Abstract
The present article is the result of a research project executed by the Catholic University of Cuenca of Cañar Computer Engineering program: “Proposed Controls For Minimizing The Risks Arising From The Internet And Social Networks On High School Students In The Urban Center of Canton Cañar”. A Diagnosis of the internet and social networks use was performed as a means to determine digital vulnerabilities. Through a theoretical study it was determined which threats are most commonly inherent in utilizing the internet and social networks. Surveys were applied to 40% of enrolled students. Given surveys then indicated the common uses of the internet, social networks, and potential vulnerabilities that could be exploited by malicious people. Results determined that threats with higher risks are related to violations of privacy, which are visible to behavioral tendencies in the adolescents placing them in vulnerable situations susceptible to privacy violations.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Análisis de caraterísticas estáticas e ficheros ejecutables para la clasificación de malware. In: Guevara, R., Paúl, R. (eds.) 2014 España/Universidad Politécnica de Madrid/2014
Aprendemos para el buen trato o para la violencia? Actas del VIII seminario estatal isonomia contra la violencia de género. In: Gil, G.E., Ortí Porcar, M.J., Boix, S. (eds.) Ann 2013 Fundación Isonomía. Universitat Jaume I
Ciberacoso y violencia de género en redes sociales: análisis y herramientas de prevención Verdejo Espinosa, María Ángeles 2015 Universidad Internacional de Andalucía
Delito de grooming? Necesidad de tipificación en la legislación penal ecuatoriana? In: Quinteros, C., Márcell, W., et al. (eds.) Universidad Andina Simón Bolívar, Sede Ecuador (2015)
En TIC Confio. http://www.enticconfio.gov.co/en-que-casos-existe-pornografia-infantil
Ciberespionaje y derecho internacional. In: Raggio, M.L., Alfranca, L., del Valle, M. (eds.) Retos del derecho ante las nuevas amenazas, pp. 139–160, Dykinson (2015)
Enrique Yupanqui Informatica Forense (2009)
Brauch, H.G., Spring, Ú.O., Mesjasz, C., Grin, J., Kameri-Mbote, P., Chourou, B., Dunay, P., Birkmann, J. (eds.): Coping with Global Environmental Change, Disasters and Security: Threats, Challenges, Vulnerabilities and Risks. Springer, Berlin (2011). https://doi.org/10.1007/978-3-642-17776-7
Internet Security Threat report, vol. 21. Symantec, California, USA, April 2016
Sp 800-30. Risk management guide for information technology systems. In: Stoneburner, G., Goguen, A.Y., Feringa, A. (eds.) Falls Church, Virginia, USA (2002)
We are social. https://wearesocial.com/
Instituto nacional de estadistica y censos. http://www.ecuadorencifras.gob.ec/institucional/home/
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Flores, C., Flores, C., Guasco, T., León-Acurio, J. (2018). A Diagnosis of Threat Vulnerability and Risk as It Relates to the Use of Social Media Sites When Utilized by Adolescent Students Enrolled at the Urban Center of Canton Cañar. In: Botto-Tobar, M., Esparza-Cruz, N., León-Acurio, J., Crespo-Torres, N., Beltrán-Mora, M. (eds) Technology Trends. CITT 2017. Communications in Computer and Information Science, vol 798. Springer, Cham. https://doi.org/10.1007/978-3-319-72727-1_15
Download citation
DOI: https://doi.org/10.1007/978-3-319-72727-1_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-72726-4
Online ISBN: 978-3-319-72727-1
eBook Packages: Computer ScienceComputer Science (R0)