MOBILE SOFTWARE FOR ENHANCING CYBERCULTURE

D. Turcu, Florin Sparlu
{"title":"MOBILE SOFTWARE FOR ENHANCING CYBERCULTURE","authors":"D. Turcu, Florin Sparlu","doi":"10.12753/2066-026x-18-228","DOIUrl":null,"url":null,"abstract":"In the new information age, mobility has become a sure thing. Smart phones and tablets are among the most dynamic devices and, most likely, the focal point of the technological development of modern electronics. By analyzing this dynamics, it is difficult to give a definitive definition of the term. We are increasingly (and more) dependent on these technologies, communication, connection, transfer and information. All this are possible due to the mobile applications running on these devices. That's why in this paper we'll highlight how mobile applications help users enhance their cyber security culture. Most applications can be downloaded from a platform or store and are generally created and developed by companies like Apple, Google, Windows, BlackBerry, etc. Downloading is free of charge, except for certain applications available in professional versions that need to be paid. There are hundreds of applications with information about cyber security, but the difference does not make by content, but the way it is presented, the ease of finding it, the added value. The application architecture must be simple and easy to understand. It has to emerge from the style of using a smartphone, rely on already reflexive behaviors and do not need to have its own user manual. What if, in addition to telling the user the traffic status, a GSM distributor application would suggest traffic variants but of the higher speeds? Or would it also communicate information about the degree of confidentiality, integrity and availability? We'll show how different mobile applications bring attention to cyber security laws in different countries. In addition, some mobile applications introduce dictionaries of cyber security-specific terms, ways to report cyber security events / incidents.","PeriodicalId":371908,"journal":{"name":"14th International Conference eLearning and Software for Education","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"14th International Conference eLearning and Software for Education","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.12753/2066-026x-18-228","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

In the new information age, mobility has become a sure thing. Smart phones and tablets are among the most dynamic devices and, most likely, the focal point of the technological development of modern electronics. By analyzing this dynamics, it is difficult to give a definitive definition of the term. We are increasingly (and more) dependent on these technologies, communication, connection, transfer and information. All this are possible due to the mobile applications running on these devices. That's why in this paper we'll highlight how mobile applications help users enhance their cyber security culture. Most applications can be downloaded from a platform or store and are generally created and developed by companies like Apple, Google, Windows, BlackBerry, etc. Downloading is free of charge, except for certain applications available in professional versions that need to be paid. There are hundreds of applications with information about cyber security, but the difference does not make by content, but the way it is presented, the ease of finding it, the added value. The application architecture must be simple and easy to understand. It has to emerge from the style of using a smartphone, rely on already reflexive behaviors and do not need to have its own user manual. What if, in addition to telling the user the traffic status, a GSM distributor application would suggest traffic variants but of the higher speeds? Or would it also communicate information about the degree of confidentiality, integrity and availability? We'll show how different mobile applications bring attention to cyber security laws in different countries. In addition, some mobile applications introduce dictionaries of cyber security-specific terms, ways to report cyber security events / incidents.
加强网络文化的流动软件
在新的信息时代,移动性已经成为一件必然的事情。智能手机和平板电脑是最具活力的设备之一,很可能是现代电子技术发展的焦点。通过分析这种动态,很难给这个术语下一个明确的定义。我们越来越(越来越)依赖这些技术、通信、连接、传输和信息。所有这些都是由于在这些设备上运行的移动应用程序。这就是为什么在本文中,我们将重点介绍移动应用程序如何帮助用户增强他们的网络安全文化。大多数应用程序可以从平台或商店下载,通常是由苹果、谷歌、Windows、黑莓等公司创建和开发的。下载是免费的,除了某些应用程序的专业版本需要付费。有数百种应用程序包含有关网络安全的信息,但区别不在于内容,而在于呈现的方式、查找的难易程度和附加价值。应用程序体系结构必须简单且易于理解。它必须从使用智能手机的方式中脱颖而出,依赖于已经反射的行为,不需要有自己的用户手册。如果GSM分发应用程序除了告诉用户流量状态外,还会建议更高速度的流量变体,那会怎么样?或者它还会传达有关机密性、完整性和可用性程度的信息吗?我们将展示不同的移动应用程序如何引起不同国家对网络安全法的关注。此外,一些移动应用程序引入了网络安全特定术语的字典,以及报告网络安全事件/事件的方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信