Research Article
BibTex RIS Cite

Development of an online learning system about information security

Year 2021, Volume: 1 Issue: 1, 26 - 35, 28.02.2021

Abstract

With the increase in people's access to information and communication technologies, threats to information security have developed in the same direction. It is seen that the measures to be taken with technical devices or services are not sufficient alone. For this reason, it becomes evident that the end users, who seem to be the weakest targets, should be trained on the subject. Since the size of the target audience to be trained may consist of everyone who even uses a smartphone, it was concluded that the most suitable environment for information security education is online learning systems. This study aims to develop an online learning system for information security education. To achieve this goal, the design-based research method and rapid prototyping instructional design model were used in the study. After initializing the first prototype of the learning environment examining the related literature, the final version of the prototype was emerged following the opinions received from experts from different but related disciplines.

References

  • [1] Simon, K. We Are Social. 2019, p. 221. Retrieved from https://wearesocial.com/global-digital-report-2019.
  • [2] Sarre, R., Lau, L.Y., & Chang, L.Y.C. Responding to cybercrime: Current trends 2018. Taylor & Francis.
  • [3] Filkins, B. IT Security spending trends 2016. SANS.
  • [4] Susan, M., Keen, E. Gartner forecasts worldwide information security spending to exceed $124 billion in 2019 2018. https://www.gartner.com/en/newsroom/press-releases/2018-08-15-gartner-forecasts-worldwide-information-security-spending-to-exceed-124-billion-in-2019.
  • [5] Matt, G. Internet crime report. Annual, (202) 324-3691, Internet Crime Complaint Center, 2018, p. 28, Retrieved from https://pdf.ic3.gov/2018_IC3Report.pdf.
  • [6] Michael, L. Assessing the trends, scale and nature of economic cybercrimes: Overview and issues 2017. Crime, Law and Social Change, 67(1): 3–20.
  • [7] Giles, H. & Dekker, M. Smartphones: Information security risks, opportunities and recommendations for users 2010. ENISA.
  • [8] Woongryul, J., Kim, Jeeyeon, Y, Lee, Dongho, W. A practical analysis of smartphone security 2011. Symposium on Human Interface, Springer, pp. 311–20.
  • [9] Amankwa, E., Loock, M., & Kritzinger, E. A conceptual analysis of information security education, information security training and information security awareness definitions 2014. The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014), IEEE, pp. 248–52. DOI.org (Crossref). doi:10.1109/ICITST.2014.7038814.
  • [10] Rowe, D., Marry, C., Lunt, M., & Ekstorm, J.J. The Role of Cyber-Security in information technology education 2011. Proceedings of the 2011 Conference on Information Technology Education - SIGITE ’11, ACM Press, p. 113, DOI.org (Crossref), doi:10.1145/2047594.2047628.
  • [11] Tejaswini, H. & Rao, H, R. Protection motivation and deterrence: a framework for security policy compliance in organisations 2009. European Journal of Information Systems, 18(2): 106–25. DOI.org (Crossref), DOI:10.1057/ejis.2009.6.
  • [12] Eminağaoğlu, M. & Gökşen, Y. Bilgi güvenliği nedir, ne değildir? Türkiye’de bilgi güvenliği sorunları ve çözüm önerileri 2009. [Information Security; What Is And What Is Not, Information Security Problems In Turkey And Some Related Solutions] Dokuz Eylül University, Journal of Institute of Social Sciences, 11(4).
  • [13] Sasha, B. & Squire, S. Design-based research: putting a stake in the ground 2004. Journal of the Learning Sciences, 13,(1): 1–14. DOI.org (Crossref), doi:10.1207/s15327809jls1301_1.
  • [14] Ocak, M.A. Öğretim tasarımı modelleri 2015. Instructional Design Models, Instructional Design Theorems, Models and Applications, Anı Press, pp. 32–257.
  • [15] TLA. Turkish language association, 2020. Retrieved from https://sozluk.gov.tr/?kelime=tasar%C4%B1m.
  • [16] Feng, W. & Hannafin, M.J. Design-based research and technology-enhanced learning environments 2005. Educational Technology Research and Development, 53(4): 5-23. Springer.
  • [17] Kuzu, A., Çankaya, S., & Mısırlı, Z. A. Design-based research and its implementation in the design and development of learning environments 2011. Anadolu Journal of Educational Sciences International, 1(1): 19-35.
  • [18] Stokes, J.T. & Richey, R.C. Rapid prototyping methodology in action: a developmental study 2000. Educational Technology Research and Development, 48(2): 63-80
  • [19] Tripp, S.D. & Bichelmeyer, B. Rapid prototyping: an alternative instructional design strategy 1990. Educational Technology Research and Development, 38(1): 34-44, Springer.
  • [20] Şimşek, A. “Öğretim Tasarımı ve Modelleri. Instructional design and models, instructional technology foundations: theories, research, trends. Pegem Akademi, pp. 99–116, 2013.
  • [21] McCormac, A., Zwaans, T., Parsons, K., Dragana, C., Butavicius, M., & Pattinson, M. Individual differences and information security awareness 2017. Computers in Human Behavior, vol. 69, pp. 151–56.
  • [22] Parsons, K., Dragana, C., Pattinson, M., Agata, M., & Tara, Z. The human aspects of information security questionnaire (HAIS-Q): Two further validation studies. Computers & Security, vol. 66, pp. 40–51.
  • [23] Öğütçü, G. E-dönüşüm sürecinde kişisel bilişim güvenliği davranışı ve farkındalığı analizi. [Analysis of Personal Information Security Behavior And Awareness in E-Transformation Process] Başkent Üniversity, 2010.
  • [24] Korkut, O. Çankaya İlçesi Milli Eğitim Müdürlüğü’ne bağlı ilköğretim okullarına ait web sitelerinin grafik tasarım açısından incelenmesi ve örnek web sitesi tasarımı hazırlanması. [The examination of the websites of the primary schools depending on Çankaya County Directorate of Education from the aspect of graphic design principles and preparation of example website design] Gazi University, Ankara, 2012.
  • [25] Franke, U. & Joel, B. Cyber Situational Awareness–a systematic review of the literature 2014. Computers & Security, vol. 46, pp. 18–31.
  • [26] Bostan, A. & Şengül, G. Siber Güvenlik Farkındalığı Oluşturma. [Development of Cyber Security Awareness] Grafiker Yayınları, 2018, Retrieved from https://www.sasad.org.tr/uploaded/Siber-Guvenlik-ve-Savunma-Farkindalik-ve-Caydiricilik.pdf.
  • [27] Panigrahi, R., Praveen, R.S., & Dheeraj, S. Online learning: adoption, continuance, and learning outcome-a review of literature.” International Journal of Information Management, vol. 43, Dec. 2018, pp. 1–14. DOI.org (Crossref), DOI:10.1016/j.ijinfomgt.2018.05.005.
  • [28] Micarelli, A. & Filippo, S. A case-based system for adaptive hypermedia navigation. European workshop on advances in case-based reasoning, Springer, 1996, pp. 266–79.
  • [29] Otter, M. & Hilary, J. Lost in hyperspace: metrics and mental models. Interacting with Computers, vol. 13, no. 1, Oxford University Press Oxford, UK, 2000, pp. 1–40.
Year 2021, Volume: 1 Issue: 1, 26 - 35, 28.02.2021

Abstract

References

  • [1] Simon, K. We Are Social. 2019, p. 221. Retrieved from https://wearesocial.com/global-digital-report-2019.
  • [2] Sarre, R., Lau, L.Y., & Chang, L.Y.C. Responding to cybercrime: Current trends 2018. Taylor & Francis.
  • [3] Filkins, B. IT Security spending trends 2016. SANS.
  • [4] Susan, M., Keen, E. Gartner forecasts worldwide information security spending to exceed $124 billion in 2019 2018. https://www.gartner.com/en/newsroom/press-releases/2018-08-15-gartner-forecasts-worldwide-information-security-spending-to-exceed-124-billion-in-2019.
  • [5] Matt, G. Internet crime report. Annual, (202) 324-3691, Internet Crime Complaint Center, 2018, p. 28, Retrieved from https://pdf.ic3.gov/2018_IC3Report.pdf.
  • [6] Michael, L. Assessing the trends, scale and nature of economic cybercrimes: Overview and issues 2017. Crime, Law and Social Change, 67(1): 3–20.
  • [7] Giles, H. & Dekker, M. Smartphones: Information security risks, opportunities and recommendations for users 2010. ENISA.
  • [8] Woongryul, J., Kim, Jeeyeon, Y, Lee, Dongho, W. A practical analysis of smartphone security 2011. Symposium on Human Interface, Springer, pp. 311–20.
  • [9] Amankwa, E., Loock, M., & Kritzinger, E. A conceptual analysis of information security education, information security training and information security awareness definitions 2014. The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014), IEEE, pp. 248–52. DOI.org (Crossref). doi:10.1109/ICITST.2014.7038814.
  • [10] Rowe, D., Marry, C., Lunt, M., & Ekstorm, J.J. The Role of Cyber-Security in information technology education 2011. Proceedings of the 2011 Conference on Information Technology Education - SIGITE ’11, ACM Press, p. 113, DOI.org (Crossref), doi:10.1145/2047594.2047628.
  • [11] Tejaswini, H. & Rao, H, R. Protection motivation and deterrence: a framework for security policy compliance in organisations 2009. European Journal of Information Systems, 18(2): 106–25. DOI.org (Crossref), DOI:10.1057/ejis.2009.6.
  • [12] Eminağaoğlu, M. & Gökşen, Y. Bilgi güvenliği nedir, ne değildir? Türkiye’de bilgi güvenliği sorunları ve çözüm önerileri 2009. [Information Security; What Is And What Is Not, Information Security Problems In Turkey And Some Related Solutions] Dokuz Eylül University, Journal of Institute of Social Sciences, 11(4).
  • [13] Sasha, B. & Squire, S. Design-based research: putting a stake in the ground 2004. Journal of the Learning Sciences, 13,(1): 1–14. DOI.org (Crossref), doi:10.1207/s15327809jls1301_1.
  • [14] Ocak, M.A. Öğretim tasarımı modelleri 2015. Instructional Design Models, Instructional Design Theorems, Models and Applications, Anı Press, pp. 32–257.
  • [15] TLA. Turkish language association, 2020. Retrieved from https://sozluk.gov.tr/?kelime=tasar%C4%B1m.
  • [16] Feng, W. & Hannafin, M.J. Design-based research and technology-enhanced learning environments 2005. Educational Technology Research and Development, 53(4): 5-23. Springer.
  • [17] Kuzu, A., Çankaya, S., & Mısırlı, Z. A. Design-based research and its implementation in the design and development of learning environments 2011. Anadolu Journal of Educational Sciences International, 1(1): 19-35.
  • [18] Stokes, J.T. & Richey, R.C. Rapid prototyping methodology in action: a developmental study 2000. Educational Technology Research and Development, 48(2): 63-80
  • [19] Tripp, S.D. & Bichelmeyer, B. Rapid prototyping: an alternative instructional design strategy 1990. Educational Technology Research and Development, 38(1): 34-44, Springer.
  • [20] Şimşek, A. “Öğretim Tasarımı ve Modelleri. Instructional design and models, instructional technology foundations: theories, research, trends. Pegem Akademi, pp. 99–116, 2013.
  • [21] McCormac, A., Zwaans, T., Parsons, K., Dragana, C., Butavicius, M., & Pattinson, M. Individual differences and information security awareness 2017. Computers in Human Behavior, vol. 69, pp. 151–56.
  • [22] Parsons, K., Dragana, C., Pattinson, M., Agata, M., & Tara, Z. The human aspects of information security questionnaire (HAIS-Q): Two further validation studies. Computers & Security, vol. 66, pp. 40–51.
  • [23] Öğütçü, G. E-dönüşüm sürecinde kişisel bilişim güvenliği davranışı ve farkındalığı analizi. [Analysis of Personal Information Security Behavior And Awareness in E-Transformation Process] Başkent Üniversity, 2010.
  • [24] Korkut, O. Çankaya İlçesi Milli Eğitim Müdürlüğü’ne bağlı ilköğretim okullarına ait web sitelerinin grafik tasarım açısından incelenmesi ve örnek web sitesi tasarımı hazırlanması. [The examination of the websites of the primary schools depending on Çankaya County Directorate of Education from the aspect of graphic design principles and preparation of example website design] Gazi University, Ankara, 2012.
  • [25] Franke, U. & Joel, B. Cyber Situational Awareness–a systematic review of the literature 2014. Computers & Security, vol. 46, pp. 18–31.
  • [26] Bostan, A. & Şengül, G. Siber Güvenlik Farkındalığı Oluşturma. [Development of Cyber Security Awareness] Grafiker Yayınları, 2018, Retrieved from https://www.sasad.org.tr/uploaded/Siber-Guvenlik-ve-Savunma-Farkindalik-ve-Caydiricilik.pdf.
  • [27] Panigrahi, R., Praveen, R.S., & Dheeraj, S. Online learning: adoption, continuance, and learning outcome-a review of literature.” International Journal of Information Management, vol. 43, Dec. 2018, pp. 1–14. DOI.org (Crossref), DOI:10.1016/j.ijinfomgt.2018.05.005.
  • [28] Micarelli, A. & Filippo, S. A case-based system for adaptive hypermedia navigation. European workshop on advances in case-based reasoning, Springer, 1996, pp. 266–79.
  • [29] Otter, M. & Hilary, J. Lost in hyperspace: metrics and mental models. Interacting with Computers, vol. 13, no. 1, Oxford University Press Oxford, UK, 2000, pp. 1–40.
There are 29 citations in total.

Details

Primary Language English
Subjects Software Engineering (Other)
Journal Section Research Articles
Authors

Onur Ceran 0000-0003-2147-0506

Serçin Karataş 0000-0002-1731-0676

Publication Date February 28, 2021
Acceptance Date December 7, 2020
Published in Issue Year 2021 Volume: 1 Issue: 1

Cite

Vancouver Ceran O, Karataş S. Development of an online learning system about information security. C&I. 2021;1(1):26-35.