Prelude… 
when, were and how did you backup your data?
Didactics of 
Information Security 
as a 
Key Competence 
Peter Micheuz, peter.micheuz@aau.at 
Alpen-Adria Gymnasium Völkermarkt 
Alpen-Adria Universität Klagenfurt 
Austria
© Fotolia 
© Micheuz 
Outline 
• Introduction 
• IS and Frameworks 
• Implemention 
• Discussion
It is all about protecting and preserving 
confidentiality, integrity, authenticity, availability, and 
reliability 
(ISO, 2005) 
It is the study of the concepts, techniques, 
technical measures and administrative measures 
used to protect information assets from deliberate or inadvertent unauthorized acquisition, 
damage, disclosure, manipulation, modification, loss, or use ... 
(IBM dictionary, 1994)
Structuring a wide field 
(Faked) digital identity 
encryption and 
verification mechanisms 
data protection 
offender and victim 
cybermobbing 
safety = security? 
Privacy, etc.
Information Security and Didactics 
Key Competence: 
Combination of Knowledge, Skills and Attitudes 
Theoretical Rationale in Frameworks/Curricula/Syllabi 
• DIGCOMP – Digital Competence Framework 
(European Commission, 2013) 
• Standards for Computer Science 
(CSTA, 2011) 
• ECDL Security Modul
Further (External) Initiatives 
Throughout Europe 
Saferinternet (A), Klicksave (D), … 
[Saferinternet-Day]
13 out of 72 descriptors refer to security and protection issues 
For example … 
„I know the risks of communicating with persons who I know over the internet. „ 
„I know possibilities to check the protection of my computer and know 
an expert to ask.“ 
„I know that there are threads in form of malware when I am exchanging 
data and communicating via internet.“ 
„I can backup data and know about the risk of loss of data“
Implementation Strategy 
Planing Grid 
for Lower Secondary Education (KS 3) 
Learning Tasks
Conclusion - Discussion 
The digital world and humans as a vulnerable part of it are not perfect … 
Information Security is ubiquitous - everybody is more or less affected 
->>> NO school can afford not to deal with that matter 
… 
… 
…
Unfortunately there is no such key 
… and if you are scary, 
please do not watch the following last slide …
Istanbul issep2014

Istanbul issep2014

  • 1.
    Prelude… when, wereand how did you backup your data?
  • 2.
    Didactics of InformationSecurity as a Key Competence Peter Micheuz, peter.micheuz@aau.at Alpen-Adria Gymnasium Völkermarkt Alpen-Adria Universität Klagenfurt Austria
  • 3.
    © Fotolia ©Micheuz Outline • Introduction • IS and Frameworks • Implemention • Discussion
  • 4.
    It is allabout protecting and preserving confidentiality, integrity, authenticity, availability, and reliability (ISO, 2005) It is the study of the concepts, techniques, technical measures and administrative measures used to protect information assets from deliberate or inadvertent unauthorized acquisition, damage, disclosure, manipulation, modification, loss, or use ... (IBM dictionary, 1994)
  • 5.
    Structuring a widefield (Faked) digital identity encryption and verification mechanisms data protection offender and victim cybermobbing safety = security? Privacy, etc.
  • 6.
    Information Security andDidactics Key Competence: Combination of Knowledge, Skills and Attitudes Theoretical Rationale in Frameworks/Curricula/Syllabi • DIGCOMP – Digital Competence Framework (European Commission, 2013) • Standards for Computer Science (CSTA, 2011) • ECDL Security Modul
  • 10.
    Further (External) Initiatives Throughout Europe Saferinternet (A), Klicksave (D), … [Saferinternet-Day]
  • 11.
    13 out of72 descriptors refer to security and protection issues For example … „I know the risks of communicating with persons who I know over the internet. „ „I know possibilities to check the protection of my computer and know an expert to ask.“ „I know that there are threads in form of malware when I am exchanging data and communicating via internet.“ „I can backup data and know about the risk of loss of data“
  • 12.
    Implementation Strategy PlaningGrid for Lower Secondary Education (KS 3) Learning Tasks
  • 13.
    Conclusion - Discussion The digital world and humans as a vulnerable part of it are not perfect … Information Security is ubiquitous - everybody is more or less affected ->>> NO school can afford not to deal with that matter … … …
  • 14.
    Unfortunately there isno such key … and if you are scary, please do not watch the following last slide …