Information security practices of the executive level of the Colombia national police. Escuela de Policía Simón Bolívar Tuluá case

Authors

DOI:

https://doi.org/10.22335/rlct.v12i1.1050

Keywords:

information literacy, data security, data protection, security, police

Abstract

The use of different types of technology is increasingly common in a larger and more varied group of people. In that sense, the students of the Professional Technical Program in Police Service and professional police officers of the Simón Bolívar Police School are no exception. Therefore, it was decided to study, from the quantitative and qualitative approaches, the type of practices, from the point of view of information security, which both groups apply in the daily life of their activities. Thus, an instrument consisting of five variables was validated and applied to determine strengths and weaknesses in information security. As a result, it was found that on average the behaviors and knowledge about information security are medium level and, therefore, the risk of being associated with problems in this area is high, which implies a need to redesign continuous training programs and keep in the academic curriculum subjects that include units referring to good information security practices.

Downloads

Download data is not yet available.

Author Biographies

  • Royer David Estrada Esponda, Universidad del Valle

    Magister en Administración. Ingeniero de Sistemas.

  • Oleskyenio Enrique Flórez-Rincón, Policía Nacional de Colombia

    Director Escuela de Policía Simón Bolívar.

References

Adams, A., Sasse, M. A. & Lunt, P. (1997). Making passwords secure and usable. En H. Thimbleby, B. O’Conaill y P. J. Thomas (Eds.), People and computers XII (pp. 1-19). Londres, RU: Springer. https://doi.org/10.1007/978-1-4471-3601-9_1

Castillejos López, B., Torres Gastelú, C. A. y Lagunes Domínguez, A. (2016). La seguridad en las competencias digitales de los millennials. Apertura, 8(2), 54-69. Recuperado de http://www.scielo.org.mx/scielo.php?pid=S1665-61802016000300054&script=sci_arttext

Deloitte. (2017). Consumo móvil en Colombia: los móviles prueban ser indispensables en un mundo “siempre” conectado. Recuperado de https://www2.deloitte.com/content/dam/Deloitte/co/Documents/technology-media-telecommunications/Consumo %20movil(VF1).pdf

Durán Santos, A. U. (2019). Contexto del ciber crimen en Colombia. Centro Cibernético Policial. Recuperado de https://docplayer.es/125813772-Centro-cibernetico-policial.html

El Tiempo. (2017, septiembre 27). A diario se registran 542.465 ataques informáticos en Colombia. Recuperado de https://www.eltiempo.com/tecnosfera/novedades-tecnologia/informe-sobre-ataques-informaticos-en-colombia-y-al-sector-financiero-135370

Furnell, S. & Clarke, N. (2012). Power to the people? The evolving recognition of human aspects of security. Computers & Security, 31(8), 983-988. https://doi.org/10.1016/j.cose.2012.08.004

Hernández, R., Ventura, R. y Juárez Ibarra, C. M. (2018). Concientización y capacitación para incrementar la seguridad informática en estudiantes universitarios. PAAKAT: Revista de Tecnología y Sociedad, 8(14). http://dx.doi.org/10.18381/pk.a8n14.318

Mieres, J. (2009). Buenas prácticas en seguridad informática. ESET Latinoamérica. Recuperado de https://www.welivesecurity.com/wp-content/uploads/2014/01/buenas_practicas_seguridad_informatica.pdf

Muzammal, S. M., Shah, M. A., Zhang, S. J. & Yang, H. J. (2016). Conceivable security risks and authentication techniques for smart devices: A comparative evaluation of security practices. International Journal of Automation and Computing, 13(4), 350-363. https://doi.org/10.1007/s11633-016-1011-5

Pattinson, M., Jerram, C., Parsons, K., McCormac, A., & Butavicius, M. (2012). Why do some people manage phishing e-mails better than others? Information Management & Computer Security, 20(1), 18-28. https://doi.org/10.1108/09685221211219173

Porras Niño, F. H. (2018). Sistemas de gestión de la seguridad de la información (Universitat Oberta de Catalunya, Catalunya, España). Recuperado de http://openaccess.uoc.edu/webapps/o2/handle/10609/81125

Portafolio. (2019, marzo 26). Colombianos hacen sus compras en internet desde el computador. Recuperado de https://www.portafolio.co/negocios/colombianos-prefieren-el-computador-para-hacer-compras-on line-527870

Rhee, H. S., Kim, C. & Ryu, Y. U. (2009). Self-efficacy in information security: Its influence on end users’ information security practice behavior. Computers & Security, 28(8), 816-826. https://doi.org/10.1016/j.cose.2009.05.008

Symantec. (2019). Informe sobre las amenazas para la seguridad en internet 2019. Recuperado de https://www.symantec.com/es/es/security-center/threat-report

Unisys. (2019). Índice de Seguridad de Unisys™ en Colombia. Recuperado de https://www.unisys.com/unisys-security-index/colombia

Published

2019-12-20

How to Cite

Information security practices of the executive level of the Colombia national police. Escuela de Policía Simón Bolívar Tuluá case. (2019). Revista Logos Ciencia & Tecnología, 12(1), 121-131. https://doi.org/10.22335/rlct.v12i1.1050