INFORMATION TECHNOLOGY AND SECURITY IN SCHOOLS - A Research Agenda

Hannakaisa Isomäki

Abstract

In this position paper I discuss a research agenda for studying security issues particularly related to secondary and high schools. I argue that despite of its topicality and significance to successful functioning of schools, the issue of information technology (IT) and security in schools is not getting enough research input. In the educational environment, which includes various areas of computer-supported learning, the scope of security ranges from human-centred to technology-centred issues. Both of these deal with information security in a socio-technical educational context, the first emphasizing human activity and the latter IT. I present these categories as necessary research proposals here. The human-centred topics include end-user security behavior – as intertwined with the use of technology while learning and teaching in socially embedded virtual worlds – and information security culture in schools. The technology-centred topics include information security of pedagogical software and IT applications for the management of school security.

References

  1. Agron, J., Anderson, L. 2000. School Security by the Numbers. American School & University, School security supplement.
  2. Allan, B., Lewis, D. 2006. The Impact of Membership of a Virtual Learning Community on Individual Learning Careers and Professional Identity. British Journal of Educational Technology, 37(6), 841-852.
  3. Battarabee, K. 2003. Defining Co-experience. In Proceedings of the 2003 Designing Pleasurable Products and Interfaces (DPPI) Conference (pp. 109-113). New York: ACM Press.
  4. Broadbent, M., Weill, P., St. Clair, D.R. 1999. The Implications of Information Technology Infrastructure for Business Process Redesign. MIS Quarterly 23(2), 159- 182.
  5. Brown, B. 2005. Controlling Crime and Delinquency in the Schools: An Exploratory Study of Student Perceptions of School Security Measures. Journal of School Violence, 4(4), 105-125.
  6. Chatziapostolou, D., Furnell, S.M. 2007. Recording endusers security events: A step towards increasing usability. In P.S. Dowland and S.M. Furnell (Eds.) Proceedings of the 2005-2006 Conference on Advances in Networks, Computing and Communications 4 (pp. 11-18). University of Plymouth, U.K.
  7. Eibl, C.R., Schubert, S.E. 2008. Development of ELearning Design Criteria with Secure Realization Concepts. In Proceedings of the 2008 ISSEP Conference, LNCS 5090, (pp. 327-336). Berlin: SpringerVerlag.
  8. Furnell, S. 2008. End-user Security Culture: A Lesson that Will Never be Learnt? Computer Fraud & Security, 4, 6-8.
  9. Furnell, S.M., Onions, P.D., Knahl, M., Sanders, P.W., Bleimann, U., Gojny, U., Roder, H.F. 1998. A Security Framework for Online Distance Learning and Training. Internet Research, 8(3), 236-242.
  10. Furnell, S.M., Karweni, T. 2001. Security Issues in Online Distance Learning. VINE, 123, 28-35.
  11. Graf, F. 2002. Providing Security for eLearning. Computers & Graphics 26(2), 355-365.
  12. Graham, L., Metaxas, P.T. 2003. Of course It's True: I Saw it on the Internet!: Critical Thinking in the Internet Era. Communications of the ACM, 46(5), 70-75.
  13. Hassenzahl, M., Tractinsky, N. 2006. User Experience: A Research Agenda. Behaviour and Information Technology, 25(2), 91-97.
  14. Hevner, A.R., March, S.T., Park, J., Ram, S. 2004. Design Science in Information Systems Research. MIS Quarterly 28(1), 75-105.
  15. Isomäki, H., Päykkönen, K., Räisänen, H. 2008. Secure Collaborative Learning Practices and Mobile Technology. In Putnik, G.D. & Cunha, M.M. (Eds.) Encyclopedia of Networked and Virtual Organizations. Vol III. (pp. 1407-1412). Idea Group Publishing.
  16. Lave, J., Wenger, E. 1991. Situated Learning: Legitimate Peripheral Participation. Cambridge: Cambridge University Press.
  17. Lampson, B. 2009. Usable Security: How to Get It. Communications of the ACM 52(11), 25-27.
  18. Leach, J. 2003. Improving User Security behaviour. Computers & Security, 22(8), 685-692.
  19. Mazhelis, O., Isomäki, H. 2009. Information Security Culture in SMEs: State of the art. Reports of the JIID project. Information Technology Research Institute, University of Jyväskylä. (to be submitted to INC'10 conference).
  20. McCarthy, J. & Wright, P. 2004. Technology as Experience. Cambridge, MA: MIT Press.
  21. McInnerney, J., Roberts, T. 2004. Online Learning: Social Interaction and the Creation of a Sense of Community. Educational Technology & Society, 7(3), 73-81.
  22. National Institute of Justice. The Appropriate and Effective Use of Security Technologies in U.S. Schools. Research Report NCJ-178265.
  23. Orlikowski, W. J. 1992. The Duality of Technology: Rethinking the Concept of Technology in Organizations. Organization Science 3(3), 398-427.
  24. Osika Reed, E., Sharp, D.P. 2003. Minimum technical competencies for distance learning students. Journal of Research on Technology in Education, 34(3), 318- 325.
  25. Pöysä, J. and Häkkinen, P. 2009. Designing for contemporary learning communities dwelling with technologies. In Isomäki, H., Häkkinen, P. and Viteli, J. 2009 (Eds.) Future Educational Technologies. Reports of Information Technology Research Institute 20/2009. Jyväskylä: University of Jyväskylä Printing House.
  26. Rezgui, Y., Marks, A. 2008. Information Security Awareness in Higher-education: An Exploratory Study. Computers & Security, 27(2), 241-253.
  27. Tilson, D., Lyytinen, K. and Sörensen, C. 2009. Desperately seeking the Infrastructure in IS Research: Conceptualization of “Digital Convergence” as the coevolution of social and technical infrastructures. In Isomäki, H., Häkkinen, P. and Viteli, J. 2009 (Eds.) Future Educational Technologies. Reports of Information Technology Research Institute 20/2009. Jyväskylä: University of Jyväskylä Printing House.
  28. Tjhai, G.C., Furnell, S.M. 2007. Strengthening the Human Firewall. In P.S. Dowland and S.M. Furnell (Eds.) Proceedings of the 2005-2006 Conference on Advances in Networks, Computing and Communications 4 (pp. 223-230). University of Plymouth, U.K.
  29. Thomson, K.-L., von Solms, R. 2005. Information Security Obedience: A Definition. Computers & Security 24(1), 69-75.
  30. Warren, M., Hutchinson,W. 2003. Information Security - An E-Learning Problem. In Proceedings of the 2003 ICWL Conference, LNCS 2783, (pp. 21-26). Berlin: Springer-Verlag.
  31. Weippl, E.R. 2005. Security in e-learning. eLearn Magazine 3, 3-9.
Download


Paper Citation


in Harvard Style

Isomäki H. (2010). INFORMATION TECHNOLOGY AND SECURITY IN SCHOOLS - A Research Agenda . In Proceedings of the 2nd International Conference on Computer Supported Education - Volume 1: CSEDU, ISBN 978-989-674-023-8, pages 325-330. DOI: 10.5220/0002853603250330


in Bibtex Style

@conference{csedu10,
author={Hannakaisa Isomäki},
title={INFORMATION TECHNOLOGY AND SECURITY IN SCHOOLS - A Research Agenda},
booktitle={Proceedings of the 2nd International Conference on Computer Supported Education - Volume 1: CSEDU,},
year={2010},
pages={325-330},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002853603250330},
isbn={978-989-674-023-8},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 2nd International Conference on Computer Supported Education - Volume 1: CSEDU,
TI - INFORMATION TECHNOLOGY AND SECURITY IN SCHOOLS - A Research Agenda
SN - 978-989-674-023-8
AU - Isomäki H.
PY - 2010
SP - 325
EP - 330
DO - 10.5220/0002853603250330