Evaluation Theory and Practice as Applied to Security Education

An Overview
  • Melissa J. Dark
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 125)


This paper will overview general evaluation purposes, elements, and steps for designing an evaluation in order to provide foundational information that can be used to conduct an evaluation of any security awareness, training, or education programs. An example of evaluation principles discussed in this paper as applied to an information security education program has been provided in the appendix. This paper is a tool for individuals who have little to no formal training in educational evaluation.

Key words

evaluation evaluation design formative evaluation summative evaluation measurement metrics program logic validity reliability. 


  1. 1.
    Evaluation Center. (May 10, 2000). About evaluation. (On-line). Available:
  2. 2.
    Gronlund, N. (1985). Measurement and evaluation in teaching (5th ed.). New York: Macmillan.Google Scholar
  3. 3.
    Rossi, P., Freeman, H., Lipsay, M. (1999). Evaluation: A Systematic Approach. 6th edition. London: Sage Publications.Google Scholar
  4. 4.
    Thorndike, R., & Hagan. E. (1977). Measurement and evaluation in psychology and education (4th ed.). New York: Wiley.Google Scholar

Copyright information

© Springer Science+Business Media New York 2003

Authors and Affiliations

  • Melissa J. Dark
    • 1
  1. 1.Purdue UniversityUSA

Personalised recommendations