Computer security and virtual activities: The new times of communication


Computer security
effective communication
online interaction

How to Cite

Minaya Vera, C. G., Cornejo Moreira, F. A., Briones Mera, J. A., & Moreira Calderon, J. L. (2021). Computer security and virtual activities: The new times of communication. Universidad Ciencia Y Tecnología, 25(110), 119-126.


This work presents a bibliographic analysis of the aspects associated with computer security, from the social and academic point of view. The new times demand a more distant communication, lacking physical contact and with a wide incidence of use of computer media, which facilitate online interaction. However, it is important to highlight the criteria related to computer security, which will be the key necessary to maintain good communications that facilitate learning, human interaction, respect for people and the assessment of appropriate content. In this work, the activities most commonly used in current times where the health situation affects various aspects of daily life are taken into account. As main results, it is observed that computer security must meet certain minimum parameters to guarantee effective communication, and in addition to this, ethics and social values stand out.

Keywords: Computer security, effective communication, online interaction.


[1]S. Iñiguez, I. Iñiguez, S. Cruz y A. Iñiguez, «Relationship between problematic internet use and sleep quality during the COVID-19 pandemic,» Universidad, Ciencia y Tecnología, vol. 25, nº 109, pp. 116-123, 2021.

[2]F. Mora-Vicarioli y C. Hooper-Simpson, «Collaborative Work in Virtual Learning Environments: Some Reflections and Prospects of Students,» Educare electronic journal, vol. 20, nº 2, pp. 1-26, 2016.

[3]E. Navarro, «Historia de la comunicación,» 2005. [Online]. Available: [Last Access: 2021].

[4]UTELBLOG, «La radio: imporancia y breve historia,» 22 agosto 2012. [Online]. Available: [Last Access: 05 junio 2021].

[5]J. Gomera, «Historia de la eduación a distancia,» 2020. [Online]. Available: [Last Access: 06 06 2021].

[6]Historia Biografía, «La historia de la televisión,» 17 03 2017. [Online]. Available: [Last Access: 06 06 2021].

[7]E. Sánchez, «Seguridad informática en entornos virtuales,» Seguridad, nº 20, pp. 4-16, 2014.

[8]O. Mas, P. Jurado, C. Ruiz, E. Ferrández, A. Navío, J. Sanahuja y J. Tejada, «LAS COMUNIDADES VIRTUALES DE APRENDIZAJE,» Current Developments in Technology-Assisted Education, pp. 1462-1468, 2006.

[9]H. Pagola, A. Dams y J. Caracoche, «Laboratorio virtual para la enseñanza de seguridad informática,» Universidad de Buenos Aires , Buenos Aires, 2019.

[10]M. Salinas, «Entornos virtuales de aprendizaje en la escuela: tipos, modelo didáctico y rol del docente,» Pontificia Universidad Católica de Argentina, Buenos Aires, 2019.

[11]L. Romero-Moreno, «La seguridad informática en el trabajo con la plataforma moodle,» Rev. de Humanidades, vol. 17, pp. 169-190, 2010.

[12]Revista Tips de Educación, «CIFRAS REVELADORAS DE LA EDUCACIÓN VIRTUAL,» 2020.

[13]moodle, 2020. [Online]. Available: [Last Access: 2021].
Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.


Download data is not yet available.