Analysis of cybersecurity competence in teachers in virtual environments at an IST in Guayas

Authors

DOI:

https://doi.org/10.18779/ingenio.v8i2.981

Keywords:

cybersecurity, virtual educational environments, cybercrime, Technological Higher Institute, cyber threat

Abstract

This research explores how human negligence influences the success of cyberattacks, considering it the weakest link in information security. With the rise of virtual education in educational institutions, cybersecurity risks have increased due to the exposure of systems and sensitive data. The study assesses the cybersecurity knowledge of teachers at a private Higher Technological Institute (HTI) in Guayas, identifying security gaps without proposing improvements. It employed a descriptive and quantitative approach with a survey validated by cybersecurity experts and applied to 61 teachers. The results showed satisfactory knowledge of cybersecurity concepts and good practices, such as physical access control and the use of strong passwords. However, areas for improvement were identified in recognizing threats such as phishing and ransomware, highlighting the need for specialized training to strengthen defenses against these evolving threats.

Downloads

Download data is not yet available.

References

B. J. Blazic, "The cybersecurity labour shortage in Europe: Moving to a new concept for education and training", Technol. Soc., vol. 67, pp. 101769, nov. 2021. [Online]. Available: https://doi.org/10.1016/j.techsoc.2021.101769

P. Zaqueu, and T. Mawela, "Factors Contributing to Cybersecurity Awareness, Education and Training", in Proceedings of NEMISA Digital Skills Conference 2023: Scaling Data Skills For Multidisciplinary Impact, pp. 69-58, 2023. [Online]. Available: https://doi.org/10.29007/l4ph

M. Adams, and M. Makramalla, "Cybersecurity Skills Training: An Attacker-Centric Gamified Approach", Technol. Innov. Manag. Rev, vol. 5, no. 1, pp. 5-14, jan. 2015. [Online]. Available: https://goo.su/7yRWF2

"Cómo proteger tus datos en línea usando un gestor de contraseñas", Kaspersky, 2023. [En línea]. Disponible en: https://goo.su/eVse

"Check Point Research: Third quarter of 2022 reveals increase in cyberattacks and unexpected developments in global trends", Check Point Research Team, 2022. [Online]. Available: https://goo.su/h3XVxzR

A. Brilingaite, L. Bukauskas, and A. Juozapavicius, "A framework for competence development and assessment in hybrid cybersecurity exercises", Comput. Secur., vol. 88, pp. 101607, jan. 2020. [Online]. Available: https://doi.org/10.1016/j.cose.2019.101607

A. A. Garba, F. Jeribi, I. Al-Shourbaji, M. Alhameed, F. Reegu, and S. Alim, "An Approach To Weigh Cybersecurity Awareness Questions In Academic Institutions Based On Principle Component Analysis: A Case Study Of Saudi Arabia", vol. 10 no. 4, apr. 2021. [Online]. Available: https://goo.su/oQWyONS

I. L. Suarez Cruz, A. Escobar Díaz, y H. Vacca González, "Unidades de climatización para centro de datos", Rev. Vínculos, vol. 16, no. 1, pp. 128-147, jun. 2019. [En línea]. Disponible en: https://doi.org/10.14483/2322939X.15273

Z. Yan, Y. Xue, and Y. Lou, "Risk and protective factors for intuitive and rational judgment of cybersecurity risks in a large sample of K-12 students and teachers", Comput. Hum. Behav., vol. 121, pp. 106791, aug. 2021. [Online]. Available: https://doi.org/10.1016/j.chb.2021.106791.

M. J. Garrido Antón, y Á. García-Collantes, "El impacto de las tecnologías de la información y la comunicación en la educación. La importancia de la formación, la información y la sensibilización", Rev. Tecnol. Cienc. y Educ, pp. 155-182, jan. 2022. [En línea]. Disponible en: https://doi.org/10.51302/tce.2022.660

"Sector de Desarrollo de la UIT: Fomento de la transformación digital mundial", ITU, 2023. [En línea]. Disponible en: https://goo.su/N4wULz

W. J. Triplett, "Addressing Cybersecurity Challenges in Education", Int. J. STEM Educ. Sustain., vol. 3, no. 1, pp. 47-67, jan. 2023. [Online]. Available: https://goo.su/XfFB

"Plan Nacional de Telecomunicaciones y Tecnologías de Información del Ecuador 2022-2025", Ministerio de Telecomunicaciones y de la Sociedad de la Información, 2021. [En línea]. Disponible en: https://goo.su/XYhESem

M. Khader, M. Karam, and H. Fares, "Cybersecurity Awareness Framework for Academia", Information, vol. 12, no. 10, pp. 417, oct, 2021. [Online]. Available: https://doi.org/10.3390/info12100417.

L. Kraus, V. Švábenský, M. Horák, V. Matyás, J. Vykopal, and P. Celeda, "Want to Raise Cybersecurity Awareness? Start with Future IT Professionals", en Proceedings of the 2023 Conference on Innovation and Technology in Computer Science Education V. 1, Turku Finland: ACM, jun, 2023, pp. 236-242. [Online]. Available: https://doi.org/10.1145/3587102.3588862.

A. Nagarajan, J. M. Allbeck, A. Sood, and T. L. Janssen, "Exploring game design for cybersecurity training", in 2012 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER), Bangkok: IEEE, may 2012, pp. 256-262. [Online]. Available: https://doi.org/10.1109/CYBER.2012.6392562.

M. Choi, "The Role of User Computer Self-Efficacy, Cybersecurity Countermeasures Awareness, and Cybersecurity Skills Influence on Computer Misuse", in Proceedings of the Eighth Pre-ICIS Workshop on Information Security and Privacy, Milano, December 14, 2013. [Online]. Available: https://goo.su/rHNoJrr

I. Pedrosa, J. Juarros-Basterretxea, A. Robles-Fernández, J. Basteiro, y E. García-Cueto, "Pruebas de bondad de ajuste en distribuciones simétricas, ¿qué estadístico utilizar?", Univ. Psychol., vol. 14, no. 1, oct. 2014. [En línea]. Disponible en: https://doi.org/10.11144/Javeriana.upsy14-1.pbad

Published

2025-07-04

How to Cite

Estacio Corozo, K. L. (2025). Analysis of cybersecurity competence in teachers in virtual environments at an IST in Guayas. InGenio Journal, 8(2), 66–81. https://doi.org/10.18779/ingenio.v8i2.981

Issue

Section

Articles