2022
DOI: 10.46377/dilemas.v9i3.3195
|View full text |Cite
|
Sign up to set email alerts
|

Hábitos y percepciones sobre Seguridad Informática en estudiantes universitarios pertenecientes a las generaciones Y, Z: Un estudio comparativo de dos universidades públicas en México.

Abstract: El presente estudio tiene como objetivo determinar cuáles son las similitudes y diferencias respecto a los hábitos y percepciones de seguridad informática de los estudiantes universitarios pertenecientes a las generaciones Y, Z. El estudio se realizó en dos universidades públicas. La investigación es de corte cuantitativo-comparativo, y se enfocó en estudiantes de la carrera de Tecnologías de la Información. Para el análisis de los datos, se utilizó el programa Jamovi y SPSS versión 24. Los resultados arrojan … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…López Mendoza, A., Roque Hernández, R. V., Prieto Quezada, Ma. T., and Salazar Hernández, R. [16] and Magano, J., Silva, C., Figueiredo, C., Vitória, A., Nogueira, T., and Pimenta Dinis, M. A. [17] state that, considering increasing Internet availability and the continuously growing number of internet-connected devices, the cybersecurity of HEIs must be ensured.…”
Section: Cybersecurity and Higher Educationmentioning
confidence: 99%
See 1 more Smart Citation
“…López Mendoza, A., Roque Hernández, R. V., Prieto Quezada, Ma. T., and Salazar Hernández, R. [16] and Magano, J., Silva, C., Figueiredo, C., Vitória, A., Nogueira, T., and Pimenta Dinis, M. A. [17] state that, considering increasing Internet availability and the continuously growing number of internet-connected devices, the cybersecurity of HEIs must be ensured.…”
Section: Cybersecurity and Higher Educationmentioning
confidence: 99%
“…These institutions are key cells in the growth of a network that involves most of those who conduct some academic activities (e.g., professors, students, and administrators). In their study, the authors [16] & [17] mention that teachinglearning processes could be obstructed if certain services, particularly "electronic university" services, are affected, thereby breaching the contract with users when charging fees for any service. Furthermore, obstructing such processes could cause material and moral damage.…”
Section: Cybersecurity and Higher Educationmentioning
confidence: 99%