Analysis of cybersecurity competence in teachers in virtual environments at an IST in Guayas
DOI:
https://doi.org/10.18779/ingenio.v8i2.981Keywords:
cybersecurity, virtual educational environments, cybercrime, Technological Higher Institute, cyber threatAbstract
This research explores how human negligence influences the success of cyberattacks, considering it the weakest link in information security. With the rise of virtual education in educational institutions, cybersecurity risks have increased due to the exposure of systems and sensitive data. The study assesses the cybersecurity knowledge of teachers at a private Higher Technological Institute (HTI) in Guayas, identifying security gaps without proposing improvements. It employed a descriptive and quantitative approach with a survey validated by cybersecurity experts and applied to 61 teachers. The results showed satisfactory knowledge of cybersecurity concepts and good practices, such as physical access control and the use of strong passwords. However, areas for improvement were identified in recognizing threats such as phishing and ransomware, highlighting the need for specialized training to strengthen defenses against these evolving threats.
Downloads
References
B. J. Blazic, "The cybersecurity labour shortage in Europe: Moving to a new concept for education and training", Technol. Soc., vol. 67, pp. 101769, nov. 2021. [Online]. Available: https://doi.org/10.1016/j.techsoc.2021.101769
P. Zaqueu, and T. Mawela, "Factors Contributing to Cybersecurity Awareness, Education and Training", in Proceedings of NEMISA Digital Skills Conference 2023: Scaling Data Skills For Multidisciplinary Impact, pp. 69-58, 2023. [Online]. Available: https://doi.org/10.29007/l4ph
M. Adams, and M. Makramalla, "Cybersecurity Skills Training: An Attacker-Centric Gamified Approach", Technol. Innov. Manag. Rev, vol. 5, no. 1, pp. 5-14, jan. 2015. [Online]. Available: https://goo.su/7yRWF2
"Cómo proteger tus datos en línea usando un gestor de contraseñas", Kaspersky, 2023. [En línea]. Disponible en: https://goo.su/eVse
"Check Point Research: Third quarter of 2022 reveals increase in cyberattacks and unexpected developments in global trends", Check Point Research Team, 2022. [Online]. Available: https://goo.su/h3XVxzR
A. Brilingaite, L. Bukauskas, and A. Juozapavicius, "A framework for competence development and assessment in hybrid cybersecurity exercises", Comput. Secur., vol. 88, pp. 101607, jan. 2020. [Online]. Available: https://doi.org/10.1016/j.cose.2019.101607
A. A. Garba, F. Jeribi, I. Al-Shourbaji, M. Alhameed, F. Reegu, and S. Alim, "An Approach To Weigh Cybersecurity Awareness Questions In Academic Institutions Based On Principle Component Analysis: A Case Study Of Saudi Arabia", vol. 10 no. 4, apr. 2021. [Online]. Available: https://goo.su/oQWyONS
I. L. Suarez Cruz, A. Escobar Díaz, y H. Vacca González, "Unidades de climatización para centro de datos", Rev. Vínculos, vol. 16, no. 1, pp. 128-147, jun. 2019. [En línea]. Disponible en: https://doi.org/10.14483/2322939X.15273
Z. Yan, Y. Xue, and Y. Lou, "Risk and protective factors for intuitive and rational judgment of cybersecurity risks in a large sample of K-12 students and teachers", Comput. Hum. Behav., vol. 121, pp. 106791, aug. 2021. [Online]. Available: https://doi.org/10.1016/j.chb.2021.106791.
M. J. Garrido Antón, y Á. García-Collantes, "El impacto de las tecnologías de la información y la comunicación en la educación. La importancia de la formación, la información y la sensibilización", Rev. Tecnol. Cienc. y Educ, pp. 155-182, jan. 2022. [En línea]. Disponible en: https://doi.org/10.51302/tce.2022.660
"Sector de Desarrollo de la UIT: Fomento de la transformación digital mundial", ITU, 2023. [En línea]. Disponible en: https://goo.su/N4wULz
W. J. Triplett, "Addressing Cybersecurity Challenges in Education", Int. J. STEM Educ. Sustain., vol. 3, no. 1, pp. 47-67, jan. 2023. [Online]. Available: https://goo.su/XfFB
"Plan Nacional de Telecomunicaciones y Tecnologías de Información del Ecuador 2022-2025", Ministerio de Telecomunicaciones y de la Sociedad de la Información, 2021. [En línea]. Disponible en: https://goo.su/XYhESem
M. Khader, M. Karam, and H. Fares, "Cybersecurity Awareness Framework for Academia", Information, vol. 12, no. 10, pp. 417, oct, 2021. [Online]. Available: https://doi.org/10.3390/info12100417.
L. Kraus, V. Švábenský, M. Horák, V. Matyás, J. Vykopal, and P. Celeda, "Want to Raise Cybersecurity Awareness? Start with Future IT Professionals", en Proceedings of the 2023 Conference on Innovation and Technology in Computer Science Education V. 1, Turku Finland: ACM, jun, 2023, pp. 236-242. [Online]. Available: https://doi.org/10.1145/3587102.3588862.
A. Nagarajan, J. M. Allbeck, A. Sood, and T. L. Janssen, "Exploring game design for cybersecurity training", in 2012 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER), Bangkok: IEEE, may 2012, pp. 256-262. [Online]. Available: https://doi.org/10.1109/CYBER.2012.6392562.
M. Choi, "The Role of User Computer Self-Efficacy, Cybersecurity Countermeasures Awareness, and Cybersecurity Skills Influence on Computer Misuse", in Proceedings of the Eighth Pre-ICIS Workshop on Information Security and Privacy, Milano, December 14, 2013. [Online]. Available: https://goo.su/rHNoJrr
I. Pedrosa, J. Juarros-Basterretxea, A. Robles-Fernández, J. Basteiro, y E. García-Cueto, "Pruebas de bondad de ajuste en distribuciones simétricas, ¿qué estadístico utilizar?", Univ. Psychol., vol. 14, no. 1, oct. 2014. [En línea]. Disponible en: https://doi.org/10.11144/Javeriana.upsy14-1.pbad
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Karen Estacio

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Licensing Agreement
This journal provides free access to its content through its website following the principle that making research available free of charge to the public supports a larger exchange of global knowledge.
Web content of the journal is distributed under a Attribution-NonCommercial-ShareAlike 4.0 International.
Authors may adopt other non-exclusive license agreements for the distribution of the version of the published work, provided that the initial publication in this journal is indicated. Authors are allowed and recommended to disseminate their work through the internet before and during the submission process, which can produce interesting exchanges and increase citations of the published work.

