difference, with the left-hand diagram representing
the typical one-size-fits-all approach, while the right-
hand side represents the approach advocated here.
The latter requires a variety of information to be
gathered for each user in order to establish their
individual circumstances (and hence associated effort
to do so), but if this were to be done then it clearly has
the potential to deliver a far more tailored security
education experience (which in turn would be hoped
to yield better results in terms of acceptance,
understanding and compliance).
The requirement for upfront data gathering points
towards the desirability of designing and evaluating a
questionnaire that organisations could use as a
diagnostic tool to determine where their staff
members are currently positioned in relation to each
of the factors that may affect their learning. This in
turn will help to determine the most appropriate
starting point for different staff members, both in
terms of their pre-existing IT and/or security
knowledge, as well as the delivery mode that maps
best to their learning style
6 CONCLUSIONS
Security awareness and education are indisputably
important issues for today’s users of information
technologies and services. However, as the
discussion has indicated, an effective solution is
unlikely to be achieved via approach that implicitly
assumes all staff to be part of a homogenised group
with the same prior experience and understanding.
As with other topics, there are clear benefits to be
gained by tailoring and framing the learning
experience to suit more specific, individual needs,
and hence we can usefully adopt these wider
educational principles in pursuit of improving
security. Security trainers and educators need to start
taking into account the learning aspects and barriers
to understanding that may exist amongst their target
audience.
In practice, the challenge is that we are often
nowhere near even achieving a one-size-fits-all
approach, let alone a tailored experience, and so the
ideas outlined here are longer-term aspirations for
how to take things further. Nonetheless, advancing
such an approach would represent a positive step, and
the authors intend to focus attention towards the type
of diagnostic tool/test that would be needed to start
the process. Of course, this in itself only represents
one element within a broader set of requirements.
Having assessed the individuals and established how
their personal plans should look, there is then the
requirement to be able to deliver the content in a
manner that matches. Appropriate awareness,
training and educational materials would then need to
be sourced or created to map onto the different
requirements that would emerge. In this sense, as
with many other aspects of security, the desired
outcome is relatively easy to describe in concept, but
significantly more challenging to achieve in practice.
REFERENCES
Davies, P., and Mangan, J., 2005. “Recognising Threshold
Concepts: an exploration of different approaches”,
European Association in Learning and Instruction
Conference (EARLI), 23-27 August 2005, Nicosia,
Cyprus.
Fleming, N. D., 2006, Teaching and learning styles: VARK
strategies, Second edition, Christchurch, New Zealand:
Neil D Fleming.
Furnell, S., 2010. “Jumping security hurdles”, Computer
Fraud & Security, June 2010, pp10-14.
Furnell, S. and Moore, L., 2014. “Security literacy: the
missing link in today’s online society?”, Computer
Fraud & Security, May 2014, pp12-18.
HM Government, 2017. FTSE 350 Cyber Governance
Health Check Report 2017, Department for Digital,
Culture, Media and Sport, London, UK. July 2017.
https://www.gov.uk/government/uploads/system/uploa
ds/attachment_data/file/635605/tracker-report-
2017_v6.pdf
Klahr, R., Shah, J. N., Sheriffs, P., Rossington, T., Pestell,
G., Button, M., and Wang, D.V, 2017. Cyber security
breaches survey 2017. Main report. Department for
Culture, Media & Sport, April 2017.
Meyer, J. H. F. and Land, R., 2003. "Threshold Concepts
and Troublesome Knowledge – Linkages to Ways of
Thinking and Practising" in Improving Student
Learning – Ten Years On. C. Rust (Ed), OCSLD,
Oxford.
Pattinson, M., and Anderson, G., 2005. “Risk
Communication, Risk Perception and Information
Security", Security Management, Integrity and Internal
Control in Information Systems, Proceedings of IFIP
TC-11 WG11.1 & WG11.5 Joint Working Conference,
Fairfax, Virginia, USA, December 2005, pp175-184.
Prensky, M., 2001. “Digital Natives, Digital Immigrants”.
On the Horizon: MCB University Press, 9 (5): pp1-6.
Talib, S., 2014. Personalising Information Security
Education, PhD thesis, University of Plymouth.
https://pearl.plymouth.ac.uk/bitstream/handle/10026.1/
2896/2014talib10137661phd.pdf
Enhancing Security Education - Recognising Threshold Concepts and Other Influencing Factors
403