Ciberseguridad en instituciones de educación superior: un análisis desde la perspectiva de la teoría de la motivación de protección
DOI:
https://doi.org/10.33010/ie_rie_rediech.v16i0.2271Palavras-chave:
ciberseguridad, comportamiento, educación superior, protección de datos, teoría de la motivación a la protecciónResumo
La importancia de la ciberseguridad en el sector educativo radica en la protección de datos e información sensible, así como en mantener un ambiente seguro y confiable para estudiantes, docentes y personal administrativo. El objetivo de la investigación es analizar los factores que influyen en el comportamiento de seguridad cibernética de los empleados en instituciones de educación superior en el noreste de México. Se utiliza la teoría de la motivación de protección, buscando comprender las motivaciones y decisiones relacionadas con las prácticas de seguridad digital. Para el método, se aplicaron 159 encuestas que fueron analizadas mediante modelado de ecuaciones estructurales con mínimos cuadrados parciales (PLS-SEM). Los resultados revelan que la conciencia de ciberseguridad influye positivamente en la autoeficacia y la eficacia de respuesta. La severidad percibida y la autoeficacia de respuesta son predictores significativos del comportamiento de ciberseguridad. Curiosamente, el hábito de protección se relaciona positivamente con la autoeficacia, pero no con la eficacia de respuesta. Además, no se encontró relación significativa entre la eficacia de respuesta y el comportamiento de ciberseguridad. Los hallazgos enfatizan la necesidad de un enfoque holístico que considere factores individuales y organizacionales para promover prácticas de seguridad efectivas en el contexto educativo mexicano.
Referências
Alhelaly, Y., Dhillon, G., y Oliviera, T. (2024). Mobile identity protection: The moderation role of self-efficacy. Australasian Journal of Information Systems, 28. https://doi.org/10.3127/ajis.v28.4397
Alsharida, R. A., Al-rimy, B. A. S., Al-Emran, M., y Zainal, A. (2023). A systematic review of multi perspectives on human cybersecurity behavior. Technology in Society, 73, 102258. https://doi.org/10.1016/j.techsoc.2023.102258
Alsharif, M., Mishra, S., y AlSheri, M. (2022). Impact of human vulnerabilities on cybersecurity. Computer Systems Science and Engineering, 40(3), 1153-1116. https://doi.org/10.32604/csse.2022.019938
Arriaza, R. E., Mutch, C., y Mutch, N. T. (2021). When Covid-19 is only part of the picture: Caring pedagogy in higher education in Guatemala. Pastoral Care in Education, 39(3), 236-249. https://doi.org/10.1080/02643944.2021.1938648
Atta, A., Zaman, N. U., y Khan, H. H. (2021). Battling the threat of workplace harassment: An appraisal based on Protection Motivation Theory. Journal of Asian Finance Economics and Business, 8(6), 491-504. https://doi.org/10.13106/jafeb.2021.vol8.no6.0491
Bezbaruah, K. (2022). Information, communication and technology and its application in teaching learning process of philosophy. International Journal of Early Childhood Special Education, 14(3), 3143-3146. https://doi.org/10.1207/s15566935eed1703_1
Caldarulo, M., Welch, E. W., y Freeney, M. K. (2022). Determinants of cyber-incidents amog small and medium US cities. Government Information Quarterly, 39(3), 101703. https://doi.org/10.1016/j.giq.2022.101703
Chin, W. W. (1998). The partial least squares approach to structural equation modeling. Modern Methods for Business Research, 295(2), 295-336.
CUDI [Corporación Universitaria para el Desarrollo de Internet] (2021, jul. 1). Resultados de la Encuesta de Ciberseguridad en IES Miembros CUDI. http://repositorio.cudi.edu.mx/handle/11305/2186
Cummings, C. L., Rosenthal, S., y Kong, W. Y. (2021). Secondary Risk Theory: Validation of a novel model of protection motivation. Risk Analysis, 41(1), 204-220. https://doi.org/10.1111/risa.13573
Dawadi, S., Giri, R. A., y Simkhada, P. (2020). Impact of COVID-19 on the education sector in Nepal: Challenges and coping strategies [Prepint]. Sage Submissions. https://doi.org/10.31124/advance.12344336.v1
Dijkstra, T. K., y Henseler, J. (2015). Consistent and asymptotically normal PLS estimators forlinear structural equations. Computational Statistics & Data Analysis, 81(1), 10-23.
Domínguez, R. A. (2021). Ciberdelitos, alarma mundial y políticas de información en ciberseguridad: un acercamiento al contexto de Tamaulipas. En R. A. Domínguez, Problemas sociales de información, comunicación e interacción en espacios digitales: panorama expuesto en una sociedad pandémica (pp. 12-37). El Colegio de Tamaulipas.
Dzyana, H., Pasichnyk, V., Garmash, Y., Naumko, M., y Didych, O. (2022). The system for ensuring the information security of the organization in the context of Covid-19 based on Public. Private partnership. IJCSNS International Journal of Computer Science and Network Security, 22(6), 19-24. https://doi.org/10.22937/IJCSNS.2022.22.6.4
ENISA [European Union Agency for Cybersecurity] (2018, feb. 6). Cyber security culture in organisations. https://www.enisa.europa.eu/publications/cyber-security-culture-in-organisations
FBI [Federal Bureau of Investigation] (2022). Internet Crime Report 2022. https://www.ic3.gov/Media/PDF/AnnualReport/2022_IC3Report.pdf
Fornell, C., y Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39-50. https://doi.org/10.2307/3151312
Fouad, N. S. (2022). The security economics of EdTech: Vendors’ responsibility and the cybersecurity challenge in the education sector. Digital Policy Regulation and Governance, 24(3), 259-273. https://doi.org/10.1108/DPRG-07-2021-0090
Furnell, S., Haney, J., y Theofanos, M. (2021). Pandemic parallels: What can cybersecurity learn from COVID-19? Computer, 54(3). https://doi.org/10.1109/MC.2020.3046888
Geil, A., Sagers, G., Spaulding, A. D., y Wolf, J. R. (2018). Cyber security on the farm: an assessment of cyber security practices in the United States agriculture industry. International Food and Agribusiness Management Review, 21(3), 317-334. https://doi.org/10.22434/IFAMR2017.0045
GOV.UK (2022, jul. 11). Official Statistics: Educational institutions findings annex - Cyber Security Breaches Survey 2022. https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2022/educational-institutions-findings-annex-cyber-security-breaches-survey-2022#appendix-a-further-information
Hair, J., Hult, T., Ringle, C., Sarstedt, M., Castillo, J., Cepeda, G., y Roldán, J. (2019). Manual de Partial Least Squares Structural Equation Modeling (PLS-SEM). Sage.
Hasan, S., Ali, M., Kurnia, S., y Thurasamy, R. (2021). Evaluating the cyber security readiness of organizations and it influence on performance. Journal of Information Security and Applications, 58, 102726. https://doi.org/10.1016/j.jisa.2020.102726
Hernández, A. (2021, mar. 31). Policía de Tamaulipas recibe 2 mil 300 denuncias por delitos cibernéticos. Milenio. https://www.milenio.com/policia/tamaulipas-policia-recibe-2-mil-300-denuncias-delitos-internet
Hina, S., Selvam, D. D., y Lowry, P. B. (2019). Institutional governance and protection motivation: Theoretical insights into shaping employees’ security compliance behavior in higher education institutions in the developing world. Computers & Security, 87, 101594. https://doi.org/10.1016/j.cose.2019.101594
Holgeid, K. K., Krogstie, J., Mikalef, P., Saur, E. E., y Sjoberg, D. (2022). Benefits management and information technology work distribution. IET Software, 16(4), 438-454. https://doi.org/10.1049/sfw2.12062
Hong, Y., y Furnell, S. (2021). Understanding cybersecurity behavioral habits: Insights from situational support. Journal of Information Security and Applications, 57, 102710. https://doi.org/10.1016/j.jisa.2020.102710
Ivari, N., Sharma, S., y Ventä-Olkkonen, L. (2020). Digital transformation of everyday life – How COVID-19 pandemic transformed the basic education of the young generation and why information management research should care? International Journal of Informacion Management, 55, 102183. https://doi.org/10.1016/j.ijinfomgt.2020.102183
Jansen, J., y Van Schaik, P. (2018). Testing a model of precautionary online behaviour: The case of online banking. Computers in Human Behavior, 87, 371-383. https://doi.org/10.1016/j.chb.2018.05.010
Kennison, S. M., y Chan-Tin, E. (2020). Taking risk with cybersecurity: Using knowledge and personal characteristics to predict self-reported cybersecurity behaviors. Frontiers in Psychology, 11, 546546. https://doi.org/10.3389/fpsyg.2020.546546
Khando, K., Gao, S., Islam, S. M., y Salman, A. (2021). Enhancing employees information security awareness in private and public organisations: A systematic literature review. Computers & Society, 106, 102267. https://doi.org/10.1016/j.cose.2021.102267
Kim, B. J., Kim, M. J., y Lee, J. (2024). Examining the impact of work overload on cybersecurity behavior: highlighting self-efficacy in the realm of artificial intelligence. Current Psychology, 43, 17146-17162. https://doi.org/10.1007/s12144-024-05692-4
Kondruss, B. (2023). Cyber attacks on universities. University ransomware attacks & data breaches worldwide. KonBriefing. https://konbriefing.com/en-topics/cyber-attacks-universities.html
Koohang, A., Anderson, J., Nord, J. H., y Paliszkiewicz, J. (2020). Building an awareness-centered information security policy compliance model. Industrial Management & Data Systems, 120(1), 231-247. https://doi.org/10.1108/IMDS-07-2019-0412
Lahiri, A., Jha, S. S., Chakraborty, A., Dobe, M., y Dey, A. (2021). Role of threat and coping appraisal in protection motivation for adoption of preventive behavior during COVID-19 pandemic. Frontiers in Public Healt, 9, 678566. https://doi.org/10.3389/fpubh.2021.678566
Li, L., He, W., Xu, L., Ash, I., Anwar, M., y Yuan, X. (2019). Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior. International Journal of Information Management, 45, 13-24. https://doi.org/10.1016/j.ijinfomgt.2018.10.017
Li, L., Xu, L., y He, W. (2022). The effects of antecedents and mediating factors on cybersecurity protection behavior. Computers in Human Behavior Reports, 5, 100165. https://doi.org/10.1016/j.chbr.2021.100165
Microsoft (2023). Microsoft Security Intelligence. https://www.microsoft.com/en-us/wdsi/threats
Morales-Sáenz, F. I., Medina-Quintero, J. M., y Rodríguez, F. O. (2024a). Seguridad digital y violencias estructurales: perspectivas y desafíos contemporáneos. Dilemas Contemporáneos: Educación, Política y Valores, 12(esp.). https://doi.org/10.46377/dilemas.v12i.4486
Morales-Sáenz, F. I., Medina-Quintero, J. M., y Reyna-Castillo, M. (2024b). Beyond data protection: Exploring the convergence between cybersecurity and sustainable development in business. Sustainability, 16(14), 5884. https://doi.org/10.3390/su16145884
Pranggono, B., y Arabo, A. (2020). COVID-19 pandemic cybersecurity issues. Internet Technology Letters, 4(2). https://doi.org/10.1002/itl2.247
Priestman, W., Anstis, T., Sebire, I. G., Sridharan, S., y Sebire, N. J. (2019). Phishing in healthcare organisations: Threats, mitigation and approaches. BMJ Health & Care Informatics, 26(1), e100031. https://doi.org/10.1136/bmjhci-2019-100031
Rajab, M., y Eydgahi, A. (2019). Evaluating the explanatory power of theoretical frameworks on intention to comply with information security policies in higher education. Computers & Security, 80, 211-223. https://doi.org/10.1016/j.cose.2018.09.016
Rhee, H., Cheongtag, K., y Ryu, Y. U. (2009). Self-efficacy in information security: Its influence on end users’ information security practice behavior. Computers & Security, 28(8), 816-826. https://doi.org/10.1016/j.cose.2009.05.008
Rogers, R. W. (1983). Cognitive and physiological processes in fear appeals and attitude change: A revised Theory of Protection Motivation. En J. Cacioppo y R. Petty, Social psychophysiology (pp. 153-177). Guildford Press.
Saeed, S. (2023). Education, online presence and cybersecurity implications: A study of information security practices of computing students in Saudi Arabia. Sustainability, 15(12), 9426. https://doi.org/10.3390/su15129426
Shahbaznezhad, H., Kolini, F., y Radhidirad, M. (2021). Employees’ behavior in phishing attacks: What individual, organizational, and technological factors matter? Journal of Computer Information Systems, 61(6), 539-550. https://doi.org/10.1080/08874417.2020.1812134
Siponen, M., Mahmood, M. A., y Pahnila, S. (2014). Employees’ adherence to information security policies: An exploratory field study. Information & Management, 51(2), 217-224. https://doi.org/10.1016/j.im.2013.08.006
SmartPLS (2022). SmartPLS 4. https://www.smartpls.com
Sulaiman, N. S., Fauzi, M. A., Hussain, S., y Wider, W. (2022). Cybersecurity behavior among government employees: The role of Protection Motivation Theory and responsibility in mitigating cyberattacks. Information, 13(17), 9528. https://doi.org/10.3390/su13179528
Taborda, M. A., Collazos, F. A., Marulanda, C. A., y Villalba, K. M. (2021). Dynamic cybersecurity model based on ISO standards for higher education institutions in Colombia. Ingeniería Solidaria, 17(3). https://doi.org/10.16925/2357-6014.2021.03.05
Torten, R., Reaiche, C., y Boyle S. (2018). The impact of security awareness on information technology professionals’ behavior. Computers & Security, 79, 68-79. https://doi.org/10.1016/j.cose.2018.08.007
Tsai, H. Y., Jiang, M., Alhabash, S., LaRose, R., Rifon, N. J., y Cotten , S. R. (2016). Understanding online safety behaviors: A Protection Motivation Theory perspective. Computers & Security, 59, 138-150. https://doi.org/10.1016/j.cose.2016.02.009
Ulven, J. B., y Wangen, G. (2021). A systematic review of cybersecurity risks in higher education. Future Internet, 13(2). https://doi.org/10.3390/fi13020039
Valiente-Lopez, N., y Tejera-Reyte, C. C. (2022). Information and communication technologies as teaching- learning means. Luz, 21(1), 28-37.
Vance, A., Siponen, M., y Pahnila, S. (2012). Motivating is security compliance: Insights from Habit and Protection Motivation Theory. Information & Management, 49(3-4), 190-198. https://doi.org/10.1016/j.im.2012.04.002
Vrhovec, S., y Mihelic, A. (2021). Redefining threat appraisals of organizational insiders and exploring the moderating role of fear in cyberattack protection motivation. Computer & Security, 106, 102309. https://doi.org/10.1016/j.cose.2021.102309
Downloads
Publicado
Como Citar
Edição
Seção
Licença
Copyright (c) 2025 Francisco Isaí Morales Sáenz, José Melchor Medina Quintero , Demian Abrego Almazan

Este trabalho está licenciado sob uma licença Creative Commons Attribution-NonCommercial 4.0 International License.