DOI: 10.47460/uct.v25i110.484

Computer security and virtual activities: The new times

of communication

Recibido (12/04/21 ) Aceptado (09/06/21)

Abstract: This work presents a bibliographic analysis of the aspects associated with computer security, from the social and academic point of view. The new times demand a more distant communication, lacking physical contact and with a wide incidence of use of computer media, which facilitate online interaction. However, it is important to highlight the criteria related to computer security, which will be the key necessary to maintain good communications that facilitate learning, human interaction, respect for people and the assessment of appropriate content. In this work, the activities most commonly used in current times where the health situation affects various aspects of daily life are taken into account. As main results, it is observed that computer security must meet certain minimum parameters to guarantee effective communication, and in addition to this, ethics and social values stand out.

Keywords: Computer security, effective communication, online interaction.

Seguridad informática y actividades virtuales:

Los nuevos tiempos de la comunicación

Resumen: En este trabajo se presenta un análisis bibliográfico de los aspectos asociados a la seguridad informática, desde el punto de vista social y académico. Los nuevos tiempos exigen una comunicación más distante, carente de contacto físico y con una amplia incidencia de uso de medios informáticos, que facilitan la interacción online. Sin embargo resulta importante destacar los criterios relacionados a la seguridad informática, que serán la clave necesaria para mantener buenas comunicaciones que faciliten el aprendizaje, la interacción humana, el respeto por las personas y la valoración de contenido apropiado. En este trabajo se toman en cuenta las actividades más comúnmente utilizadas en los tiempos actuales donde la situación de salud afecta varios aspectos de la vida cotidiana. Como principales resultados se observan que la seguridad informática debe cumplir ciertos parámetros mínimos para garantizar la comunicación efectiva, y adicional a ello se destaca la ética y valores sociales.

Palabras Clave: Seguridad informática, comunicación efectiva, interacción online.

119

Minaya et al., Computer Security and Virtual Activities: The New Times of Communication

I.INTRODUCTION

The present-day turned out to be very unexpected, with global health situations that no one common could have predicted, leading to new ways of living [1]. The- se new lifestyles have had to be learned unexpectedly, improvised, and on the fly. Such is the case of new ways of communicating, where the most effective and secu- re method has been online interaction, through digital platforms that allow us to exchange voice, audio, and video.

One of the main activities that were forced to migra- te to an online environment was education and acade- mic processes. This radical change in a process that al- ready had its shortcomings, and its natural and internal difficulties. Thus, online education came to occupy the spaces of home and family, but it also brought a set of elements associated with virtual communication, which were not foreseen and have had to be addressed in an improvised manner. Such is the case of computer secu- rity, ethical processes of communication, and privacy of communications.

This paper will evaluate the aspects associated with computer security and its impact on new lifestyles. This will take into account the repercussions in education with virtual environments, focused on the quality of co- llaborative work [2], as a necessary tool for classroom work, assessing learning styles.

For this study, some scientific articles, academic and bibliographic material were evaluated to learn about the relevance of virtual communities and the new ways of communicating. We took into account those works that considered virtual environments as new life alternati- ves, highlighting the methodologies necessary for an efficient and effective process in the new societies.

The work is composed of four fundamental sections, which comprise this introduction that contextualizes the subject of study, followed by the development with the theoretical foundation, then the methodology with the processes carried out, and finally the results and con- clusions.

II.DEVELOPMENT

Communication has always been a human need, in- dispensable for the interaction and formulation of ideas, laws, processes in societies [3]. The writing was born approximately 4,000 years before Christ, representing a way to communicate among humans, through sym- bols and graphics that represented characteristics of the environment. Later on, writing evolved from papyrus to paper telegrams [3]. All this meant a cultural, social, and technological advance for people.

A.The printing press and its impact on communi-

cation

In 1450 Guttenberg [3] devised a process of printed reproduction of information, thus creating the printing press. This type of development signified a new mode of communication in the society of the time. This gave way to the newspaper, and the way of transmitting a message, a piece of news, giving rise to a new form of communication, innovative and technological for that time. However, there were problems in assembling the documents, but it did not take long for linotype and mo- notype to appear, which optimized the production time of books and assembled material.

In this way, communication underwent an important advance and with it, the academic processes, the pro- cesses of scientific dissemination, and the transmission of knowledge was modified. This meant a change in daily life and in the ways of communicating.

Fig.1 shows the basic structure of the printing press, which meant a transforming technological development for the industrial era, and brought positive repercus- sions in the academy with the massive structuring of books and educational material.

Fig. 1. Basic structure of a printing plant [3].

B.Radio and social communication

In the 20th century, scientists discovered that it was possible to transmit voice through a cable [4], giving rise to the radio. This invention ushered in a new tech- nological and communicational era.

120

Minaya et al., Computer Security and Virtual Activities: The New Times of Communication

The radio began to be part of homes, institutions, and communication centers, it became an indispensable communication tool. And it changed the way of seeing the world by then. Radio is currently one of the ways to communicate for information purposes, for entertain- ment, as a mass medium of communication.

The first phases of distance education began with postcards, then followed by radio education in the USA

[5]in 1922. This type of method had important results in education and allowed the beginning of an era of dis- tance learning.

C.Television and its impact on communication In 1884, a large-scale communicational phenome-

non was born, televisión [6] represented an important development for society since it was not only possible to have audio but also moving images. Hence, a broader communication process began, but with less interaction than radio, which allowed a more direct exchange with people.

The media then moved into another phase of evolu- tion, but social exchanges continued around television, programs, soap operas, information.

D.The communications challenge: The Internet In 1985 the first open Internet network was created

[5]and it was then that an important leap was made in the way of communicating. The use of electronic mail was born and with it, direct, fast, and effective commu- nication over long distances. It was no longer essential to move from one place to another to transmit an im- mediate message. The E-mail also brought with it the possibility of attaching attachments, such as letters and documents, easily and immediately.

In 1996, the first fully online university was founded [5], but the laws of communication and high-perfor- mance computing had already been established in 1991. In this way, online teaching was born, creating youtube edu in 2009 and later creating the MOOC era.

The internet has been one of the most innovative inventions for human communications, not only has it had an impact on the way messages are transmitted, but it has also had an important impact on educational pro- cesses, teaching methodologies, and ways of learning.

E.Some scientific analysis

Sánchez [7] states that information security is a cha- llenge, a consequence of the proliferation of new tech- nologies. Virtual environments consist of a portable file, which, unlike physical space, does not take up much space and has no representative infrastructure, so the risk of being completely stolen is higher than that which could exist for physical space.

In this way, virtual machines are susceptible to com- puter attacks, so the virtual machine administrator must take precautions and be alert to possible system failures.

The storage of information on the network is a risk for the data, hence the need to create information and data protection. For this purpose, mechanisms are created to isolate each machine from the others and to maintain the reliability of the information and material stored.

But when talking about security, not only the sto- red data are taken into account, it is also important to highlight that the new forms of virtual communication have new tools for capturing voice, image, and video. This implies other aspects to evaluate when talking about security.

Technological tools appear as an option for edu- cation [8], not only to make it accessible in many di- rections and remotely, but also to replace face-to-face activities, which for pandemic reasons have had to be suspended.

In addition to having to learn in an improvised way, virtual education activities have had to comply with programs designed for face-to-face environments. This old-fashioned way of teaching with a modern method has caused a major change in education and has had a drastic impact on learning (Fig. 2). For example, there is still no law that guarantees the security of the infor- mation handled in virtual spaces, such as the case of images of minors who are forced to watch classes with the camera on, exposing their faces. It is also possible to highlight the exposure of teachers in virtual spaces.

121

Minaya et al., Computer Security and Virtual Activities: The New Times of Communication

Fig. 2. Online education as an ancient teaching with a modern method.

In this way, online education becomes a problem for the academic community, because it maintains old pro- cesses in modern methods, affecting communication in the teaching process.

Online education could be a tool for the develop- ment of more open professionals, with greater capaci- ty for abstraction, greater skills for teamwork, greater skills for self-learning and greater mastery of the indi- vidual learning style, however, maintaining face-to-face methods in an online education may mean the delay and deterioration of the professional of the future.

The role of information security will be not only in the preservation and care of information, but also in the ways to maintain the integrity of the people involved, of what is said and done in virtual spaces.

Authors specialized in computer security [9] affirm that the use of Linux in the design of cryptographic and computer security platforms can be a viable and relia- ble alternative. This type of tool offers the possibilities of extension and fast configurations in computational environments.

Salinas [10] states that virtual environments have be- come a socio-cultural characteristic and that the school represents the appropriate space for the digital literacy necessary for the management of computer tools of the new generations. Generating virtual teaching spaces is optimal to disseminate the teaching of digital tools, and also allows to address three basic elements that are the knowledge and technical use of computers, the acquisi- tion of cognitive skills for the use of multimedia resour- ces, and finally allows the development of critical skills

for the valuation of computer tools.

Currently, a virtual learning environment includes some basic elements such as:

•Classroom material is permanently available.

•It allows multidirectional communication among those involved.

•Shared work environment •Collaborative activities. •Need for active participation.

There are a small number of virtual learning spaces, which are e-learning platforms, blogs and web pages, wikis, and social networks [10], which can be distingui- shed from each other by the technological dimensions and the possibilities of interaction between participants.

Some authors [11] have exposed the most relevant aspects of security for educational platforms, as is the case of moodle. The security aspects are then raised in four important aspects:

Server security

The platform is not linked to the server, it is inde- pendent of it. But it is of great importance to have an appropriate antivirus, control over updates, manage- ment, and control over the use of the open internet, use of passwords, separation of the moodle data folder, prevention of remote access, appropriate configuration to prevent the intervention of other unauthorized IP ad- dresses [11].

122

Minaya et al., Computer Security and Virtual Activities: The New Times of Communication

Authentication protection

An efficient way to ensure the user authentication process is through manual account creation so that the administrator can give access to the accounts and avoid possible unauthorized access. However, this type of process may not be efficient in the case of massive accounts, for which mail authentication is more conve- nient, provided that there is an appropriate configura- tion.

Access security

The use of passwords has been a common activity in recent years, however, the platform administrator must request certain criteria to ensure a reliable password. There are no standardized parameters for password requirements, however, some criteria can improve the quality of the password, such as the use of alphanume- ric, upper and lower case, a minimum length of 8 digits, and some special characters.

Another important aspect of security is that passwords should be easy for the user to remember so that they do not have to reset them frequently.

The creation of secure roles

The moodle platform comes with seven secure ro- les configured; administrator, course creator, teacher, non-editing teacher, student, guest, authenticated user. Each of which has specific permissions well defined. If this role assignment is not done properly, there is a risk of internal attacks.

III. METHODOLOGY

For this paper, we analyzed academic works related to new forms of communication and the importance of computer security. The new communication trends are a trigger for the generation of laws and statutes to ensure data protection, but also to ensure the shared informa- tion such as image, sound, video of people interacting in communication.

We analyzed the securities referred to the communi- cation platforms, but also the securities referred to the people or users, to the preservation of images, photos, voices, videos of those involved in the communication process.

Figure 1 describes the phases carried out for the bi- bliographic review of this work. At first, a delimitation of the information was carried out, to then evaluate the search strategies and define the criteria for exclu- sion and inclusion of works. In this case, an exclusion criterion was considered to be those aspects that were not focused on communication and that did not have a technological approach; therefore, the inclusion crite- ria were based on works associated with informatics, security, and new communication trends. The selection and processing of data were based on the argumentation of all the informatics and scientific elements that make current communications possible and that are transfor- mative in virtual social environments.

Fig.3. Phases of the bibliographic review

IV. RESULTS

After reviewing the academic and scientific material, it was possible to find the following results:

1.A significant number of professionals have opted for online studies, as they are convenient for self-management of time and self-learning. In the USA, 83% of people opted for online courses in 2020. But what is even more interesting is that 68% of online courses are taken by people over the age

of 40 [12].

2.The use of educational platforms such as moodle has grown significantly in the last year; at least 246 countries use this tool for access to online education. In South America (Fig.4) the platform has a very high impact, and allows effec- tive interaction between students and teachers [13].

123

Minaya et al., Computer Security and Virtual Activities: The New Times of Communication

Brazil has the highest number of moodle platforms installed, with a total of 9418 sites, while Ecuador has 3566 registered sites. However, considering a popula- tion of 211 million inhabitants in Brazil and 17.37 mi- llion in Ecuador, the use of moodle is higher in Ecuador than in Brazil [13].

3.The key factors that stand out in online communi- cation are associated with customer service, with secu- rity being a relevant aspect for users. The preservation of data and the guarantee of information security are necessarily important elements for all online activities. However, in a survey conducted, it was observed that 66% of users give more weight to the content of aca- demic information than to other aesthetic aspects of the website [12].

4.Today's communications require clear regulations regarding computer security, but there are still no we- ll-defined parameters for controlling security on com- puter sites. Personal information is still vulnerable, and therefore the use of photos, cameras, and personal data are susceptible to theft and manipulation. In Ecuador, there is no data protection law, much less a law of sanc- tions for the misuse of information. Therefore, the use of platforms and digital media continues to be a risk for users, especially in the education sector where students and teachers share virtual spaces permanently.

5.In the United States, only 33% of students stated that they were not satisfied with online education [12]. In the past, face-to-face education required students to travel long distances, which often had implicit impli- cations, such as renting apartments and rooms to stay during the academic period, as well as living in other

124

cities or areas closer to the center of study.

6.Effective learning recognizes the virtuality of spa- ces that allow students to interact from the comfort of their homes, without wasting time and money in traffic, rentals, and resources of the presentiality, such as the use of appropriate clothing, backpacks, and other mate- rials of the academy.

V. CONCLUSIONS

Once the documentary review on computer security has been carried out, it is possible to draw the following conclusions:

1.Computer security comprises technical aspects and personal aspects, which include the installation of antivirus, the proper use of passwords but also the way people communicate, taking into account the protection of sensitive information such as photos and personal data.

2.The new ways of communicating, through online platforms, create virtual communities, which open spa- ce to a new way of exchanging information, making it more sensitive to theft and manipulation. It is, therefo- re, necessary to review the environments of meetings and virtual activities that are carried out, to ensure the proper use of shared information.

3.Being responsible for the use of information in classrooms and virtual spaces should be an added value of current teaching, which promotes respect for photos and videos shared for teaching, and that they are not used for mockery, offenses, and other inappropriate uses.

4.The use of computer tools has not only become the common way to interact but will probably be the best way to interact in the coming years, in a way that ensures health conditions and also allows people to self-manage their time to carry out multiple activities simultaneously.

5.Reservations in the use of confidential and perso- nal information must be made rigorously and carefully because even if there were strict laws for the conserva- tion and good use of personal material, it will always be difficult to control the bad actions of unscrupulous peo- ple who improperly take data for improper treatment of them.

6.The correct use of words and conversations in vir- tual environments can ensure greater peace of mind in the processing of information, since once a recording of a class, conversation, or social activity has been made in online spaces, it is not possible to correct it and the record or evidence of what has been said remains, cau- sing a possible misuse of the resource. This was not

Minaya et al., Computer Security and Virtual Activities: The New Times of Communication

possible in personal environments, however, in the new virtual spaces, it is a common practice with which great caution should be taken.

7.The installation of security mechanisms can ensu- re appropriate but not absolute data preservation, which can contribute to a better way of transmitting informa- tion with minimal risk.

REFERENCES

[1]S. Iñiguez, I. Iñiguez, S. Cruz y A. Iñiguez, «Rela- tionship between problematic internet use and sleep quality during the COVID-19 pandemic,» Universi- dad, Ciencia y Tecnología, vol. 25, nº 109, pp. 116-123, 2021.

[2]F. Mora-Vicarioli y C. Hooper-Simpson, «Collabo- rative Work in Virtual Learning Environments: Some Reflections and Prospects of Students,» Educare elec- tronic journal, vol. 20, nº 2, pp. 1-26, 2016.

[3]E. Navarro, «Historia de la comunicación,» 2005. [En línea]. Available: http://documenta.ftp.catedu.es/. [Último acceso: 2021].

[4]UTELBLOG, «La radio: imporancia y breve his-

toria,» 22 agosto 2012. [En línea]. Available: https:// www.utel.edu.mx/blog/10-consejos-para/breve-histo- ria-de-la-radio/. [Último acceso: 05 junio 2021].

[5]J. Gomera, «Historia de la eduación a distancia,» 2020. [En línea]. Available: https://josegomera.com/

CURRICULUM SUMMARY

academico/conoce-la-historia-de-la-educacion-a-dis- tancia/. [Último acceso: 06 06 2021].

[6]Historia Biografía, «La historia de la televisión,» 17 03 2017. [En línea]. Available: https://historia-biogra- fia.com/historia-de-la-television/. [Último acceso: 06 06 2021].

[7]E. Sánchez, «Seguridad informática en entornos vir- tuales,» Seguridad, nº 20, pp. 4-16, 2014.

[8]O. Mas, P. Jurado, C. Ruiz, E. Ferrández, A. Na- vío, J. Sanahuja y J. Tejada, «LAS COMUNIDADES VIRTUALES DE APRENDIZAJE,» Current Develop- ments in Technology-Assisted Education (, pp. 1462- 1468, 2006.

[9]H. Pagola, A. Dams y J. Caracoche, «Laboratorio virtual para la enseñanza de seguridad informática,» Universidad de Buenos Aires , Buenos Aires, 2019.

[10]M. Salinas, «Entornos virtuales de aprendizaje en la escuela: tipos, modelo didáctico y rol del docente,» Pontificia Universidad Católica de Argentina, Buenos Aires, 2019.

[11]L. Romero-Moreno, «La seguridad informática en el trabajo con la plataforma moodle,» Rev. de Humani- dades, vol. 17, pp. 169-190, 2010.

[12]Revista Tips de Educación, «CIFRAS REVELA- DORAS DE LA EDUCACIÓN VIRTUAL,» 2020. [13]moodle, 2020. [En línea]. Available: https://stats. moodle.org/. [Último acceso: 2021].

Lic. Minaya Vera Cristhian Gustavo, Mgs. https://orcid.org/0000-0003-0143-6810, cristhian.minaya@uleam.edu.ec

Es docente- investigador en la carrera de Tecnologías de la Información de la Universidad Laica Eloy Alfaro de Manabí, en la ciudad de Chone, Manabí, Ecuador. Ha desarrollado sus investigaciones en el área de informática y sus diversas aplicaciones

Ing. Cornejo Moreira Frank Aquino, Mgs. https://orcid.org/0000-0002-8801-9819 frank.cornejo@uleam.edu.ec

Es docente- investigador en la carrera de Tecnologías de la Información de la Universidad Laica Eloy Alfaro de Manabí, en la ciudad de ciudad de Chone, Manabí, Ecuador. Ha desarrollado sus investigaciones en el área de nuevas tecnologías, innovación y desarrollos científicos.

125

Minaya et al., Computer Security and Virtual Activities: The New Times of Communication

Lic. Briones Mera Junior Antonio, Mgs. https://orcid.org/0000-0003-2211-3818 junior.briones@uleam.edu.ec

Es docente- investigador en la carrera de Tecnologías de la Información de la Universidad Laica Eloy Alfaro de Manabí, en la ciudad de ciudad de Chone, Manabí, Ecuador. Ha desarrollado sus investigaciones en el área de innovación tecnológica y aportes en la sociedad moderna.

126

Minaya et al., Computer Security and Virtual Activities: The New Times of Communication