<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1405-7743</journal-id>
<journal-title><![CDATA[Ingeniería, investigación y tecnología]]></journal-title>
<abbrev-journal-title><![CDATA[Ing. invest. y tecnol.]]></abbrev-journal-title>
<issn>1405-7743</issn>
<publisher>
<publisher-name><![CDATA[Universidad Nacional Autónoma de México, Facultad de Ingeniería]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1405-77432014000400009</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Validity and Reliability in the Assessment of the Vulnerability of Social Networks]]></article-title>
<article-title xml:lang="es"><![CDATA[Validez y confiabilidad en la evaluación de la vulnerabilidad de las redes sociales]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Orantes-Jiménez]]></surname>
<given-names><![CDATA[Sandra Dinora]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Vázquez-Álvarez]]></surname>
<given-names><![CDATA[Graciela]]></given-names>
</name>
<xref ref-type="aff" rid="A02"/>
</contrib>
</contrib-group>
<aff id="A01">
<institution><![CDATA[,Instituto Politécnico Nacional Centro de Investigación en Computación ]]></institution>
<addr-line><![CDATA[México Distrito Federal]]></addr-line>
<country>México</country>
</aff>
<aff id="A02">
<institution><![CDATA[,Instituto Politécnico Nacional Escuela Superior de Ingeniería Mecánica y Eléctrica ]]></institution>
<addr-line><![CDATA[México Distrito Federal]]></addr-line>
<country>México</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>12</month>
<year>2014</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>12</month>
<year>2014</year>
</pub-date>
<volume>15</volume>
<numero>4</numero>
<fpage>585</fpage>
<lpage>592</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1405-77432014000400009&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1405-77432014000400009&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1405-77432014000400009&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Nowadays, measuring the impact and effectiveness of Social Networks is important for people who use them in an individual manner, due to social or academic interests, as well as for companies that use them to evaluate or promote their products and businesses. Particularly, it is necessary to monitor and evaluate qualitatively and quantitatively, if possible, this tool that is used for the dissemination of information of any kind. We have tried to create an instrument that aims to validate the reliability of social networks, taking Facebook our case study because it is one of the most widely used currently. This instrument is a tool that measures the "information vulnerability"; information that people decide to upload to the Internet as part of a social network. Regarding validity, a suitable solution focused on four factors was found: legality (self-regulation), social factors, psychological factors, and finally technology. It was concluded that the proposed mechanism can be a useful instrument that detects the information vulnerability storage in each social network.]]></p></abstract>
<abstract abstract-type="short" xml:lang="es"><p><![CDATA[En la actualidad, la medición del impacto y la eficacia de las redes sociales es importante para las todas las personas que los emplean de manera individual, ya sea por intereses sociales o académicos, de igual manera es fundamental para las empresas que los utilizan para evaluar o promocionar sus productos y negocios. En particular, es necesario monitorear y evaluar cualitativa y cuantitativamente, de ser posible, la herramienta que se utiliza para la difusión de información. Se ha tratado de crear un instrumento que tiene como objetivo validar la fiabilidad de las redes sociales, tomando Facebook como caso de estudio, por considerarse una de las más utilizadas hoy en día. Este instrumento es una herramienta a manera de modelo, que mide la "vulnerabilidad de la información" que las personas deciden subir a Internet como parte de una red social. En cuanto a la validez, se encontró una solución adecuada centrada en cuatro factores: legalidad (autorregulación), aspectos sociales, aspectos psicológicos, y aspectos tecnológicos. Se concluyó que el mecanismo propuesto puede ser un instrumento útil que detecta la vulnerabilidad de la información almacenada en una red social.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[social networks]]></kwd>
<kwd lng="en"><![CDATA[reliability]]></kwd>
<kwd lng="en"><![CDATA[vulnerability]]></kwd>
<kwd lng="en"><![CDATA[validity]]></kwd>
<kwd lng="en"><![CDATA[self-regulation]]></kwd>
<kwd lng="es"><![CDATA[redes sociales]]></kwd>
<kwd lng="es"><![CDATA[fiabilidad]]></kwd>
<kwd lng="es"><![CDATA[vulnerabilidad]]></kwd>
<kwd lng="es"><![CDATA[validez]]></kwd>
<kwd lng="es"><![CDATA[autorregulación]]></kwd>
</kwd-group>
</article-meta>
</front><body><![CDATA[  	    <p align="center"><font face="verdana" size="4"><b>Validity and Reliability in the Assessment of the Vulnerability of</b> <b>Social Networks</b></font></p>      <p align="center"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="center"><font face="verdana" size="3"><b>Validez y confiabilidad en la evaluaci&oacute;n de la vulnerabilidad de las redes sociales</b></font></p>      <p align="center"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="center"><font face="verdana" size="2"><b>Orantes&#45;Jim&eacute;nez Sandra Dinora<sup>1</sup>, V&aacute;zquez&#45;&Aacute;lvarez Graciela<sup>2</sup></b></font></p>  	    <p align="left"><font face="verdana" size="2">    <br> 	<sup><i>1</i></sup> <i>Centro de Investigaci&oacute;n en Computaci&oacute;n, Instituto Polit&eacute;cnico Nacional, M&eacute;xico. E&#45;mail:</i> <a href="mailto:dinora@cic.ipn.mx">dinora@cic.ipn.mx</a>,</font></p>  	    <p align="left"><font face="verdana" size="2"><sup><i>2</i></sup> <i>Escuela Superior de Ingenier&iacute;a Mec&aacute;nica y El&eacute;ctrica, Instituto Polit&eacute;cnico Nacional, M&eacute;xico. E&#45;mail:</i> <a href="mailto:gravazquez@hotmail.com">gravazquez@hotmail.com</a>, <a href="mailto:gvazqueza@ipn.mx">gvazqueza@ipn.mx</a></font></p>  	    <p align="center"><font face="verdana" size="2">&nbsp;</font></p>  	    ]]></body>
<body><![CDATA[<p align="left"><font face="verdana" size="2">Information on the article: received: March 2013    <br> 	Reevaluated: March and June 2013    <br> 	Accepted: August 2013</font></p>      <p align="left"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2"><b>Abstract</b></font></p>  	    <p align="justify"><font face="verdana" size="2">Nowadays, measuring the impact and effectiveness of Social Networks is important for people who use them in an individual manner, due to social or academic interests, as well as for companies that use them to evaluate or promote their products and businesses. Particularly, it is necessary to monitor and evaluate qualitatively and quantitatively, if possible, this tool that is used for the dissemination of information of any kind. We have tried to create an instrument that aims to validate the reliability of social networks, taking Facebook our case study because it is one of the most widely used currently. This instrument is a tool that measures the "information vulnerability"; information that people decide to upload to the Internet as part of a social network. Regarding validity, a suitable solution focused on four factors was found: legality (self&#45;regulation), social factors, psychological factors, and finally technology. It was concluded that the proposed mechanism can be a useful instrument that detects the information vulnerability storage in each social network.</font></p>  	    <p align="justify"><font face="verdana" size="2"><b>Keywords:</b> social networks, reliability, vulnerability, validity, self&#45;regulation.</font></p>  	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2"><b>Resumen</b></font></p>  	    <p align="justify"><font face="verdana" size="2">En la actualidad, la medici&oacute;n del impacto y la eficacia de las redes sociales es importante para las todas las personas que los emplean de manera individual, ya sea por intereses sociales o acad&eacute;micos, de igual manera es fundamental para las empresas que los utilizan para evaluar o promocionar sus productos y negocios. En particular, es necesario monitorear y evaluar cualitativa y cuantitativamente, de ser posible, la herramienta que se utiliza para la difusi&oacute;n de informaci&oacute;n. Se ha tratado de crear un instrumento que tiene como objetivo validar la fiabilidad de las redes sociales, tomando Facebook como caso de estudio, por considerarse una de las m&aacute;s utilizadas hoy en d&iacute;a. Este instrumento es una herramienta a manera de modelo, que mide la "vulnerabilidad de la informaci&oacute;n" que las personas deciden subir a Internet como parte de una red social. En cuanto a la validez, se encontr&oacute; una soluci&oacute;n adecuada centrada en cuatro factores: legalidad (autorregulaci&oacute;n), aspectos sociales, aspectos psicol&oacute;gicos, y aspectos tecnol&oacute;gicos. Se concluy&oacute; que el mecanismo propuesto puede ser un instrumento &uacute;til que detecta la vulnerabilidad de la informaci&oacute;n almacenada en una red social.</font></p>  	    ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2"><b>Descriptores:</b> redes sociales, fiabilidad, vulnerabilidad, validez, autorregulaci&oacute;n.</font></p>  	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2"><b>Introduction</b>    <br></font></p>  	    <p align="justify"><font face="verdana" size="2">This study intends to validate the reliability of an instrument to measure the vulnerability of the information in social networks. This is due to the fact that during adolescence and youth, individuals require more approval from other people of the same age and communicate with them, and this is when they are most interested in belonging to a social network. Thus, in many cases, they show personal information that makes them easy targets for other people, who use these means of socializing for their own benefit, almost of any kind.</font></p>  	    <p align="justify"><font face="verdana" size="2">Owning to the importance that Information Technology has reached in recent years, and in particular social networks, people with other interests have also joined them, causing a rush of information and emotional situations that create social influences.</font></p>  	    <p align="justify"><font face="verdana" size="2">By 2011, in Mexico, the use of Information Technology at homes (INEGI, 2011) has shown considerable growth, facilitating access to Internet contents such as social networks. In addition, companies have been influenced and supported by Information Technology and have realized the importance of belonging to the most consulted and used social networks in Mexico.</font></p>  	    <p align="justify"><font face="verdana" size="2">However, behind this boom of dissemination and use of information in social networks, there is a problem with self&#45;regulation that handles the media, and causes information to be vulnerable and to be misused by people or organizations without scruples.</font></p>  	    <p align="justify"><font face="verdana" size="2">Reliability can be defined as the ability of a product to perform its function as intended previously. In other words, the reliability can also be defined as the probability that a product will perform its intended function, without incidents during a specified period of time under indicated conditions. Running a reliability analysis on a product or on a system should include many types of tests, in order to determine the reliability of the intended product or system, to be analyzed.</font></p>  	    <p align="justify"><font face="verdana" size="2">For our case study, once the analyses are made, it is possible to predict the effects, changes and corrections in storage and handle the information that users provide within the social network. Several studies concerning social networks are related, linked and examined jointly, in order to determine their reliability under all possible perspectives, identifying potential problems, suggesting corrections, changes or improvements.</font></p>  	    ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2">Nowadays, the importance of social networks in order to obtain emotional stability and social skills in the development of young people, is high. However, due to the misuse of information in these networks, there are socio&#45;emotional problems, and later anxiety and depression. These could determine unpleasant outcomes such as suicide.</font></p>  	    <p align="justify"><font face="verdana" size="2">Moreover, companies know that social networks are very important tools for their business. However, they also know that there is insecurity and misuse of information that can affect them negatively. Therefore, in this context, the opportune detection of vulnerable information found in social networks becomes a priority, and the problem can be faced successfully, with proper management strategies and skills.</font></p>  	    <p align="justify"><font face="verdana" size="2">In Mexico there is no reliable and validated tool, capable of detecting the levels of information vulnerability in social networks. Our suggestion is:</font></p>  	    <blockquote> 		    <p align="justify"><font face="verdana" size="2">1 ) &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Determine the variance proportion of the original data that the instrument explains from a proposed model.</font></p>  		    <p align="justify"><font face="verdana" size="2">2 ) &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Evaluate the content validity of this instrument.</font></p>  		    <p align="justify"><font face="verdana" size="2">3 ) &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Evaluate the internal consistency of this instrument.</font></p> 	</blockquote>  	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2"><b>Problem</b></font></p>  	    <p align="justify"><font face="verdana" size="2">There are a number of features that make social networks more or less vulnerable to information misuse, thereby affecting their users and in some cases hurting youngsters intellectually, emotionally and socially. In Mexico, there are no reliable and validated instruments to assess the information vulnerability in social networks. This research proposes a reliable and valid tool to measure the vulnerability of information contained in social networks.  Assuming that this vulnerability is associated with the improper use of certain regulations, according to the information contained in these web sites with little or low security, this allows a third&#45;party with proper technology to reach this information and use it improperly or incorrectly.</font></p>  	    ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2"><b>Main objective</b></font></p>  	    <p align="justify"><font face="verdana" size="2">This research aims to validate the reliability of an instrument to measure information vulnerability stored in social networks.</font></p>  	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2"><b>Conceptualization and Social Network analysis</b></font></p>  	    <p align="justify"><font face="verdana" size="2">The term social network refers to a structure and joint interconnected relationships (Mitchell, 1969). However, the term "social network" also refers to Internet platforms and with Social Network Analysis, and thanks to existing means it is possible to obtain several statements about this. In social networks, the social nature of the network is modelled as a graph of interconnected nodes.</font></p>  	    <p align="justify"><font face="verdana" size="2">Consequently, the applicable rules to the measurement of directed graphs can be applied to this network of nodes, and the degree of a node can be calculated by adding all input and output edges or counting each edge just once. In addition, as a part of Social Network Analysis, the density of a network can be measured. This network is limited by the maximum number of edges that may exist.</font></p>  	    <p align="justify"><font face="verdana" size="2">The greater the density on a network, the stronger the awareness among participants (Wellmann, 1981); additionally, it is also possible to calculate the local density in a subnet. First, define an actor and this provides a measure that describes the ratio between the real connections and all possible connections with other actors. Other interesting indicators are centrality measures defined by Freemann (1979) showing the popularity on the network.</font></p>  	    <p align="justify"><font face="verdana" size="2">Furthermore, based on graph theory, it is possible to map a social network as a graph. In the same way, the information, trends and preferences of the members of the network can be recovered.</font></p>  	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2"><b>Methodology</b></font></p>  	    <p align="justify"><font face="verdana" size="2">Type of study</font></p>  	    <p align="justify"><font face="verdana" size="2">A descriptive study was conducted with a quantitative methodology, through a questionnaire with the intention of a measuring &lsquo;the vulnerability of information in social networks&rsquo;, validating it and considering it reliable.</font></p>  	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2">Population</font></p>  	    <p align="justify"><font face="verdana" size="2">The population consisted of a group of male and female students from the first senior level semester from the School of Mechanical and Electrical Engineering (ESIME, Escuela Superior de Ingenier&iacute;a Mec&aacute;nica y El&eacute;ctrica) of the National Polytechnic Institute (IPN, Instituto Polit&eacute;cnico Nacional) in Mexico.</font></p>  	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2">Sample</font></p>  	    <p align="justify"><font face="verdana" size="2">A probability sample was chosen considering a confidence level of 95&#37; with an estimation error of 5&#37;. The sample included 160 students of both levels. Finally, 90 subjects (56.25&#37;) of the total sample answered the questionnaire.</font></p>  	    <p align="justify"><font face="verdana" size="2">Of these, 37 (23.13&#37; of the total sample) were females and 63 (39.38&#37; of the total sample) were males and their ages ranged between 18 and 26 years.</font></p>  	    ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2"><b>Instrument</b></font></p>  	    <p align="justify"><font face="verdana" size="2">The questionnaire "vulnerability of information" was developed taking into account the technological, social, psychological and legal dimensions. This was based on the proposal of coping with information loss, arguing that there are individuals with personal and social characteristics, who are dedicated to investigate the vulnerability of social networks to extract information, in order to use it for other purposes. This questionnaire originally consisted of 39 items divided into: information risk (20 items), security strength of social networks (13 items) and social reaction from the misuse of information (6 items).</font></p>  	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2"><b>Procedure for data collection</b></font></p>  	    <p align="justify"><font face="verdana" size="2">Using the program SPSS v.10 (SPSS, 2011), a probabilistic study was conducted in which we chose a sample size of 100, just randomly applied to a group of male and female students from the first semester of senior level within the School of Mechanical and Electrical Engineering (ESIME, Escuela Superior de Ingenier&iacute;a Mec&aacute;nica y El&eacute;ctrica) of the National Polytechnic Institute (IPN, Instituto Polit&eacute;cnico Nacional) in Mexico. Their ages ranged between 18 and 26 years, considering that it is the young who are now in the majority of social networks users.</font></p>  	    <p align="justify"><font face="verdana" size="2">Later, students inside the school were asked for their voluntary research cooperation, ensuring data confidentiality.</font></p>  	    <p align="justify"><font face="verdana" size="2">A factorial analysis was performed on data obtained from the original questionnaire to identify main components grouped in items. After identifying the components, we proceeded to a content analysis for the factors conceptualization and the theoretical items analysis. This allowed us to evaluate the content validity. Lastly, the reliability of the questionnaire was determined by the response consistency of the items. It was answered with a 5&#45;point Likert scale (M&eacute;ndez y Pe&ntilde;a, 2007), ranging from strongly disagree to strongly agree (as shown in <a href="#t1">Table 1</a>). A strongly agree response corresponded to a value of 1 and 5 to a strongly disagree response.</font></p>  	    <p align="center"><font face="verdana" size="2"><a name="t1"></a></font></p>  	    <p align="center"><font face="verdana" size="2"><img src="/img/revistas/iit/v15n4/a9t1.jpg"></font></p>  	    ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2">All items were written positively, so that, a higher score means greater vulnerability.</font></p>  	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2"><b>Communalities Results</b></font></p>  	    <p align="justify"><font face="verdana" size="2">"Commonality" is the name for the variance proportion explained by the common factors in a variable. The commonality (h<sup>2</sup>) is the sum of the squared factor weights in each row.</font></p>  	    <p align="justify"><font face="verdana" size="2">Factor analysis (Repositorio Institucional de la Universidad&nbsp; de Alicante, 2013) begins its calculations based on what it is known as reduced matrix composed by the correlation coefficients between the variables and commonalities in the diagonal.</font></p>  	    <p align="justify"><font face="verdana" size="2">As communality cannot be found until the factors are known, it is one of the problems of factor analysis. Since the Principal Component Analysis does not assume the existence of any common factor, the communality takes 1 as an initial value. Other methods are used in different ways to estimate the initial commonality:</font></p>  	    <blockquote> 		    <p align="justify"><font face="verdana" size="2">&bull;  Estimating the highest correlation commonality in the <i>i</i>&#45;th row of the correlation matrix.</font></p>  		    <p align="justify"><font face="verdana" size="2">&bull;  Considering the commonality as the square of the multiple correlation coefficients between <i>x</i> and other variables. (SPSS gives it by default).</font></p>  		    <p align="justify"><font face="verdana" size="2">&bull;  The average of correlation coefficients of a variable with all others.</font></p>  		    ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2">&bull;  Calculating from the two highest correlation coefficients of that variable, the following operation:</font></p>  		    <p align="center"><font face="verdana" size="2"><img src="/img/revistas/iit/v15n4/a9e1.jpg"></font></p> 	</blockquote>  	    <p align="left"><font face="verdana" size="2">The final commonality of each variable is given by:</font></p>  	    <p align="center"><font face="verdana" size="2">&nbsp;&nbsp;&nbsp;<img src="/img/revistas/iit/v15n4/a9e2.jpg"></font></p>  	    <p align="justify"><font face="verdana" size="2">Communalities of the variables (items) were estimated by the extraction method named Principal Components. This analysis considered acceptable those items that had communalities above 0.3 an overall there were 23 of the 39 that met this condition. Items 5, 7 and 9 were better explained by the obtained factor model as the variance percentages were 60.8&#37;, 60.8&#37; and 60.6&#37;, respectively. Items 10, 3 and 14 were the least explained as the single factor model can only reproduce 29.5&#37;, 32.5&#37;, and 32.5&#37; respectively, of its original variability (see <a href="/img/revistas/iit/v15n4/a9t2.jpg" target="_blank">Table 2</a>).</font></p>  	    <p align="justify"><font face="verdana" size="2">Factor 1 (Legality (self&#45;regulation)), Factor 2 (Social Aspects), Factor 3 (Psychological Aspects) and Factor 4 (Technology) these factors explain 44.5&#37; of the total variance from the original data. It is observed that the first component explains 21.8&#37; of the variance; whereas the rest of the components explain 22.7&#37; of the variance (see <a href="#t3">Table 3</a>).</font></p>  	    <p align="center"><font face="verdana" size="2"><a name="t3"></a></font></p>  	    <p align="center"><font face="verdana" size="2"><img src="/img/revistas/iit/v15n4/a9t3.jpg"></font></p>  	    <p align="justify"><font face="verdana" size="2">Subsequently, the matrix of factorial structure was created, where the items are grouped in each of four factors. Variables were grouped into components according to the following criterion: factor loads greater than 0.3. In the case of the variables that were filled in two or more factors, these were grouped in the most factorial load factor and those corresponded to the conceptual component (see <a href="/img/revistas/iit/v15n4/a9t4.jpg" target="_blank">Table 4</a>).</font></p>  	    <p align="justify"><font face="verdana" size="2">a. (Factor 1) Legality (self&#45;regulation), (Factor 2) social aspects, (Factor 3) psychological aspects and (Factor4) technology.</font></p>  	    ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2">The factors were conceptualized as follows: Legality (self&#45;regulation) (Factor 1), social aspects (Factor 2), psychological aspects (Factor 3) and technology (Factor 4). After analyzing the validity of the items, in the proposed questionnaire a clear definition of the factors and indicators classified within each was obtained (see <a href="/img/revistas/iit/v15n4/a9t5.jpg" target="_blank">Table 5</a>).</font></p>  	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2"><b>Reliability analysis</b></font></p>  	    <p align="justify"><font face="verdana" size="2">Due to its high sensitivity, Cronbach&rsquo;s alpha (Cronbach, 1951) was used for detecting measurement error sources that are attributable to the sampling of situational factors.</font></p>  	    <p align="justify"><font face="verdana" size="2"><a href="#t6">Table 6</a> presents the reliability indexes corresponding to each of the four major factors. These four reliability indexes can be considered acceptable according to Hernandez, Fernandez and Baptista (Hern&aacute;ndez <i>et al</i>., 2006), since the highest theoretical value of alpha is 1, 0.80 is generally considered an acceptable value, therefore the high the value of alpha, increases reliability (Bogliaccini <i>et al</i>., 2005).</font></p>  	    <p align="center"><font face="verdana" size="2"><a name="t6"></a></font></p>  	    <p align="center"><font face="verdana" size="2"><img src="/img/revistas/iit/v15n4/a9t6.jpg"></font></p>  	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2"><b>Results</b></font></p>  	    <p align="justify"><font face="verdana" size="2">Regarding the content validity of the evaluated questionnaire, a suitable factor solution with four factors that explain up 44.5&#37; of the variance of the measured construct was found; in this case, the vulnerability of information on social networks.</font></p>  	    ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2">The percentage of the obtained variance, although not satisfactory, represents an important step in validating the questionnaire, considering the novelty of the context in which it was applied.</font></p>  	    <p align="justify"><font face="verdana" size="2">According to the obtained responses, the possible merger of two factors, social and psychological aspects, was observed, because psychological aspects increase the social aspects.</font></p>  	    <p align="justify"><font face="verdana" size="2">On the other hand, it is possible to adapt and validate measurement questionnaires on information vulnerability as needed, in the case of social networks.</font></p>  	    <p align="justify"><font face="verdana" size="2">The reliability indexes of each information vulnerability questionnaire scales on social networks can be considered as satisfactory.</font></p>  	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2"><b>Conclusions</b></font></p>  	    <p align="justify"><font face="verdana" size="2">Nowadays, the importance of social networks is undeniable and they will continue to be valid in an immediate future. The obtained results for this sample show that the questionnaire could be very useful for early detection of any possible risk in any social network. For example: identity theft or information theft.</font></p>  	    <p align="justify"><font face="verdana" size="2">Two important factors, which encourage people to join social networks, are the social and psychological aspects and these tend to be confused. So, it can be considered that most people who join take them as only one aspect.</font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2"><b>References</b></font></p>  	    ]]></body>
<body><![CDATA[<!-- ref --><p align="justify"><font face="verdana" size="2">Bogliaccini J., Cardoso M., Rodr&iacute;guez F. <i>Construcci&oacute;n de &iacute;ndices</i>, Confiabilidad, Alpha de Cronbach, Autexto No. 5, Serie estad&iacute;stica, Universidad Cat&oacute;lica del Uruguay, Facultad de Ciencias Humanas, 2005 &#91;on line&#93;. Available on: <a href="http://www.ucu.edu.uy/facultades/cienciashumanas/IPES/pdf/Laboratorio/Autotextos/AT5_Serie_Estadistica_%20Indices_y_Alpha_IPES.pdf" target="_blank">http://www.ucu.edu.uy/facultades/cienciashumanas/IPES/pdf/Laboratorio/Autotextos/AT5&#95;Serie&#95;Estadistica&#95;&#37;20Indices&#95;y&#95;Alpha&#95;IPES.pdf</a> &nbsp; Retrieved: June 2013.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4292984&pid=S1405-7743201400040000900001&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">Cronbach L.J. Coefficient Alpha and the Internal Structure of Tests. <i>Psychometrika</i>, volume 16 (issue 3), 1951: 297&#45;334. Doi:10.1007/BF02310555. ISSN0033&#45;3123.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4292986&pid=S1405-7743201400040000900002&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">FreemanL.S. Centrality in Social Networks: Conceptual Clarification, <i>Social Networks</i>, volume 1, 1979:&nbsp; 215&#45;239.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4292988&pid=S1405-7743201400040000900003&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">Hern&aacute;ndez R., Fern&aacute;ndez&#45;Collado C., Baptista L. <i>Metodolog&iacute;a de la investigaci&oacute;n</i>, 4ta ed., M&eacute;xico, McGraw&#45;Hill, 2006.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4292990&pid=S1405-7743201400040000900004&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">Instituto&nbsp; Nacional&nbsp; de&nbsp; Estad&iacute;stica&nbsp; y Geograf&iacute;a (INEGI). Encuesta nacional sobre disponibilidad y uso de las tecnolog&iacute;as de la informaci&oacute;n en&nbsp; los hogares. (<i>ENDUTIH</i>), volume 1 (issue 12), 2011 &#91;on line&#93;. Available on: <a href="http://www.inegi.org.mx/prod_serv/contenidos/espanol/bvinegi/productos/encuestas/especiales/endutih/endutih2011.pdf" target="_blank">http://www.inegi.org.mx/prod&#95;serv/contenidos/espanol/bvinegi/productos/encuestas/especiales/endutih/endutih2011.pdf</a> Retrieved: January 2013.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4292992&pid=S1405-7743201400040000900005&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    ]]></body>
<body><![CDATA[<!-- ref --><p align="justify"><font face="verdana" size="2">M&eacute;ndez&#45;Hinojosa L.M., Pe&ntilde;a&#45;Moreno J.A. <i>Manual pr&aacute;ctico para el dise&ntilde;o de la escala Likert</i>, Editorial Trillas, 2007.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4292994&pid=S1405-7743201400040000900006&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">Mitchell J.C. <i>Social Networks in Urban Situations: Analyses of Personal Relationships in Central African Towns</i>, Manchester, University Press, 1969.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4292996&pid=S1405-7743201400040000900007&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">Repositorio Institucional de la Universidad de Alicante. Estad&iacute;stica Inform&aacute;tica: casos y ejemplos con el SPSS, cap&iacute;tulo 8, An&aacute;lisis Factorial &#91;on line&#93;. Available on: <a href="http://rua.ua.es/dspace/bitstream/10045/12078/1/Capitulo8.pdf" target="_blank">http://rua.ua.es/dspace/bitstream/10045/12078/1/Capitulo8.pdf</a> Retrieved: January 2013.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4292998&pid=S1405-7743201400040000900008&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <p align="justify"><font face="verdana" size="2">SPSS para la investigaci&oacute;n estad&iacute;stica. <i>Consultores en estad&iacute;stica e inform&aacute;tica</i>, Moquegua Per&uacute;, 2011.</font></p>  	    <p align="justify"><font face="verdana" size="2">Wellmann B. Applying Network Analysis to the Study of Support, in: Social Networks and Social Support, Gottlieb, 1981, pp. 171&#45;200.</font></p>    	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>         <p align="justify"><font face="verdana" size="2"><b>Citation for this article:</b></font></p>         ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2"><b>Chicago citation style</b>    <br>       Orantes&#45;Jim&eacute;nez,&nbsp; Sandra Dinora,&nbsp; Graciela V&aacute;zquez&#45;&Aacute;lvarez. Validity and Reliability in the Assessment of the Vulnerability of Social Networks. <i>Ingenier&iacute;a Investigaci&oacute;n y Tecnolog&iacute;a</i>, XV, 04 (2014): 585&#45;592.</font></p>         <p align="justify"><font face="verdana" size="2"><b>ISO 690 citation style</b>    <br>       Orantes&#45;Jim&eacute;nez S.D., V&aacute;zquez&#45;&Aacute;lvarez G. Validity and Reliability in the Assessment of the Vulnerability of Social Networks. <i>Ingenier&iacute;a Investigaci&oacute;n y Tecnolog&iacute;a</i>, volume XV (issue 4), October&#45;December 2014: 585&#45;592.</font></p>	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>         <p align="justify"><font face="verdana" size="2"><b>About the authors</b></font></p>      <p align="justify"><font face="verdana" size="2"><i><b>Sandra Dinora Orantes&#45;Jim&eacute;nez.</b></i> Bachelor in Computer Science from the Universidad Centroamericana Jos&eacute; Sime&oacute;n Ca&ntilde;as, San Salvador, El Salvador in 1992. She obtained her Master in Computer Science in 1999 from the Centro de Investigaci&oacute;n en Computaci&oacute;n del Instituto Polit&eacute;cnico Nacional, Mexico City. Her research interests include: software engineering, information systems, design patterns, information management, computer audit, cloud computing, social networks and quality metrics and standards. She is a member of the Subcomit&eacute; INF2 software of the Comit&eacute; T&eacute;cnico de Normalizaci&oacute;n Nacional de Inform&aacute;tica de NYCE and Grupo Adhoc of the Subcomit&eacute; INF2: Software. Participates in meetings of JTC1 SC7 Software and System Engeneering. She has been a programmer analyst of Banco Hipotecario and Seguros Desarrollo S.A. de C.V of El Salvador, and teaches at the Faculty of Engineering at Universidad Centroamericana Jos&eacute; Sime&oacute;n Ca&ntilde;as. She is currently professor and researcher at the Centro de Investigaci&oacute;n en Computaci&oacute;n del Instituto Polit&eacute;cnico Nacional.</font></p>  	    <p align="justify"><font face="verdana" size="2"><i><b>Graciela&nbsp; V&aacute;zquez&#45;&Aacute;lvarez.</b></i> Bachelor in Industrial Engineering from the Universidad Aut&oacute;noma del Estado de Hidalgo at the Instituto de Ciencias Exactas, Pachuca, Hidalgo, Mexico. She obtained her Master of Science in Systems Engineering from the Escuela Superior de Ingenier&iacute;a Mec&aacute;nica y El&eacute;ctrica del Instituto Polit&eacute;cnico Nacional. She is a Doctor in Computer Science by the Centro de Investigaci&oacute;n en Computaci&oacute;n del Instituto Polit&eacute;cnico Nacional. Currently she is researcher professor at the Section of Graduate Studies and Research of the Escuela Superior de Ingenier&iacute;a Mec&aacute;nica y El&eacute;ctrica del Instituto Polit&eacute;cnico Nacional (ESIME&#45;Zacatenco&#45;IPN).</font></p>      ]]></body><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bogliaccini]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Cardoso]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Rodríguez]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
</person-group>
<source><![CDATA[Construcción de índices, Confiabilidad, Alpha de Cronbach]]></source>
<year>2005</year>
<publisher-name><![CDATA[Universidad Católica del Uruguay, Facultad de Ciencias Humanas]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cronbach]]></surname>
<given-names><![CDATA[L.J.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Coefficient Alpha and the Internal Structure of Tests]]></article-title>
<source><![CDATA[Psychometrika]]></source>
<year>1951</year>
<volume>16</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>297-334</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[FreemanL]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<source><![CDATA[Centrality in Social Networks: Conceptual Clarification]]></source>
<year>1979</year>
<volume>1</volume>
<page-range>215-239</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hernández]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Fernández-Collado]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Baptista]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
</person-group>
<source><![CDATA[Metodología de la investigación]]></source>
<year>2006</year>
<edition>4</edition>
<publisher-name><![CDATA[McGraw-Hill]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="">
<collab>Instituto Nacional de Estadística y Geografía</collab>
<source><![CDATA[Encuesta nacional sobre disponibilidad y uso de las tecnologías de la información en los hogares]]></source>
<year>2011</year>
</nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Méndez-Hinojosa]]></surname>
<given-names><![CDATA[L.M.]]></given-names>
</name>
<name>
<surname><![CDATA[Peña-Moreno]]></surname>
<given-names><![CDATA[J.A]]></given-names>
</name>
</person-group>
<source><![CDATA[Manual práctico para el diseño de la escala Likert]]></source>
<year>2007</year>
<publisher-name><![CDATA[Trillas]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mitchell]]></surname>
<given-names><![CDATA[J.C]]></given-names>
</name>
</person-group>
<source><![CDATA[Social Networks in Urban Situations: Analyses of Personal Relationships in Central African Towns]]></source>
<year>1969</year>
<publisher-loc><![CDATA[Manchester ]]></publisher-loc>
<publisher-name><![CDATA[University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="">
<collab>Repositorio Institucional de la Universidad de Alicante</collab>
<source><![CDATA[Estadística Informática: casos y ejemplos con el SPSS]]></source>
<year>2078</year>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
