Abstract
This paper will overview general evaluation purposes, elements, and steps for designing an evaluation in order to provide foundational information that can be used to conduct an evaluation of any security awareness, training, or education programs. An example of evaluation principles discussed in this paper as applied to an information security education program has been provided in the appendix. This paper is a tool for individuals who have little to no formal training in educational evaluation.
Chapter PDF
Similar content being viewed by others
Key words
References
Evaluation Center. (May 10, 2000). About evaluation. (On-line). Available: http://www.wmich.edu
Gronlund, N. (1985). Measurement and evaluation in teaching (5th ed.). New York: Macmillan.
Rossi, P., Freeman, H., Lipsay, M. (1999). Evaluation: A Systematic Approach. 6th edition. London: Sage Publications.
Thorndike, R., & Hagan. E. (1977). Measurement and evaluation in psychology and education (4th ed.). New York: Wiley.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer Science+Business Media New York
About this paper
Cite this paper
Dark, M.J. (2003). Evaluation Theory and Practice as Applied to Security Education. In: Irvine, C., Armstrong, H. (eds) Security Education and Critical Infrastructures. WISE 2003. IFIP Advances in Information and Communication Technology, vol 125. Springer, New York, NY. https://doi.org/10.1007/978-0-387-35694-5_20
Download citation
DOI: https://doi.org/10.1007/978-0-387-35694-5_20
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4757-6491-8
Online ISBN: 978-0-387-35694-5
eBook Packages: Springer Book Archive