This page has only limited features, please log in for full access.

Prof. Joan Arnedo Moreno
Universitat Oberta de Catalunya

Basic Info


Research Keywords & Expertise

0 E-Learning
0 Education
0 Serious Games
0 Video Games
0 Games and gamification

Honors and Awards

The user has no records in this section


Career Timeline

The user has no records in this section.


Short Biography

The user biography is not available.
Following
Followers
Co Authors
The list of users this user is following is empty.
Following: 0 users

Feed

Journal article
Published: 03 July 2021 in Applied Sciences
Reads 0
Downloads 0

Computer security is an important part of the computer science (CS) curriculum in all kinds of universities. Although the educational approach tends to be highly technical and practical, it cannot be avoided that some understanding and memorizing of the core concepts is necessary beforehand. One method that has been found to work in favor of human psychology, and of special interest in the case of online learning, where student motivation is at a higher stake, would be to present such content as memorable and relatable situations to the reader, using some form of fictional storytelling. However, this approach must always serve its educational purpose first, following a set of sound design principles. This paper presents a study including 111 participants to evaluate the convenience of using a digital book called the “novelette”, which relies on storytelling, to teach computer security concepts in the CS degree of Universitat Oberta de Catalunya (UOC), a 100% online university. The study involved two questionnaires to gather quantitative and qualitative information about the format, content and students’ perception. This study shows that the validity and usefulness of this approach is on par with traditional ones, but also has a higher impact on student motivation and self-perception of the acquired knowledge.

ACS Style

Joan Arnedo-Moreno; Victor Garcia-Font. A Study on the Design and Application of Fictional Storytelling in Online Learning of Computer Security. Applied Sciences 2021, 11, 6185 .

AMA Style

Joan Arnedo-Moreno, Victor Garcia-Font. A Study on the Design and Application of Fictional Storytelling in Online Learning of Computer Security. Applied Sciences. 2021; 11 (13):6185.

Chicago/Turabian Style

Joan Arnedo-Moreno; Victor Garcia-Font. 2021. "A Study on the Design and Application of Fictional Storytelling in Online Learning of Computer Security." Applied Sciences 11, no. 13: 6185.

Journal article
Published: 11 June 2021 in Sustainability
Reads 0
Downloads 0

Considerable changes have occurred in language learning with the introduction of gameful approaches in the classroom and the increase in the popularity of language applications like Duolingo. A review of existing studies on such approaches to language learning shows that gamification tends to be the most popular approach. However, this popularity has been achieved at the expense of other gameful approaches, such as the use of digital games. To gain a clearer picture of the developments and gaps in the digital game-based learning research, this paper examines and categorizes observations about game elements used in published papers (n = 114) where serious and digital games were tested in language education settings. Game element analysis reveals that (1) the most frequently occurring elements in digital game-based language learning (DGBLL) are feedback, theme, points, narrative, and levels; (2) even though there was significant variance in the number of elements observed in DGBLL, both the bespoke and off-the-shelf games show similar high-frequency elements; (3) DGBLL has been applied to vocabulary acquisition and retention in many cases, but lacks implementation and testing in input and output language skills; (4) although there is some consensus on the most frequent elements, the design patterns of common elements according to age group and target language skill show considerable variance; (5) more research is needed on less common design elements that have shown promise in encouraging language acquisition. The synthesis of information from the collected papers contributes to knowledge regarding DGBLL application design and will help formulate guidelines and detect efficacy patterns as the field continues to grow.

ACS Style

Terence Govender; Joan Arnedo-Moreno. An Analysis of Game Design Elements Used in Digital Game-Based Language Learning. Sustainability 2021, 13, 6679 .

AMA Style

Terence Govender, Joan Arnedo-Moreno. An Analysis of Game Design Elements Used in Digital Game-Based Language Learning. Sustainability. 2021; 13 (12):6679.

Chicago/Turabian Style

Terence Govender; Joan Arnedo-Moreno. 2021. "An Analysis of Game Design Elements Used in Digital Game-Based Language Learning." Sustainability 13, no. 12: 6679.

Review
Published: 01 July 2018 in Computers & Security
Reads 0
Downloads 0

• Learners are both computer users and creators of academic content. • Learner authentication is a two-tier process that comprises identity verification and validation of authorship. • Continuous assessment entails continuous identity and authorship verification. • Effectiveness of e-assessment security strategies is underexplored in literature. • Behavioral biometrics is a promising method that validates both user identity and authorship of the submitted content. The growing scope and changing nature of academic programs provide a challenge to the integrity of testing and examination protocols, prompting academic administrators to re-evaluate the design of learner performance assessment. This article reviews the research on a number of identity and authorship assurance approaches employed to the bolster security of assessment activities.A total of 54 articles, published between 2000 and 2016,were reviewed. Research in the area of learner identity and authorship assurance is important because the award of course credits to unverified entities raises questions over institutional credibility. We argue that learner identity is comprised of two distinct layers: physical and behavioral, where identity and authorship are criteria that both need to be confirmed to maintain a reasonable level of academic integrity.

ACS Style

Alexander Amigud; Joan Arnedo-Moreno; Thanasis Daradoumis; Ana-Elena Guerrero-Roldan. An integrative review of security and integrity strategies in an academic environment: Current understanding and emerging perspectives. Computers & Security 2018, 76, 50 -70.

AMA Style

Alexander Amigud, Joan Arnedo-Moreno, Thanasis Daradoumis, Ana-Elena Guerrero-Roldan. An integrative review of security and integrity strategies in an academic environment: Current understanding and emerging perspectives. Computers & Security. 2018; 76 ():50-70.

Chicago/Turabian Style

Alexander Amigud; Joan Arnedo-Moreno; Thanasis Daradoumis; Ana-Elena Guerrero-Roldan. 2018. "An integrative review of security and integrity strategies in an academic environment: Current understanding and emerging perspectives." Computers & Security 76, no. : 50-70.

Chapter
Published: 10 February 2018 in Advances on P2P, Parallel, Grid, Cloud and Internet Computing
Reads 0
Downloads 0

Data analyses provide the means for monitoring the quality of academic processes and the means for assessing the fiscal and operational health of an organization. Data-driven decision making can help to empower academic leaders, faculty, and staff with quantitative insights that guide strategies pertaining to enrollment and retention, student support and quality assurance, communication, bullying intervention, academic progress, and academic integrity . However, the integration of analytics into the institutional context is not a trivial process. Much of the analytics approaches discussed in the literature take a theoretical stance outlining main considerations but lacking the pragmatic edge. Our aim in this chapter is to assist academic leaders in undertaking analytics design and implementation. To this end, we synthesize the existing research and propose a procedural framework for integrating data analysis techniques and methods into a process that facilitates data-driven decision making by aligning institutional needs with actionable strategies.

ACS Style

Alexander Amigud; Thanasis Daradoumis; Joan Arnedo-Moreno; Ana-Elena Guerrero-Roldan. A Procedural Learning and Institutional Analytics Framework. Advances on P2P, Parallel, Grid, Cloud and Internet Computing 2018, 27 -46.

AMA Style

Alexander Amigud, Thanasis Daradoumis, Joan Arnedo-Moreno, Ana-Elena Guerrero-Roldan. A Procedural Learning and Institutional Analytics Framework. Advances on P2P, Parallel, Grid, Cloud and Internet Computing. 2018; ():27-46.

Chicago/Turabian Style

Alexander Amigud; Thanasis Daradoumis; Joan Arnedo-Moreno; Ana-Elena Guerrero-Roldan. 2018. "A Procedural Learning and Institutional Analytics Framework." Advances on P2P, Parallel, Grid, Cloud and Internet Computing , no. : 27-46.

Book chapter
Published: 01 January 2018 in Security and Resilience in Intelligent Data-Centric Systems and Communication Networks
Reads 0
Downloads 0
ACS Style

Luis Gómez-Miralles; Joan Arnedo-Moreno. Hardening iOS Devices Against Remote Forensic Investigation. Security and Resilience in Intelligent Data-Centric Systems and Communication Networks 2018, 261 -283.

AMA Style

Luis Gómez-Miralles, Joan Arnedo-Moreno. Hardening iOS Devices Against Remote Forensic Investigation. Security and Resilience in Intelligent Data-Centric Systems and Communication Networks. 2018; ():261-283.

Chicago/Turabian Style

Luis Gómez-Miralles; Joan Arnedo-Moreno. 2018. "Hardening iOS Devices Against Remote Forensic Investigation." Security and Resilience in Intelligent Data-Centric Systems and Communication Networks , no. : 261-283.

Book chapter
Published: 01 January 2018 in Security and Resilience in Intelligent Data-Centric Systems and Communication Networks
Reads 0
Downloads 0
ACS Style

Ahmed Alzubi; Alba Amato; Alessandra De Benedictis; Antonio Scarfò; Arif Sari; Chang Choi; Christian Esposito; David Sembroiz; Davide Careglio; Domenico Cotroneo; Ersin Caglar; Francesco Palmieri; Gaetano Papale; Gianfranco Cerullo; Gianni D’Angelo; Giovanni Mazzeo; Jian Shen; Joan Arnedo-Moreno; Luigi Sgaglione; Luis Gómez-Miralles; Marcello Cinque; Mario Fiorentino; Massimiliano Rak; Massimo Ficco; Mauro Iacono; Michał Choraś; Petar Kochovski; Rafał Kozik; Salvatore Rampone; Salvatore Venticinque; Sergio Ricciardi; Stefano Marrone; Stefano Russo; Umberto Villano; Valentina Casola; Vlado Stankovski; Bruno Ragucci. Contributors. Security and Resilience in Intelligent Data-Centric Systems and Communication Networks 2018, 1 .

AMA Style

Ahmed Alzubi, Alba Amato, Alessandra De Benedictis, Antonio Scarfò, Arif Sari, Chang Choi, Christian Esposito, David Sembroiz, Davide Careglio, Domenico Cotroneo, Ersin Caglar, Francesco Palmieri, Gaetano Papale, Gianfranco Cerullo, Gianni D’Angelo, Giovanni Mazzeo, Jian Shen, Joan Arnedo-Moreno, Luigi Sgaglione, Luis Gómez-Miralles, Marcello Cinque, Mario Fiorentino, Massimiliano Rak, Massimo Ficco, Mauro Iacono, Michał Choraś, Petar Kochovski, Rafał Kozik, Salvatore Rampone, Salvatore Venticinque, Sergio Ricciardi, Stefano Marrone, Stefano Russo, Umberto Villano, Valentina Casola, Vlado Stankovski, Bruno Ragucci. Contributors. Security and Resilience in Intelligent Data-Centric Systems and Communication Networks. 2018; ():1.

Chicago/Turabian Style

Ahmed Alzubi; Alba Amato; Alessandra De Benedictis; Antonio Scarfò; Arif Sari; Chang Choi; Christian Esposito; David Sembroiz; Davide Careglio; Domenico Cotroneo; Ersin Caglar; Francesco Palmieri; Gaetano Papale; Gianfranco Cerullo; Gianni D’Angelo; Giovanni Mazzeo; Jian Shen; Joan Arnedo-Moreno; Luigi Sgaglione; Luis Gómez-Miralles; Marcello Cinque; Mario Fiorentino; Massimiliano Rak; Massimo Ficco; Mauro Iacono; Michał Choraś; Petar Kochovski; Rafał Kozik; Salvatore Rampone; Salvatore Venticinque; Sergio Ricciardi; Stefano Marrone; Stefano Russo; Umberto Villano; Valentina Casola; Vlado Stankovski; Bruno Ragucci. 2018. "Contributors." Security and Resilience in Intelligent Data-Centric Systems and Communication Networks , no. : 1.

Conference paper
Published: 01 November 2015 in 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)
Reads 0
Downloads 0

Smartphones and mobile devices nowadays accompany each of us in our pockets, holding vast amounts of personal data. The iOS platform has gained popularity in the last years, in particular in enterprise deployments, due to its supposed higher level of security. Recent research has pinpointed a number of mechanisms that are being abused today in order to compromise the security of iOS devices. In this paper, we present Lockup, a proof of concept tool that applies various mitigation measures in order to protect iOS devices against those attacks.

ACS Style

Luis Gomez-Miralles; Joan Arnedo-Moreno. Lockup: A Software Tool to Harden iOS by Disabling Default Lockdown Services. 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC) 2015, 718 -723.

AMA Style

Luis Gomez-Miralles, Joan Arnedo-Moreno. Lockup: A Software Tool to Harden iOS by Disabling Default Lockdown Services. 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC). 2015; ():718-723.

Chicago/Turabian Style

Luis Gomez-Miralles; Joan Arnedo-Moreno. 2015. "Lockup: A Software Tool to Harden iOS by Disabling Default Lockdown Services." 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC) , no. : 718-723.

Research article
Published: 27 April 2015 in Mobile Information Systems
Reads 0
Downloads 0

Since its presentation by Apple, both the iPhone and iPad devices have achieved great success and gained widespread popularity. This fact, added to the given idiosyncrasies of these new portable devices and the kind of data they may store, opens new opportunities in the field of computer forensics. In 2010, version 4 of the iOS operating system introduced AirPrint, a simple and driverless wireless printing functionality supported by hundreds of printer models from all major vendors. This paper describes the traces left in the iOS device when AirPrint is used and presents a method for recovering content and metadata of documents that have been printed.

ACS Style

Luis Gomez-Miralles; Joan Arnedo-Moreno. AirPrint Forensics: Recovering the Contents and Metadata of Printed Documents from iOS Devices. Mobile Information Systems 2015, 2015, 1 -10.

AMA Style

Luis Gomez-Miralles, Joan Arnedo-Moreno. AirPrint Forensics: Recovering the Contents and Metadata of Printed Documents from iOS Devices. Mobile Information Systems. 2015; 2015 ():1-10.

Chicago/Turabian Style

Luis Gomez-Miralles; Joan Arnedo-Moreno. 2015. "AirPrint Forensics: Recovering the Contents and Metadata of Printed Documents from iOS Devices." Mobile Information Systems 2015, no. : 1-10.

Journal article
Published: 31 January 2012 in Computers & Mathematics with Applications
Reads 0
Downloads 0

The Apple iPad is a popular tablet device presented by Apple in early 2010. The idiosyncracies of this new portable device and the kind of data it may store open new opportunities in the field of computer forensics. Given that its design, both internal and external, is very similar to the iPhone, the current easiest way to obtain a forensic image is to install an SSH server and some tools, dump its internal storage and transfer it to a remote host via wireless networking. This approach may require up to 20 hours. In this paper, we present a novel approach that takes advantage of an undocumented feature so that it is possible to use a cheap iPad accessory, the Camera Connection Kit, to image the disk to an external hard drive attached via USB connection, greatly reducing the required time.

ACS Style

Luis Gomez-Miralles; Joan Arnedo-Moreno. Versatile iPad forensic acquisition using the Apple Camera Connection Kit. Computers & Mathematics with Applications 2012, 63, 544 -553.

AMA Style

Luis Gomez-Miralles, Joan Arnedo-Moreno. Versatile iPad forensic acquisition using the Apple Camera Connection Kit. Computers & Mathematics with Applications. 2012; 63 (2):544-553.

Chicago/Turabian Style

Luis Gomez-Miralles; Joan Arnedo-Moreno. 2012. "Versatile iPad forensic acquisition using the Apple Camera Connection Kit." Computers & Mathematics with Applications 63, no. 2: 544-553.