The UX approach employs methodologies rooted
in phenomenology, such as cultural studies on UX
(McCarthy and Wright, 2004), and other qualitative
methods used, for example, in investigations on co-
experiences (Battarbee, 2003). Users’ experiential
interaction with applications of educational tech-
nologies in school context is seen as a continuum of
processes within which users actively engage with
learning experiences. With the UX approach, for
instance students’ awareness of information security
in learning settings and many experiences of infor-
mation security’s impact on different types of E-
learning could be clarified. In the same way, the UX
approach could be employed in users’ demands for
information security and privacy protection capabili-
ties of educational technologies, as well as in their
strategies for managing security in socially embed-
ded virtual worlds.
To be able to consider information security in
schools from a viewpoint that facilitates socio-
technical understanding of IT-related security on an
organisational level that incorporates the behaviour
of individuals and groups of people to the organisa-
tional facilities and norms, the concept of informa-
tion security culture (ISC) needs to be implemented
in the study of schools. ISC is a newish concept, and
its definition is not yet stabilised. In literature, ISC is
considered from many viewpoints, namely: ISC as
an aid in protecting valuable assets, ISC as a holistic
issue forming a part of the broader corporate culture,
ISC as a solely human aspect, ISC as information
security governance, and ISC as an issue of organ-
isational learning and knowledge creation in enter-
prises (Mazhelis and Isomäki, 2009). Some re-
searchers also connect the combination of corporate
culture, governance and information security to in-
formation security obedience (Thomson and von
Solms, 2005).
The theoretical commitments that seem most
appropriate for understanding information security
culture in school settings include a constructionist
stance, the view of learning as socially constructed
and mediated (e.g., Lave and Wenger, 1991), and an
insistence that information security culture should be
studied on the basis of concrete discursive practices
and interactions while using IT in learning, teaching,
or management of the school. Analyses of ISC in
schools would disclose various organisational level
issues of end-user security behaviour intertwined
with the use of educational technology. A qualitative
approach facilitates also the study of different genres
or social rules producing social order within infor-
mation security culture and its dissemination, stu-
dents’, teachers’ and rectors‘ authentic strategies for
managing security as an everyday problem, and
power relations inherent in a particular information
security culture.
3 INFORMATION SECURITY OF
PEDAGOGICAL SOFTWARE
Typical for the development of information security
guidelines and practices of pedagogical software is
that there are both generic and E-learning specific
requirements (e.g., Eibl and Schubert, 2008; Furnell,
Onions, Knahl, Sanders, Bleimann, Gojny, and
Roder, 1998). (Weippl 2005) also attends to both
generic and E-learning specific security require-
ments for systems used in IT-supported learning.
The generic requirements include secrecy, integrity,
availability and non-repudiation. Secrecy denotes
that users may obtain access only to those objects for
which they have received authorization, whereas
integrity means that only authorized users or proc-
esses are permitted to modify data or programs. Ac-
cording to Weippl (2005, 5), availability is also a
security concern. Justification for this is pedagogical
in that students’ productivity decreases dramatically
if network-based learning applications, such as
WebCT, FirstClass and Optima, are too slow or not
available due to denial-of-service attacks. Non-
repudiation presumes that users are able to plausibly
deny having carried out certain actions, or, if a user
has provided or changed a certain piece of informa-
tion he or she cannot deny having done it. For in-
stance, if some grades of students are altered, it must
be possible to reliably trace the source of those
changes.
The generic requirements do not usually require
any specific skills or performance of IT support staff
in educational institutions but are included in nonde-
script security risk analyses and maintenance. Non-
repudiation issues can, however, be cumbersome in
that they may cause risks for users’ privacy. For
instance, if students' all actions are made traceable in
the net by using, e.g., spyware, it may endanger pri-
vacy and diminish trust building in E-learning envi-
ronments.
Information security requirements for E-learning
often concern unauthorized use of digital content,
trust, exams, and organization (Weippl, 2005, 6).
The first of these may be tricky to address, because
in addition to people who do not have authorized
access to the content, people who have legitimate
access to the content may copy or modify it without
permission and/or disseminate it further.
INFORMATION TECHNOLOGY AND SECURITY IN SCHOOLS - A Research Agenda
327