Towards Information Security Education 3.0

A Call for Information Security Educational Ontologies
  • Johan Van Niekerk
  • Ryan Goss
Conference paper
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 406)


The need for information security ”know-how” has permeated to all aspects of modern society. Nowadays, information security is no longer a problem faced by organizational users alone. Individuals often use online services in cyberspace on a daily basis for activities ranging from personal banking to social networking. The need to educate users regarding secure behavior in cyberspace has subsequently also become well established. This paper firstly argues that approaches towards such ”cyber-security” education should be based on the same Web 2.0 philosophies and paradigms that made the use of the Web in daily life so popular. Finally the paper briefly discusses the need for future research to enable such an approach towards information security education.


Information Security Social Software Knowledge Store Machine User Secure Behavior 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Carr, N.G.: IT Doesn’t Matter. Harvard Business Review, 41–49 (2003)Google Scholar
  2. 2.
    Kreutzer, T.: Internet and online media usage on mobile phones among low-income urban youth in cape town. In: Beyond Voice? Pre-Conference Workshop at the International Communication Association (ICA) Conference Chicago, Illinois, May 20-21 (2009)Google Scholar
  3. 3.
    Mitnick, K., Simon, W.: The art of deception: Controlling the human element of security. Wiley Publishing (2002)Google Scholar
  4. 4.
    Furnell, S.: It’s a jungle out there: Predators, prey and protection in the online wilderness. Computer Fraud & Security, 3–6 (October 2008)CrossRefGoogle Scholar
  5. 5.
    Siponen, M.: Five dimensions of information security awareness. Computers and Society, 24–29 (June 2001)Google Scholar
  6. 6.
    Rogers, P., Liddle, S., Chan, P., Doxey, A., Isom, B.: Teaching social software with social software. Turkish Online Journal of Distance Education 8(3) (2007) ISSN 1302-6488Google Scholar
  7. 7.
    Geser, G.: Open educational practices and resources. [WWW document] (2007), (sited September 27, 2008)
  8. 8.
    Downes, S.: E-learning 2.0. [WWW document] (2005), (sited May 25, 2008)
  9. 9.
    Servitium: Web and learning 2.0: A servitium whitepaper. Servitium White Paper (2008)Google Scholar
  10. 10.
    Schlenker, B.: What is e-learning 2.0? Learning Solutions. Practical Applications of Technology for Learning, e-Magazine (2008)Google Scholar
  11. 11.
    Yurcik, W., Doss, D.: Different approaches in the teaching of information systems security. In: Information Systems Education Conference (ISECON), Cincinnati, OH (2001)Google Scholar
  12. 12.
    Mejias, U.: Teaching social software with social software. Innovate: Journal of Online Education 2(5) (2008)Google Scholar
  13. 13.
    Ohler, J.: Web 3.0 - the semantic web cometh. University of Alaska (2008)Google Scholar
  14. 14.
    Mason, R., Rennie, F.: Using web 2.0 for learning in the community. Internet and Higher Education 10, 196–203 (2007)CrossRefGoogle Scholar
  15. 15.
    Devedzic, V.: Education and the semantic web. International Journal of Artificial Intelligence in Education 14, 39–65 (2004)Google Scholar
  16. 16.
    Gladun, A., Rogushina, J., Garcia-Sanchez, F., Martinez-Bejar, R., Fernandez-Breis, J.: An application of intelligent techniques and semantic web technologies in e-learning environments. Expert Systems with Applications 36, 1922–1931 (2009)CrossRefGoogle Scholar

Copyright information

© IFIP International Federation for Information Processing 2013

Authors and Affiliations

  • Johan Van Niekerk
    • 1
  • Ryan Goss
    • 1
  1. 1.Institute for ICT AdvancementNelson Mandela Metropolitan UniversitySouth Africa

Personalised recommendations