Abstract
Organizational end-user information security end-user education is becoming increasingly more important in the current information society. Without the active co-operation of knowledgeable employees, organizations cannot effectively protect their valuable information resources. Most current information security educational programs lack a theoretical basis. This paper briefly examines the use of Bloom’s learning taxonomy to help address this lack of theoretical basis. The paper further investigates the applicability of the Cisco Networking Academy Program’s (CNAP) instructional model for the delivery of end-user information security instructional content, planned with the assistance of Bloom’s taxonomy.
Chapter PDF
Similar content being viewed by others
References
Carr, N.G.: IT Doesn’t Matter. Harvard Business Review, 41–49 (2003)
Mitnick, K., Simon, W.: The art of deception: Controlling the human element of security. Wiley Publishing, Chichester (2002)
Puhakainen, P.: A design theory for information security awareness. PhD thesis, Acta Universitatis Ouluensis A 463, The University of Oulu (2006)
Siponen, M.: A conceptual foundation for organizational information security awareness. Information Management & Computer Security 8(1), 31–41 (2000)
Van Niekerk, J., Von Solms, R.: Bloom’s taxonomy for information security education. Information Security South Africa (ISSA), Johannesburg, South Africa (2008)
Van Niekerk, J., Von Solms, R.: Using bloom’s taxonomy for information security education. Education and Technology for a Better World. In: 9th IFIP TC 3 World Conference on Computers in Education, WCCE 2009, Bento Goncalves, Brazil (July 2009)
Anderson, L., Krathwohl, D., Airasian, P., Cruikshank, K., Mayer, R., Pintrich, P., Raths, J., Wittrock, M.: A Taxonomy for Learning, Teaching, and Assessing: A Revision of Bloom’s Taxonomy of Educational Objectives, Complete Edition. Longman (2001)
Van Niekerk, J., Von Solms, R.: Corporate information security education: Is outcomes based education the solution? In: 10th IFIP WG11.1 Annual Working Conference on Information Security Management, World Computer Congress (WCC), Toulouse, France (2004)
US Department of Education: Office of Planning, Evaluation, and Policy Development Policy and Program Studies Service.: Evaluation of Evidence-Based Practices in Online Learning: A Meta-Analysis and Review of Online Learning Studies (2009)
National Institute of Standards and Technology: NIST 800-16: Information Technology Security Training Requirements: A Role- and Performance-Based Model. NIST Special Publication 800-16, National Institute of Standards and Technology (1998)
Sousa, D.A.: How the brain learns, 3rd edn. Corwin Press (2006)
Fuller, U., Johnson, C.G., Ahoniemi, T., Cukierman, D., Hernán-Losada, I., Jackova, J., Lahtinen, E., Lewis, T.L., Thompson, D.M., Riedesel, C., Thompson, E.: Developing a computer science-specific learning taxonomy. SIGCSE Bull. 39(4), 152–170 (2007)
Roper, C., Grau, J., Fischer, L.: Security Education, Awareness and Training: From Theory to Practice. Elsevier, Butterworth (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 IFIP
About this paper
Cite this paper
van Niekerk, J.F., Thomson, KL. (2010). Evaluating the Cisco Networking Academy Program’s Instructional Model against Bloom’s Taxonomy for the Purpose of Information Security Education for Organizational End-Users. In: Reynolds, N., Turcsányi-Szabó, M. (eds) Key Competencies in the Knowledge Society. KCKS 2010. IFIP Advances in Information and Communication Technology, vol 324. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15378-5_40
Download citation
DOI: https://doi.org/10.1007/978-3-642-15378-5_40
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-15377-8
Online ISBN: 978-3-642-15378-5
eBook Packages: Computer ScienceComputer Science (R0)