A brain-compatible approach to the presentation of cyber security educational material
Information is an extremely important asset in modern society. It is used in most daily activities and transactions, and, thus, the importance of information is acknowledged by both organisational and private home information users. Unfortunately, as with any asset, there are often threats to this a...
Main Author: | |
---|---|
Format: | Others |
Language: | English |
Published: |
Nelson Mandela Metropolitan University
2012
|
Subjects: | |
Online Access: | http://hdl.handle.net/10948/d1019895 |
id |
ndltd-netd.ac.za-oai-union.ndltd.org-nmmu-vital-9819 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-netd.ac.za-oai-union.ndltd.org-nmmu-vital-98192017-12-21T04:22:47ZA brain-compatible approach to the presentation of cyber security educational materialReid, RayneData protection -- ManagementComputer security -- ManagementInformation is an extremely important asset in modern society. It is used in most daily activities and transactions, and, thus, the importance of information is acknowledged by both organisational and private home information users. Unfortunately, as with any asset, there are often threats to this asset and, therefore, an information security solution is required to protect information against potential threats. Human beings play a major role in the implementation and governing of an entire information security process and, therefore, they have responsibilities in this regard. Thus, the effectiveness of any information security solutions in either an organisational or a private context is dependent on the human beings involved in the process. Accordingly, if these human beings are either unaware or not knowledgeable about their roles in the security solution they become the weak link in the information security solutions and, thus, it is essential that all these information users be educated in order to combat any threats to the information security. Many of the current information security education programmes and materials are not effective, possibly because the majority of these current approaches have been designed without using a sound pedagogical theory. In addition, many of these programmes also only target organisational users. This, in turn, is problematic as information security education is required by everybody, organisational and private information users alike. This dissertation addressed the lack of a pedagogical basis in the designing of information security educational courses suited to an extremely broad target audience. Accordingly, the dissertation set out to demonstrate how a pedagogy, which is broadly used and accepted for a diverse target audience of learners, could be applied to the design of the presentation of a web based, cyber security educational courses.Nelson Mandela Metropolitan UniversityFaculty of Engineering, the Built Environment and Information Technology2012ThesisMastersMTechx, [347] leavespdfvital:9819http://hdl.handle.net/10948/d1019895EnglishNelson Mandela Metropolitan University |
collection |
NDLTD |
language |
English |
format |
Others
|
sources |
NDLTD |
topic |
Data protection -- Management Computer security -- Management |
spellingShingle |
Data protection -- Management Computer security -- Management Reid, Rayne A brain-compatible approach to the presentation of cyber security educational material |
description |
Information is an extremely important asset in modern society. It is used in most daily activities and transactions, and, thus, the importance of information is acknowledged by both organisational and private home information users. Unfortunately, as with any asset, there are often threats to this asset and, therefore, an information security solution is required to protect information against potential threats. Human beings play a major role in the implementation and governing of an entire information security process and, therefore, they have responsibilities in this regard. Thus, the effectiveness of any information security solutions in either an organisational or a private context is dependent on the human beings involved in the process. Accordingly, if these human beings are either unaware or not knowledgeable about their roles in the security solution they become the weak link in the information security solutions and, thus, it is essential that all these information users be educated in order to combat any threats to the information security. Many of the current information security education programmes and materials are not effective, possibly because the majority of these current approaches have been designed without using a sound pedagogical theory. In addition, many of these programmes also only target organisational users. This, in turn, is problematic as information security education is required by everybody, organisational and private information users alike. This dissertation addressed the lack of a pedagogical basis in the designing of information security educational courses suited to an extremely broad target audience. Accordingly, the dissertation set out to demonstrate how a pedagogy, which is broadly used and accepted for a diverse target audience of learners, could be applied to the design of the presentation of a web based, cyber security educational courses. |
author |
Reid, Rayne |
author_facet |
Reid, Rayne |
author_sort |
Reid, Rayne |
title |
A brain-compatible approach to the presentation of cyber security educational material |
title_short |
A brain-compatible approach to the presentation of cyber security educational material |
title_full |
A brain-compatible approach to the presentation of cyber security educational material |
title_fullStr |
A brain-compatible approach to the presentation of cyber security educational material |
title_full_unstemmed |
A brain-compatible approach to the presentation of cyber security educational material |
title_sort |
brain-compatible approach to the presentation of cyber security educational material |
publisher |
Nelson Mandela Metropolitan University |
publishDate |
2012 |
url |
http://hdl.handle.net/10948/d1019895 |
work_keys_str_mv |
AT reidrayne abraincompatibleapproachtothepresentationofcybersecurityeducationalmaterial AT reidrayne braincompatibleapproachtothepresentationofcybersecurityeducationalmaterial |
_version_ |
1718565573523144704 |