/12/01/how-millennials-think-differently-about-online-security/#51fba8da705f
Alzahrani, L., Al-Karaghouli, W. & Weerakkody, V. (2018). Investigating the impact of citizens’ trust toward the successful adoption of e-government: A multigroup analysis of gender, age, and internet experience. Information Systems Management, 35(2), 124-146. doi:10.1080/10580530.2018.1440730
Antoun, C. (2015). Who are the internet users, mobile internet users, and mobile-mostly internet users?: demographic differences across internet-use subgroups in the U.S. Mobile Research Methods: Opportunities and challenges of mobile research methodologies, 99-117. doi:10.5334/bar.g
Bergin, T. & Layne, N. (2016, May 20). Special Report: Cyber thieves exploit banks' faith in SWIFT transfer network. Reuters. Retrieved from https://www.reuters.com/article/us-cyber-heist-swift-specialreport/special-report-cyber-thieves-exploit-banks-faith-in-swift-transfer-network-idUSKCN0YB0DD
Bussa, T. (2000). The Future of Fighting Viruses: A History and Analysis of the Digital Immune System. Bethesda: SANS Institute. Retrieved from http://ivanlef0u.fr/repo/madchat/vxdevl/papers/avers/toby_bussa_gsec.pdf
Ceruzzi, P. E. (1981). The Early Computers of Konrad Zuse, 1935 to 1945. IEEE Annals of the History of Computing, 3(3), 241-262. doi:10.1109/mahc.1981.10034
Chamorro-Premuzic, T., Akhtar, R., Winsborough, D., & Sherman, R. A. (2017). The datafication of talent: how technology is advancing the science of human potential at work. Current Opinion in Behavioral Sciences, 18, 13-16. doi:10.1016/j.cobeha.2017.04.007
Cherapau, I., Muslukhov, I., Asanka, N. & Beznosov, K. (2015). On the Impact of Touch ID on iPhone Passcodes. Symposium on Usable Privacy and Security (SOUPS), 1-20. Retrieved from https://pdfs.semanticscholar.org/e021/f57012562610e8a997963995d00f5cde9b7d.pdf
Choo, K. R. (2011). The cyber threat landscape: Challenges and future research directions. Computers & Security, 30(8), 719-731. doi:10.1016/j.cose.2011.08.004
Deal, J. J., Altman, D. G. & Rogelberg, S. G. (2010). Millennials at Work: What We Know and What We Need to Do (If Anything). Journal of Business and Psychology, 25(1), 191-199. doi:10.1007/s10869-010-9177-2
Fingas, J. (2019). Ecuador says it faced 40 million cyberattacks after giving up Assange. Engadget. Retrieved from https://www.engadget.com/2019/04/16/ecuador-cyberattacks-after-assange-arrest/
Freiberger, P. A., Swaine, M. R. et al. (2020). Computer - History of computing. Encyclopaedia Britannica [electronic version]. New York, EU: Encyclopaedia Britannica Inc. Retrieved from https://www.britannica.com/technology/computer/History-of-computing
Greenberg, A. (2019). Hackers are passing around a megaleak of 2.2 billion records. Wired. Retrieved from https://www.wired.com/story/collection-leak-usernames-passwords-billions/
Hubbard, J. C. & Forcht, K. A. (1998). Computer viruses: how companies can protect their systems. Industrial Management & Data Systems, 98(1), 12-16. doi:10.1108/02635579810199708
Hunt, T. (2019). The 773 million record "Collection #1" data breach. Troy Hunt. Retrieved from https://www.troyhunt.com/the-773-million-record-collection-1-data-reach/
INEC. (2017). Hablando de Millennials. Quito: INEC. Retrieved from http://www.ecuadorencifras.gob.ec/documentos/web-inec/Inforgrafias-INEC/2017/millenials.pdf
Insurance Journal. (2016). Cyber Bank Thieves Stole $12M from Ecuador Bank in 2015, Using SWIFT System. Insurance Journal. Retrieved from https://www.insurancejournal.com/news/international/2016/05/24/409577.htm
International Telecommunication Union. (2012). Internet of Things Global Standards Initiative. ITU. Retrieved from https://www.itu.int/en/ITU-T/gsi/iot/Pages/default.aspx
ISO/IEC 27000. (2018). ISO/IEC 27000:2018(E): Information Technology - Security Techniques - Information Security Management Systems - Overview and Vocabulary. USA: ISO/IEC. Retrieved from https://www.sis.se/api/document/preview/80001198/
McKay, T. (2019). Ecuador Claims It's Been Hit with 40 Million Cyberattacks Since Giving Up Julian Assange. Gizmodo. Retrieved from https://gizmodo.com/ecuador-claims-its-been-hit-with-40-million-cyberattack-1834070219
Middleton, B. (2017). A History of Cyber Security Attacks: 1980 to Present. Boca Raton, FL: CRC Press.
Nachenberg, C. (1997). Computer virus-antivirus coevolution. Communications of the ACM, 40(1), 46-51. doi:10.1145/242857.242869
Nakashima, E. (2016, February 17). Apple vows to resist FBI demand to crack iPhone linked to San Bernardino attacks. The Washington Post. Retrieved from https://www.washingtonpost.com/world/national-security/us-wants-apple-to-help-unlock-iphone-used-by-san-bernardino-shooter/2016/02/16/69b903ee-d4d9-11e5-9823-02b905009f99_story.html
Nastiti, A. & Wimmer, A. (2015). Darknet, Social Media and Extremism: Addressing Indonesian Counterterrorism on the Internet. Deutsches Asienforschungszentrum Asian Series Commentaries, 30, 1-13. Retrieved from https://www.academia.edu/20813843/Darknet_Social_Media_nad_Extremism_Addressing_Indonesian_Counterterrorism_on_the_Internet
Ng, E. S. & Johnson, J. M. (2015). Millennials: who are they, how are they different, and why should we care? The Multi-generational and Aging Workforce, 121-137. doi:10.4337/9781783476589.00014
Palmer, D. (2019). PC security warning: That out-of-date software is putting you at risk. ZDnet. Retrieved from https://www.zdnet.com/article/pc-security-warning-that-out-of-date-software-is-putting-you-at-risk/
Rad, B. B., Masrom, M. & Ibrahim, S. (2010). Evolution of computer virus concealment and anti-virus techniques: a short survey. IJCSI International Journal of Computer Science Issues, 7(6), 113-121.
Rajab, M. A., Ballard, L., Mavrommatis, P., Provos, N. & Zhao, X. (2010). The nocebo effect on the web: an analysis of fake anti-virus distribution. Login, 35(6), 18-25. Retrieved from https://www.usenix.org/system/files/login/articles/rajab.pdf
Redacción Economía. (2017, May 17). Cuentas virtuales y servicios digitales son las nuevas tendencias que impulsa la banca. El Telégrafo, pp. 1-2. Retrieved from https://www.eltelegrafo.com.ec/noticias/economia/4/cuentas-virtuales-y-servicios-digitales-son-las-nuevas-tendencias-que-impulsa-la-banca
Rivadeneira, G. (2019, April 15). Ecuador ha recibido 40 millones de ataques cibernéticos, revela viceministro de Telecomunicaciones. El Universo, pp. 1-2. Retrieved from https://www.eluniverso.com/noticias/2019/04/15/nota/7287215/ecuador-ha-recibido-40-millones-ataques-ciberneticos-revela
Selim, H., Tayeb, S., Kim, Y., Zhan, J. & Pirouz, M. (2016). Vulnerability Analysis of Iframe Attacks on Websites. Proceedings of the The 3rd Multidisciplinary International Social Networks Conference on SocialInformatics 2016, Data Science 2016 - MISNC, SI, DS 2016. doi:10.1145/2955129.2955180
Smith, A. (2017). Americans and Cybersecurity. USA: Pew Research Center. Retrieved from https://www.pewinternet.org/2017/01/26/methodology-183/
Threatcloud. (2019). Live Cyber Attack Threat Map. Check Point. Retrieved from https://threatmap.checkpoint.com/ThreatPortal/livemap.html
Warner, M. (2012). Cybersecurity: A Pre-history. Intelligence and National Security, 27(5), 781-799. doi:10.1080/02684527.2012.708530
Williams, A. (2015, September 18). Move Over, Millennials, Here Comes Generation Z. The New York Times, pp. 1-7. https://www.nytimes.com/2015/09/20/fashion/move-over-millennials-here-comes-generation-z.html
Williams, J. (2014). What is anti-virus? OUCH! Retrieved from https://www.rwu.edu/sites/default/files/downloads/it/what_is_anti_virus.pdf