<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>2227-1899</journal-id>
<journal-title><![CDATA[Revista Cubana de Ciencias Informáticas]]></journal-title>
<abbrev-journal-title><![CDATA[Rev cuba cienc informat]]></abbrev-journal-title>
<issn>2227-1899</issn>
<publisher>
<publisher-name><![CDATA[Editorial Ediciones Futuro]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S2227-18992020000300148</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Factores que contribuyen en la pérdida de información en las organizaciones]]></article-title>
<article-title xml:lang="en"><![CDATA[Factors that contribute to the loss of information in organizations]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Bustamante Garcia]]></surname>
<given-names><![CDATA[Shonerly]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Valles Coral]]></surname>
<given-names><![CDATA[Miguel Angel]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Levano Rodriguez]]></surname>
<given-names><![CDATA[Dany]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad Peruana Unión  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Peru</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>09</month>
<year>2020</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>09</month>
<year>2020</year>
</pub-date>
<volume>14</volume>
<numero>3</numero>
<fpage>148</fpage>
<lpage>164</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://scielo.sld.cu/scielo.php?script=sci_arttext&amp;pid=S2227-18992020000300148&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.sld.cu/scielo.php?script=sci_abstract&amp;pid=S2227-18992020000300148&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.sld.cu/scielo.php?script=sci_pdf&amp;pid=S2227-18992020000300148&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[RESUMEN Resguardar la información es garantizar su integridad, confidencialidad y disponibilidad, pero en algunos casos estas características se ven comprometidas. El objetivo de la revisión fue identificar los factores que contribuyen a la pérdida de información en las organizaciones. Para su desarrollo, se realizó una búsqueda de artículos científicos publicados en revistas indexadas a base de datos como Latindex, Scielo, Ebsco y Scopus entre los años 2016 y 2020. La revisión permitió identificar factores tales como los recursos humanos dados por empleados, ex empleados y personas ajenas a la organización; además de factores presupuestales; el poco conocimiento en temas de seguridad de la información por parte de la organización; los desastres naturales y los agentes maliciosos. Se concluyó que estos factores afectan la imagen y la estabilidad de la organización, causando pérdidas económicas y de información, lo que puede incluso conducir a estas a cerrar sus operaciones.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[ABSTRACT Safeguarding the information is to guarantee its integrity, confidentiality and availability, but in some cases these characteristics are compromised. The objective of the review was to identify the factors that contribute to the loss of information in organizations. For its development, we carried out a search for scientific articles published in journals indexed to databases such as Latindex, Scielo, Ebsco and Scopus between the years 2016 and 2020. The review allowed identifying factors such as human resources given by employees, former employees and people outside the organization; in addition to budget factors; the organization's little knowledge of information security issues; natural disasters and malicious agents. We concluded that these factors affect the image and the stability of the organization, causing economic and information losses, which can even lead them to close their operations.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[factores]]></kwd>
<kwd lng="es"><![CDATA[seguridad]]></kwd>
<kwd lng="es"><![CDATA[pérdida]]></kwd>
<kwd lng="es"><![CDATA[información]]></kwd>
<kwd lng="en"><![CDATA[factors]]></kwd>
<kwd lng="en"><![CDATA[security]]></kwd>
<kwd lng="en"><![CDATA[lost]]></kwd>
<kwd lng="en"><![CDATA[information]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Aguilar-Antonio]]></surname>
<given-names><![CDATA[J.-M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Hechos ciberfísicos : una propuesta de análisis para ciberamenazas en las Estrategias Nacionales de Ciberseguridad.]]></article-title>
<source><![CDATA[URVIO, Revista Latinoamericana de Estudios de Seguridad]]></source>
<year>2019</year>
<volume>4299</volume>
<numero>25</numero>
<issue>25</issue>
<page-range>24-40</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Aguilera]]></surname>
<given-names><![CDATA[O]]></given-names>
</name>
<name>
<surname><![CDATA[Pérez]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
<name>
<surname><![CDATA[Rivero]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[La protección de la información. Una visión desde las entidades educativas cubanas.]]></article-title>
<source><![CDATA[Ciencias de la Información]]></source>
<year>2017</year>
<volume>48</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>41-7</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Agwu]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Labib]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Hadleigh-Dunn]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<source><![CDATA[Disaster prevention through a harmonized framework for high reliability organisations]]></source>
<year>2019</year>
<volume>111</volume>
<page-range>1-15</page-range><publisher-name><![CDATA[Safety Science]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Altamirano]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Bayona]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Políticas de Seguridad de la Información: Revisión sistemática de las teorías que explican su cumplimiento.]]></article-title>
<source><![CDATA[RISTI - Revista Iberica de Sistemas e Tecnologias de Informacao]]></source>
<year>2017</year>
<volume>25</volume>
<page-range>112-34</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Amaro]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Rodríguez]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Seguridad en internet. PAAKAT]]></article-title>
<source><![CDATA[Revista de Tecnología y Sociedad]]></source>
<year>2016</year>
<volume>6</volume>
<numero>11</numero>
<issue>11</issue>
<page-range>9</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Angraini]]></surname>
<given-names><![CDATA[Alias]]></given-names>
</name>
<name>
<surname><![CDATA[Okfalisa]]></surname>
</name>
</person-group>
<source><![CDATA[Information security policy compliance: Systematic literature review.]]></source>
<year>2019</year>
<volume>161</volume>
<page-range>1216-24</page-range><publisher-name><![CDATA[Procedia Computer Science]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bander]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Maarof]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Syed]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<source><![CDATA[Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions]]></source>
<year>2018</year>
<volume>74</volume>
<page-range>1-48</page-range><publisher-name><![CDATA[Computers and Security]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Benz]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Chatterjee]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Calculated risk? A cybersecurity evaluation tool for SMEs.]]></article-title>
<source><![CDATA[Business Horizons]]></source>
<year>2020</year>
<volume>63</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>1-10</page-range></nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bongiovanni]]></surname>
<given-names><![CDATA[I]]></given-names>
</name>
</person-group>
<source><![CDATA[The least secure places in the universe? A systematic literature review on information security management in higher education.]]></source>
<year>2019</year>
<volume>86</volume>
<page-range>350-7</page-range><publisher-name><![CDATA[Computers and Security]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Carvajal]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Cardona]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Valencia]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Una propuesta de gestión de la seguridad de la información aplicado a una entidad pública colombiana]]></article-title>
<source><![CDATA[Entre ciencia e ingeniería]]></source>
<year>2019</year>
<volume>13</volume>
<numero>25</numero>
<issue>25</issue>
<page-range>68-76</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Castellanos]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Rodríguez]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
<name>
<surname><![CDATA[Martínez]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Comportamiento de la producción científica en Gestión de Información, Gestión del Conocimiento e Inteligencia Organizacional en revistas brasileñas indizadas en la categoría LIS en WOS entre 2008-2014]]></article-title>
<source><![CDATA[Revista Publicando]]></source>
<year>2017</year>
<volume>4</volume>
<numero>11</numero>
<issue>11</issue>
<page-range>108-34</page-range></nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Castillejos]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
<name>
<surname><![CDATA[Torres]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Lagunes]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[La seguridad en las competencias digitales de los millennials]]></article-title>
<source><![CDATA[Apertura]]></source>
<year>2016</year>
<volume>8</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>54-69</page-range></nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Crespo]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Una metodología para la gestión de riesgo aplicada a las MPYMES]]></article-title>
<source><![CDATA[Enfoque UTE]]></source>
<year>2017</year>
<volume>7</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>107-21</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Díaz-Batista]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Blanco-Fernández]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Adopción y uso de las Tecnologías de la Información en organizaciones cubanas.]]></article-title>
<source><![CDATA[Ingeniería Industrial]]></source>
<year>2018</year>
<volume>39</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>273-82</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Donalds]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Osei-Bryson]]></surname>
<given-names><![CDATA[K.-M]]></given-names>
</name>
</person-group>
<source><![CDATA[Toward a cybercrime classification ontology: A knowledge-based approach.]]></source>
<year>2018</year>
<volume>92</volume>
<page-range>1-38</page-range><publisher-name><![CDATA[Computers in Human Behavior]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fernández]]></surname>
<given-names><![CDATA[W]]></given-names>
</name>
<name>
<surname><![CDATA[Vargas]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[¿Son útiles las TIC para combatir la ciberdelincuencia? La relación entre la denuncia de delitos informáticos y el equipamiento tecnológico de las comisarías.]]></article-title>
<source><![CDATA[The Law, State and Telecommunications Review]]></source>
<year>2018</year>
<volume>10</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>37-52</page-range></nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gibert]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Mateu]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Planes]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<source><![CDATA[The rise of machine learning for detection and classification of malware: Research developments, trends and challenges.]]></source>
<year>2020</year>
<volume>153</volume>
<page-range>1-22</page-range><publisher-name><![CDATA[Journal of Network and Computer Applications]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kim]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Concienciación en materia de ciberseguridad: protección de datos y de pacientes]]></article-title>
<source><![CDATA[Nursing]]></source>
<year>2018</year>
<volume>35</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>62-4</page-range></nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lux]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Elementos criminológicos para el análisis jurídico-penal de los delítos informáticos.]]></article-title>
<source><![CDATA[Revista lus et Praxis]]></source>
<year>2018</year>
<volume>24</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>159-206</page-range></nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Martelo]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Tovar]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
<name>
<surname><![CDATA[Maza]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Modelo básico de seguridad lógica . Caso de Estudio : el Laboratorio de Redes de la Universidad de Cartagena en Colombia.]]></article-title>
<source><![CDATA[Informacion Tecnologica]]></source>
<year>2018</year>
<volume>29</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>3-10</page-range></nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Meraz]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Empresa y privacidad : el cuidado de la información y los datos personales en medios digitales.]]></article-title>
<source><![CDATA[IUS]]></source>
<year>2018</year>
<volume>12</volume>
<numero>41</numero>
<issue>41</issue>
<page-range>293-310</page-range></nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Miranda]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Valdés]]></surname>
<given-names><![CDATA[O]]></given-names>
</name>
<name>
<surname><![CDATA[Pérez]]></surname>
<given-names><![CDATA[I]]></given-names>
</name>
<name>
<surname><![CDATA[Portelles]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Sánchez]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Metodología para la Implementación de la Gestión Automatizada de Controles de Seguridad Informática]]></article-title>
<source><![CDATA[Revista Cubana de Ciencias Informáticas]]></source>
<year>2016</year>
<volume>10</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>14-26</page-range></nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nicholson]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[How ethical hacking can protect organisations from a greater threat]]></article-title>
<source><![CDATA[Computer Fraud and Security]]></source>
<year>2019</year>
<volume>2019</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>15-9</page-range></nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Peña]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Anías]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Sistema para ejecutar políticas sobre infraestructuras de Tecnologías de la Información IT policies execution system.]]></article-title>
<source><![CDATA[Revista chilena de ingeniería]]></source>
<year>2019</year>
<volume>27</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>479-94</page-range></nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Perdigón]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Pérez]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Análisis holístico del impacto social de los negocios electrónicos en América Latina, de 2014 a 2019.]]></article-title>
<source><![CDATA[Paakat: Revista de Tecnología y Sociedad]]></source>
<year>2020</year>
<volume>10</volume>
<numero>18</numero>
<issue>18</issue>
<page-range>1-23</page-range></nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Porras]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Pastor]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Alvarado]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Modelo de gestión de riesgos de seguridad de la información para PYMES peruanas.]]></article-title>
<source><![CDATA[Revista peruana de computación y sistemas]]></source>
<year>2018</year>
<volume>1</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>47-56</page-range></nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Proaño]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Gavilanes]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Estrategia para responder a incidentes de inseguridad informática ambientado en la legalidad ecuatoriana.]]></article-title>
<source><![CDATA[Revista Enfoque UTE]]></source>
<year>2018</year>
<volume>9</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>90-101</page-range></nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Qamar]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Karim]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Chang]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
</person-group>
<source><![CDATA[Mobile malware attacks: Review, taxonomy &amp; future directions.]]></source>
<year>2019</year>
<volume>97</volume>
<page-range>887-909</page-range><publisher-name><![CDATA[Future Generation Computer Systems]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Roba]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
<name>
<surname><![CDATA[Vento]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[García]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Metodología para la detección de vulnerabilidad en las redes de datos utilizando Kali-Linux.]]></article-title>
<source><![CDATA[Revista Científica Avances]]></source>
<year>2016</year>
<volume>18</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>334-44</page-range></nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rodríguez]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Mho]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Ramírez]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Infotecnología y gestión de la información en la carrera de economía.]]></article-title>
<source><![CDATA[Transformación]]></source>
<year>2017</year>
<volume>13</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>139-49</page-range></nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Roque]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Juárez]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Concientización y capacitación para incrementar la seguridad informática en estudiantes universitarios.]]></article-title>
<source><![CDATA[PAAKAT: Revista de Tecnología y Sociedad]]></source>
<year>2018</year>
<volume>8</volume>
<numero>14</numero>
<issue>14</issue>
<page-range>13</page-range></nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sabillón]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Cano]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<source><![CDATA[Auditorías en Ciberseguridad: Un modelo de aplicación general para empresas y naciones.]]></source>
<year>2019</year>
<page-range>33-48</page-range><publisher-name><![CDATA[RISTI - Revista Ibérica de Sistemas e Tecnologias de Informação]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sahi]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Lai]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
</person-group>
<source><![CDATA[Security and privacy preserving approaches in the eHealth clouds with disaster recovery plan.]]></source>
<year>2016</year>
<volume>78</volume>
<page-range>1-8</page-range><publisher-name><![CDATA[Computers in Biology and Medicine]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Schouteren]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[From wooden shoe to click of a button: the risk of disgruntled employees.]]></article-title>
<source><![CDATA[Computer Fraud and Security]]></source>
<year>2019</year>
<volume>2019</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>10-3</page-range></nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sohrabi]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
<name>
<surname><![CDATA[Maple]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Watson]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
<name>
<surname><![CDATA[Von]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<source><![CDATA[Motivation and opportunity based model to reduce information security insider threats in organisations.]]></source>
<year>2018</year>
<volume>40</volume>
<page-range>1-11</page-range><publisher-name><![CDATA[Journal of Information Security and Applications]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Szczepaniuk]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
<name>
<surname><![CDATA[Szczepaniuk]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
<name>
<surname><![CDATA[Rokicki]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
<name>
<surname><![CDATA[Klepacki]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
</person-group>
<source><![CDATA[Information security assessment in public administration.]]></source>
<year>2020</year>
<volume>90</volume>
<page-range>1-11.</page-range><publisher-name><![CDATA[Computers and Security]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Torres]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Gallo]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Hallo]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Abcarius]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Muriel]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Fernández]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Gestión de la información como herramienta para la toma de decisiones en salud: escenarios más probables.]]></article-title>
<source><![CDATA[Revista Cubana de Investigaciones Biomédicas]]></source>
<year>2017</year>
<volume>36</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>1-10</page-range></nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wiley]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Mccormac]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Calic]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<source><![CDATA[More than the individual: Examining the relationship between culture and Information Security Awareness]]></source>
<year>2020</year>
<volume>88</volume>
<page-range>1-8</page-range><publisher-name><![CDATA[Computers and Security]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zuña]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
<name>
<surname><![CDATA[Arce]]></surname>
<given-names><![CDATA[Á]]></given-names>
</name>
<name>
<surname><![CDATA[Romero]]></surname>
<given-names><![CDATA[W]]></given-names>
</name>
<name>
<surname><![CDATA[Soledispa]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Análisis de la seguidad de la información en las pymes de la ciudad de Milagro.]]></article-title>
<source><![CDATA[Revista Universidad y Sociedad]]></source>
<year>2019</year>
<volume>11</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>487-92</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
