DOI: 10.47460/uct.v25i110.484
Computer security and virtual activities: The new times
of communication
Recibido (12/04/21 ) Aceptado (09/06/21)
Abstract: This work presents a bibliographic analysis of the aspects associated with computer security, from the social and academic point of view. The new times demand a more distant communication, lacking physical contact and with a wide incidence of use of computer media, which facilitate online interaction. However, it is important to highlight the criteria related to computer security, which will be the key necessary to maintain good communications that facilitate learning, human interaction, respect for people and the assessment of appropriate content. In this work, the activities most commonly used in current times where the health situation affects various aspects of daily life are taken into account. As main results, it is observed that computer security must meet certain minimum parameters to guarantee effective communication, and in addition to this, ethics and social values stand out.
Keywords: Computer security, effective communication, online interaction.
Seguridad informática y actividades virtuales:
Los nuevos tiempos de la comunicación
Resumen: En este trabajo se presenta un análisis bibliográfico de los aspectos asociados a la seguridad informática, desde el punto de vista social y académico. Los nuevos tiempos exigen una comunicación más distante, carente de contacto físico y con una amplia incidencia de uso de medios informáticos, que facilitan la interacción online. Sin embargo resulta importante destacar los criterios relacionados a la seguridad informática, que serán la clave necesaria para mantener buenas comunicaciones que faciliten el aprendizaje, la interacción humana, el respeto por las personas y la valoración de contenido apropiado. En este trabajo se toman en cuenta las actividades más comúnmente utilizadas en los tiempos actuales donde la situación de salud afecta varios aspectos de la vida cotidiana. Como principales resultados se observan que la seguridad informática debe cumplir ciertos parámetros mínimos para garantizar la comunicación efectiva, y adicional a ello se destaca la ética y valores sociales.
Palabras Clave: Seguridad informática, comunicación efectiva, interacción online.
119
Minaya et al., Computer Security and Virtual Activities: The New Times of Communication
I.INTRODUCTION
The
One of the main activities that were forced to migra- te to an online environment was education and acade- mic processes. This radical change in a process that al- ready had its shortcomings, and its natural and internal difficulties. Thus, online education came to occupy the spaces of home and family, but it also brought a set of elements associated with virtual communication, which were not foreseen and have had to be addressed in an improvised manner. Such is the case of computer secu- rity, ethical processes of communication, and privacy of communications.
This paper will evaluate the aspects associated with computer security and its impact on new lifestyles. This will take into account the repercussions in education with virtual environments, focused on the quality of co- llaborative work [2], as a necessary tool for classroom work, assessing learning styles.
For this study, some scientific articles, academic and bibliographic material were evaluated to learn about the relevance of virtual communities and the new ways of communicating. We took into account those works that considered virtual environments as new life alternati- ves, highlighting the methodologies necessary for an efficient and effective process in the new societies.
The work is composed of four fundamental sections, which comprise this introduction that contextualizes the subject of study, followed by the development with the theoretical foundation, then the methodology with the processes carried out, and finally the results and con- clusions.
II.DEVELOPMENT
Communication has always been a human need, in- dispensable for the interaction and formulation of ideas, laws, processes in societies [3]. The writing was born approximately 4,000 years before Christ, representing a way to communicate among humans, through sym- bols and graphics that represented characteristics of the environment. Later on, writing evolved from papyrus to paper telegrams [3]. All this meant a cultural, social, and technological advance for people.
A.The printing press and its impact on communi-
cation
In 1450 Guttenberg [3] devised a process of printed reproduction of information, thus creating the printing press. This type of development signified a new mode of communication in the society of the time. This gave way to the newspaper, and the way of transmitting a message, a piece of news, giving rise to a new form of communication, innovative and technological for that time. However, there were problems in assembling the documents, but it did not take long for linotype and mo- notype to appear, which optimized the production time of books and assembled material.
In this way, communication underwent an important advance and with it, the academic processes, the pro- cesses of scientific dissemination, and the transmission of knowledge was modified. This meant a change in daily life and in the ways of communicating.
Fig.1 shows the basic structure of the printing press, which meant a transforming technological development for the industrial era, and brought positive repercus- sions in the academy with the massive structuring of books and educational material.
Fig. 1. Basic structure of a printing plant [3].
B.Radio and social communication
In the 20th century, scientists discovered that it was possible to transmit voice through a cable [4], giving rise to the radio. This invention ushered in a new tech- nological and communicational era.
120
Minaya et al., Computer Security and Virtual Activities: The New Times of Communication
The radio began to be part of homes, institutions, and communication centers, it became an indispensable communication tool. And it changed the way of seeing the world by then. Radio is currently one of the ways to communicate for information purposes, for entertain- ment, as a mass medium of communication.
The first phases of distance education began with postcards, then followed by radio education in the USA
[5]in 1922. This type of method had important results in education and allowed the beginning of an era of dis- tance learning.
C.Television and its impact on communication In 1884, a
non was born, televisión [6] represented an important development for society since it was not only possible to have audio but also moving images. Hence, a broader communication process began, but with less interaction than radio, which allowed a more direct exchange with people.
The media then moved into another phase of evolu- tion, but social exchanges continued around television, programs, soap operas, information.
D.The communications challenge: The Internet In 1985 the first open Internet network was created
[5]and it was then that an important leap was made in the way of communicating. The use of electronic mail was born and with it, direct, fast, and effective commu- nication over long distances. It was no longer essential to move from one place to another to transmit an im- mediate message. The
In 1996, the first fully online university was founded [5], but the laws of communication and
The internet has been one of the most innovative inventions for human communications, not only has it had an impact on the way messages are transmitted, but it has also had an important impact on educational pro- cesses, teaching methodologies, and ways of learning.
E.Some scientific analysis
Sánchez [7] states that information security is a cha- llenge, a consequence of the proliferation of new tech- nologies. Virtual environments consist of a portable file, which, unlike physical space, does not take up much space and has no representative infrastructure, so the risk of being completely stolen is higher than that which could exist for physical space.
In this way, virtual machines are susceptible to com- puter attacks, so the virtual machine administrator must take precautions and be alert to possible system failures.
The storage of information on the network is a risk for the data, hence the need to create information and data protection. For this purpose, mechanisms are created to isolate each machine from the others and to maintain the reliability of the information and material stored.
But when talking about security, not only the sto- red data are taken into account, it is also important to highlight that the new forms of virtual communication have new tools for capturing voice, image, and video. This implies other aspects to evaluate when talking about security.
Technological tools appear as an option for edu- cation [8], not only to make it accessible in many di- rections and remotely, but also to replace
In addition to having to learn in an improvised way, virtual education activities have had to comply with programs designed for
121
Minaya et al., Computer Security and Virtual Activities: The New Times of Communication
Fig. 2. Online education as an ancient teaching with a modern method.
In this way, online education becomes a problem for the academic community, because it maintains old pro- cesses in modern methods, affecting communication in the teaching process.
Online education could be a tool for the develop- ment of more open professionals, with greater capaci- ty for abstraction, greater skills for teamwork, greater skills for
The role of information security will be not only in the preservation and care of information, but also in the ways to maintain the integrity of the people involved, of what is said and done in virtual spaces.
Authors specialized in computer security [9] affirm that the use of Linux in the design of cryptographic and computer security platforms can be a viable and relia- ble alternative. This type of tool offers the possibilities of extension and fast configurations in computational environments.
Salinas [10] states that virtual environments have be- come a
for the valuation of computer tools.
Currently, a virtual learning environment includes some basic elements such as:
•Classroom material is permanently available.
•It allows multidirectional communication among those involved.
•Shared work environment •Collaborative activities. •Need for active participation.
There are a small number of virtual learning spaces, which are
Some authors [11] have exposed the most relevant aspects of security for educational platforms, as is the case of moodle. The security aspects are then raised in four important aspects:
Server security
The platform is not linked to the server, it is inde- pendent of it. But it is of great importance to have an appropriate antivirus, control over updates, manage- ment, and control over the use of the open internet, use of passwords, separation of the moodle data folder, prevention of remote access, appropriate configuration to prevent the intervention of other unauthorized IP ad- dresses [11].
122
Minaya et al., Computer Security and Virtual Activities: The New Times of Communication
Authentication protection
An efficient way to ensure the user authentication process is through manual account creation so that the administrator can give access to the accounts and avoid possible unauthorized access. However, this type of process may not be efficient in the case of massive accounts, for which mail authentication is more conve- nient, provided that there is an appropriate configura- tion.
Access security
The use of passwords has been a common activity in recent years, however, the platform administrator must request certain criteria to ensure a reliable password. There are no standardized parameters for password requirements, however, some criteria can improve the quality of the password, such as the use of alphanume- ric, upper and lower case, a minimum length of 8 digits, and some special characters.
Another important aspect of security is that passwords should be easy for the user to remember so that they do not have to reset them frequently.
The creation of secure roles
The moodle platform comes with seven secure ro- les configured; administrator, course creator, teacher,
III. METHODOLOGY
For this paper, we analyzed academic works related to new forms of communication and the importance of computer security. The new communication trends are a trigger for the generation of laws and statutes to ensure data protection, but also to ensure the shared informa- tion such as image, sound, video of people interacting in communication.
We analyzed the securities referred to the communi- cation platforms, but also the securities referred to the people or users, to the preservation of images, photos, voices, videos of those involved in the communication process.
Figure 1 describes the phases carried out for the bi- bliographic review of this work. At first, a delimitation of the information was carried out, to then evaluate the search strategies and define the criteria for exclu- sion and inclusion of works. In this case, an exclusion criterion was considered to be those aspects that were not focused on communication and that did not have a technological approach; therefore, the inclusion crite- ria were based on works associated with informatics, security, and new communication trends. The selection and processing of data were based on the argumentation of all the informatics and scientific elements that make current communications possible and that are transfor- mative in virtual social environments.
Fig.3. Phases of the bibliographic review
IV. RESULTS
After reviewing the academic and scientific material, it was possible to find the following results:
1.A significant number of professionals have opted for online studies, as they are convenient for
of 40 [12].
2.The use of educational platforms such as moodle has grown significantly in the last year; at least 246 countries use this tool for access to online education. In South America (Fig.4) the platform has a very high impact, and allows effec- tive interaction between students and teachers [13].
123
Minaya et al., Computer Security and Virtual Activities: The New Times of Communication
Brazil has the highest number of moodle platforms installed, with a total of 9418 sites, while Ecuador has 3566 registered sites. However, considering a popula- tion of 211 million inhabitants in Brazil and 17.37 mi- llion in Ecuador, the use of moodle is higher in Ecuador than in Brazil [13].
3.The key factors that stand out in online communi- cation are associated with customer service, with secu- rity being a relevant aspect for users. The preservation of data and the guarantee of information security are necessarily important elements for all online activities. However, in a survey conducted, it was observed that 66% of users give more weight to the content of aca- demic information than to other aesthetic aspects of the website [12].
4.Today's communications require clear regulations regarding computer security, but there are still no we-
5.In the United States, only 33% of students stated that they were not satisfied with online education [12]. In the past,
124
cities or areas closer to the center of study.
6.Effective learning recognizes the virtuality of spa- ces that allow students to interact from the comfort of their homes, without wasting time and money in traffic, rentals, and resources of the presentiality, such as the use of appropriate clothing, backpacks, and other mate- rials of the academy.
V. CONCLUSIONS
Once the documentary review on computer security has been carried out, it is possible to draw the following conclusions:
1.Computer security comprises technical aspects and personal aspects, which include the installation of antivirus, the proper use of passwords but also the way people communicate, taking into account the protection of sensitive information such as photos and personal data.
2.The new ways of communicating, through online platforms, create virtual communities, which open spa- ce to a new way of exchanging information, making it more sensitive to theft and manipulation. It is, therefo- re, necessary to review the environments of meetings and virtual activities that are carried out, to ensure the proper use of shared information.
3.Being responsible for the use of information in classrooms and virtual spaces should be an added value of current teaching, which promotes respect for photos and videos shared for teaching, and that they are not used for mockery, offenses, and other inappropriate uses.
4.The use of computer tools has not only become the common way to interact but will probably be the best way to interact in the coming years, in a way that ensures health conditions and also allows people to
5.Reservations in the use of confidential and perso- nal information must be made rigorously and carefully because even if there were strict laws for the conserva- tion and good use of personal material, it will always be difficult to control the bad actions of unscrupulous peo- ple who improperly take data for improper treatment of them.
6.The correct use of words and conversations in vir- tual environments can ensure greater peace of mind in the processing of information, since once a recording of a class, conversation, or social activity has been made in online spaces, it is not possible to correct it and the record or evidence of what has been said remains, cau- sing a possible misuse of the resource. This was not
Minaya et al., Computer Security and Virtual Activities: The New Times of Communication
possible in personal environments, however, in the new virtual spaces, it is a common practice with which great caution should be taken.
7.The installation of security mechanisms can ensu- re appropriate but not absolute data preservation, which can contribute to a better way of transmitting informa- tion with minimal risk.
REFERENCES
[1]S. Iñiguez, I. Iñiguez, S. Cruz y A. Iñiguez, «Rela- tionship between problematic internet use and sleep quality during the
[2]F.
[3]E. Navarro, «Historia de la comunicación,» 2005. [En línea]. Available: http://documenta.ftp.catedu.es/. [Último acceso: 2021].
[4]UTELBLOG, «La radio: imporancia y breve his-
toria,» 22 agosto 2012. [En línea]. Available: https://
[5]J. Gomera, «Historia de la eduación a distancia,» 2020. [En línea]. Available: https://josegomera.com/
CURRICULUM SUMMARY
[6]Historia Biografía, «La historia de la televisión,» 17 03 2017. [En línea]. Available:
[7]E. Sánchez, «Seguridad informática en entornos vir- tuales,» Seguridad, nº 20, pp.
[8]O. Mas, P. Jurado, C. Ruiz, E. Ferrández, A. Na- vío, J. Sanahuja y J. Tejada, «LAS COMUNIDADES VIRTUALES DE APRENDIZAJE,» Current Develop- ments in
[9]H. Pagola, A. Dams y J. Caracoche, «Laboratorio virtual para la enseñanza de seguridad informática,» Universidad de Buenos Aires , Buenos Aires, 2019.
[10]M. Salinas, «Entornos virtuales de aprendizaje en la escuela: tipos, modelo didáctico y rol del docente,» Pontificia Universidad Católica de Argentina, Buenos Aires, 2019.
[11]L.
[12]Revista Tips de Educación, «CIFRAS REVELA- DORAS DE LA EDUCACIÓN VIRTUAL,» 2020. [13]moodle, 2020. [En línea]. Available: https://stats. moodle.org/. [Último acceso: 2021].
Lic. Minaya Vera Cristhian Gustavo, Mgs.
Es docente- investigador en la carrera de Tecnologías de la Información de la Universidad Laica Eloy Alfaro de Manabí, en la ciudad de Chone, Manabí, Ecuador. Ha desarrollado sus investigaciones en el área de informática y sus diversas aplicaciones
Ing. Cornejo Moreira Frank Aquino, Mgs.
Es docente- investigador en la carrera de Tecnologías de la Información de la Universidad Laica Eloy Alfaro de Manabí, en la ciudad de ciudad de Chone, Manabí, Ecuador. Ha desarrollado sus investigaciones en el área de nuevas tecnologías, innovación y desarrollos científicos.
125
Minaya et al., Computer Security and Virtual Activities: The New Times of Communication
Lic. Briones Mera Junior Antonio, Mgs.
Es docente- investigador en la carrera de Tecnologías de la Información de la Universidad Laica Eloy Alfaro de Manabí, en la ciudad de ciudad de Chone, Manabí, Ecuador. Ha desarrollado sus investigaciones en el área de innovación tecnológica y aportes en la sociedad moderna.
126
Minaya et al., Computer Security and Virtual Activities: The New Times of Communication