<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>2007-3607</journal-id>
<journal-title><![CDATA[PAAKAT: revista de tecnología y sociedad]]></journal-title>
<abbrev-journal-title><![CDATA[PAAKAT: rev. tecnol. soc.]]></abbrev-journal-title>
<issn>2007-3607</issn>
<publisher>
<publisher-name><![CDATA[Universidad de Guadalajara, Sistema de Universidad Virtual]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S2007-36072018000200005</article-id>
<article-id pub-id-type="doi">10.32870/pk.a8n14.318</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Concientización y capacitación para incrementar la seguridad informática en estudiantes universitarios]]></article-title>
<article-title xml:lang="en"><![CDATA[Awareness and Training to Increase Cyber-Security in University Students]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Roque Hernández]]></surname>
<given-names><![CDATA[Ramón Ventura]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Juárez Ibarra]]></surname>
<given-names><![CDATA[Carlos Manuel]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad Autónoma de Tamaulipas  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Mexico</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Universidad Autónoma de Tamaulipas  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Mexico</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>00</month>
<year>2018</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>00</month>
<year>2018</year>
</pub-date>
<volume>8</volume>
<numero>14</numero>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S2007-36072018000200005&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S2007-36072018000200005&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S2007-36072018000200005&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen: Este artículo presenta una investigación realizada para explorar las deficiencias en seguridad informática que poseen los alumnos universitarios de licenciatura en informática en sus primeros semestres, y para evaluar preliminarmente el efecto que tendría un programa de capacitación y concientización diseñado para ellos. Se trabajó con un solo grupo de participantes, a quienes se encuestó antes y después de un evento formativo en modalidad de conferencia. Para analizar los datos se utilizó el software SPSS, donde se realizaron pruebas no paramétricas de Wilcoxon para buscar diferencias entre las respuestas recabadas antes y después del evento. Se encontró que los participantes podrían tener mayores niveles de conocimientos y seguridad en sus actividades cotidianas de cómputo, y que el evento logró incrementar indicadores tales como la percepción de conocimientos sobre seguridad informática y la conciencia de realizar respaldos más frecuentemente. Los resultados preliminares muestran un efecto positivo que motiva a implementar un programa permanente de concientización y capacitación.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract: This paper presents a research aimed at: 1) exploring the deficiencies in cyber security that freshman university students of Information Technology (IT) undergraduate programs have, and 2) evaluating the effect that an awareness and training program designed for them would have. In this research, one group of students participated; they were surveyed before and after a training activity that was presented to them as a conference. The responses of the participants were analyzed using the SPSS statistical software, and several Wilcoxon non parametrical tests were performed to find differences before and after the event. It was found that participants could have higher levels of knowledge and safety in their daily activities; also, it was found that the conference increased the perception about cyber-security concepts and the awareness to create information back-ups more often. These preliminary results show a positive effect that encourages to implement a permanent training and awareness program.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[Educación superior]]></kwd>
<kwd lng="es"><![CDATA[tecnología de la información]]></kwd>
<kwd lng="es"><![CDATA[internet]]></kwd>
<kwd lng="en"><![CDATA[Higher Education]]></kwd>
<kwd lng="en"><![CDATA[Information Technology]]></kwd>
<kwd lng="en"><![CDATA[Internet]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sweeney y Williams]]></surname>
<given-names><![CDATA[Anderson]]></given-names>
</name>
</person-group>
<source><![CDATA[Estadística para negocios y economía.]]></source>
<year>2011</year>
<publisher-loc><![CDATA[México, México ]]></publisher-loc>
<publisher-name><![CDATA[Cengage Learning.]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Aston]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Who is phishing for your data?]]></article-title>
<source><![CDATA[Trustee]]></source>
<year>2016</year>
<volume>69</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>8-11</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Case]]></surname>
<given-names><![CDATA[C. J.]]></given-names>
</name>
<name>
<surname><![CDATA[King]]></surname>
<given-names><![CDATA[D. L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyber Security: A Longitudinal Examination of Undergraduate Behavior and Perceptions.]]></article-title>
<source><![CDATA[American Society of Business Behavioral Sciences eJournal]]></source>
<year>2013</year>
<volume>9</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>21-9</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dunn Cavelty]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Breaking the Cyber-Security Dilemma: Aligning Security Needs and Removing Vulnerabilities.]]></article-title>
<source><![CDATA[Science and Engineering Ethics]]></source>
<year>2014</year>
<volume>20</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>701-15</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Forouzan]]></surname>
<given-names><![CDATA[B. A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Introducción a la ciencia de la computación.]]></source>
<year>2003</year>
<publisher-loc><![CDATA[México ]]></publisher-loc>
<publisher-name><![CDATA[Thomson]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jenab]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Moslehpour]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyber Security Management: A Review.]]></article-title>
<source><![CDATA[Business Management Dynamics]]></source>
<year>2016</year>
<volume>5</volume>
<numero>11</numero>
<issue>11</issue>
<page-range>16-39</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kiani]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Internet Security Feeling of Students. Study of Payame Noor University.]]></article-title>
<source><![CDATA[Trakia Journal of Sciences]]></source>
<year>2016</year>
<volume>14</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>230-5</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Magazine]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Unveiling the misterious world of an ethical hacker.]]></article-title>
<source><![CDATA[SiliconIndia]]></source>
<year>2009</year>
<page-range>36-7</page-range></nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Miguel-Pérez]]></surname>
<given-names><![CDATA[J. C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Protección de datos y seguridad de la información]]></source>
<year>2015</year>
<publisher-loc><![CDATA[México ]]></publisher-loc>
<publisher-name><![CDATA[Ra-Ma]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[North]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Pascoe]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyber security and resilence - it's all about governance.]]></article-title>
<source><![CDATA[Governance Directions]]></source>
<year>2016</year>
<volume>68</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>146-51</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Peltier]]></surname>
<given-names><![CDATA[T. R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Information Security, Policies, Procedures and Standards: Guidelines for Effective Information Security Management.]]></source>
<year>2002</year>
<publisher-loc><![CDATA[USA ]]></publisher-loc>
<publisher-name><![CDATA[CRC Press LLC]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Peterson]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[One negligent employee: Ensure security training raises employees&#8217; awareness of threats.]]></article-title>
<source><![CDATA[Credit Union Magazine]]></source>
<year>2017</year>
<volume>10</volume>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rhodes-Ousley]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Information Security - The Complete Reference]]></source>
<year>2013</year>
<publisher-loc><![CDATA[USA ]]></publisher-loc>
<publisher-name><![CDATA[McGraw-Hill]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Stanciu]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Tinca]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Students' awareness on information security between own perception and reality - an empirical study.]]></article-title>
<source><![CDATA[Accounting and Management Information Systems]]></source>
<year>2016</year>
<volume>15</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>112-30</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Stier]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Data backup in the age of the cloud]]></article-title>
<source><![CDATA[University Business]]></source>
<year>2015</year>
<page-range>49-51</page-range></nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wagner]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<source><![CDATA[Using IBM SPSS Statistics for Research Methods and Social Science Statistics.]]></source>
<year>2014</year>
<publisher-loc><![CDATA[USA ]]></publisher-loc>
<publisher-name><![CDATA[SAGE Publications]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Whitty]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Doodson]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Creese]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Hodges]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Individual Differences un Cyber Security Behaviors: An Examination of Who is Sharing Passwords.]]></article-title>
<source><![CDATA[CyberPsychology, Behavior, and Social Networking]]></source>
<year>2015</year>
<volume>18</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>3-7</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wiseman]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Accounting Firm Cybersecurity: Training Your Staff and Protecting Your Business]]></article-title>
<source><![CDATA[CPA Practice Advisor]]></source>
<year>2017</year>
<volume>27</volume>
</nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zikmund]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Barry]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Carr]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Griffin]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Business Research Methods]]></source>
<year>2013</year>
<publisher-loc><![CDATA[Mason, Ohio, USA ]]></publisher-loc>
<publisher-name><![CDATA[Cengage Learning.]]></publisher-name>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
