Research SETA Flashcards

1
Q

What is a semantic differential scale?

A

A semantic differential scale is a type of self-report scale used to measure attitudes or opinions towards a particular object, concept, or event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the Elaboration Likelihood Model questionnaire?

A

The Elaboration Likelihood Model questionnaire is a type of self-report measure used to assess the extent to which individuals engage in elaboration or processing of persuasive messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does the Knowledge, Attitudes, & Behaviors Approach differ from traditional methods of assessing learning?

A

The Knowledge, Attitudes, & Behaviors Approach differs from traditional methods of assessing learning by recognizing that learning is not just about acquiring knowledge, but also about developing attitudes and behaviors. As

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is knowledge

A

Knowledge is generally defined as comprising three forms: declarative, procedural, and conditional.
Declarative knowledge refers to knowing what something is or what it means,
while procedural knowledge refers to knowing how to do something. Conditional knowledge refers to knowing when and why to use declarative and procedural knowledge.
Knowledge embodies all information that a person possesses or accrues related to a particular field of study.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is behavior

A

behavior is generally defined as an observable action or response of a person, organism, or group to a certain set of conditions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the elaboration likelihood model?

A

The Elaboration Likelihood Model (ELM) is a theory of persuasion and attitude change developed by Richard E. Petty and John T. Cacioppo in the late 1970s. It aims to explain how people process persuasive messages and make decisions about attitude change based on the amount and nature of cognitive elaboration they engage in.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is attitude

A

Attitude is generally defined as a psychological construct that represents an individual’s evaluation of a psychological object, such as a person, place, thing, or idea.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the difference between descriptive and prescriptive

A

In general, descriptive statements describe what is the case, while prescriptive statements prescribe what ought to be the case. Descriptive statements are factual and objective, while prescriptive statements are normative and subjective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is motivation

A

the driving force or energy that compels a person to act or behave in a certain way. It is the internal or external factors that stimulate a person to take action, pursue a goal, or engage in a particular behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a meta-orientation

A

Meta-orientations are used to analyze and compare different approaches to teaching and learning, and they are often based on different paradigms of learning, such as behaviorism, cognitivism, constructivism, and social constructivism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the four pedagogical approaches?

A

The explicit psychological context must be based on the group-oriented theoretical approach to teaching and learning.

The training content must be based on the collective experiences of the learners.

Teaching methods must focus on collaborative learning in order to reveal and produce collective knowledge.

Evaluation of learning should emphasize experiential and communication-based methods from the viewpoint of the learning community. (Karjalainen & Siponen, 2011)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are some common challenges faced by organizations when it comes to IS security training?

A

Employees may not understand the consequences of their actions
focuses on routine work procedures, such as logging out of the computer every time the employees leave their computers. This can make it difficult to engage employees and make the training relevant to their daily work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Behaviorism Learning Theory

A

earning as a process of stimulus-response associations, cognitivism views learning as a process of information processing and knowledge construction, and constructivism views learning as a process of active construction of meaning and knowledge through social interaction and personal experience

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the differences between behaviorism, cognitivism, and constructivism?

A

Behaviorism views learning as a process of stimulus-response associations, cognitivism views learning as a process of information processing and knowledge construction, and constructivism views learning as a process of active construction of meaning and knowledge through social interaction and personal experience.(Karjalainen & Siponen, 2011)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the differences between transmission, transaction, and transformation orientations of curriculum design?

A

Transmission is based on behaviorism, transaction is based on cognitivism, and transformation is based on constructivism or social constructivism. Transmission aims to transmit pre-defined contents as objective knowledge, transaction aims to develop cognitive abilities and problem-solving skills, and transformation aims to transform predominant beliefs and actions, leading to personal or communal change. Transmission is subject-centered, the transaction is problem- or process-centered, and transformation is learner- or community-centered. Transmission uses instructor-led approaches to transmit knowledge and provide external reinforcement, transaction focuses on cognitive problem-solving and analysis, and transformation focuses on critical reflection of personal or communal knowledge through collaboration or authentic problem-solving to attain personal or communal change. (Karjalainen & Siponen, 2011)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the core concept of KAB in relation to security?

A

The core concept of KAB is that more knowledge about security procedures and policies leads to an improvement in attitude towards their importance, which ultimately enhances security-related behavior.
(Alkhazi et al., 2022)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the universal constructive instructional theory?

A

The universal constructive instructional theory emphasizes the importance of active and constructive learning, where learners construct their own understanding of the material through reflection, discussion, and application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

learning-by-doing principle

A

is an instructional design principle that suggests that knowledge and skills are acquired and strengthened through actual practice. This principle is based on research that shows that students who practice skills that they have just learned perform better than students who do not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what is the immediate feedback principle

A

an instructional design principle that suggests that providing immediate feedback during the knowledge acquisition phase results in efficient learning,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what is the conceptual procedual principle

A

instructional design principle that suggests that conceptual and procedural knowledge influence one another in mutually supportive ways and build in an iterative process. This principle is based on research that shows that learners who are presented with concepts and procedures in an interleaved fashion perform better than learners who

21
Q

what is the contiguity principle

A

principle that suggests that the effectiveness of computer-aided instruction increases when words and pictures are presented contiguously (rather than isolated from one another) in time and space.

22
Q

what is the personalization principle

A

an instructional design principle that suggests that using conversational style rather than formal style enhances learning

23
Q

what is the storyed based agent environmental principle

A

instructional design principle that suggests that agents, which are characters who help guide learners, can be used to enhance learning.

24
Q

what is the reflection principle

A

instructional design principle that suggests that presenting opportunities for learners to reflect on the new knowledge they have learned enhances learning.

25
Q

What is the unified model of information security policy compliance

A

The UMISPC is a unified model that integrates elements from the 11 existing theories related to information systems security behavioral research.

26
Q

What are the key constucts of the UMISPC

A

four key constructs: attitude, perceived behavioral control, subjective norm, and security behavior intention

27
Q

what are role values

A

Role values are a construct that was proposed in a study on information security policy compliance. Role values refer to the required information security policy compliance act which is appropriate, justified, and acceptable, given the nature of the work and the task the person is performing.

28
Q

what is neutralization

A

Neutralization is a theory that was proposed by Sykes and Matza in 1957 to explain how individuals are able to overcome social norms and other deterrent mechanisms and engage in deviant behaviors. The basic tenet of this theory is that individuals rationalize reasons for why they are able to make an exception to a rule, policy, or law, thereby violating the accepted norm.

29
Q

What is NoT

A

NoT stands for “need for uniqueness,” which is a construct that refers to an individual’s desire to be different from others and to stand out from the crowd. In the context of information security policy compliance, NoT can influence an individual’s decision to comply or not comply with security policies

30
Q

Theories to explain non-compliance

A

criminology (deterrence theory)
psychology (theory of planned behavior)
social psychology (habit)
health psychology (protection motivation theory)

31
Q

What is Constructivism

A

Constructivism is a learning theory that emphasizes the role of the learner in actively constructing their understanding and knowledge. It suggests that learners build upon their prior knowledge and experiences to make sense of new information and experiences. According to constructivism, learning is most effective when students are actively engaged in the learning process, connecting new information to existing mental models, and creating meaningful learning experiences. Prominent constructivist theorists include Jean Piaget and Lev Vygotsky.

32
Q

What is instructional design?

A

Instructional design is not a single theory but rather a systematic approach to designing effective and efficient learning experiences. It involves the use of various learning theories, including constructivism, to guide the design of instructional materials and activities. Instructional designers analyze learners’ needs, create learning objectives, develop instructional strategies, and assess the effectiveness of the learning process.

33
Q

what is protection motivated theory

A

framework that explains the cognitive processes that employees use when facing threats, such as threat and coping appraisal processes.

PMT posits that employees are more likely to engage in security-related behaviors if they perceive a threat to their security and believe that the recommended actions will effectively mitigate that threat.

34
Q

What is the theory of Planned Behavior

A

explains human behavior in terms of three factors: attitudes, subjective norms, and perceived behavioral control.

35
Q

what is deterence theory

A

theoretical framework that predicts that employees’ security breaches could be deterred by sanctions and punishments.

36
Q

What is a SETA program

A

It is a combination of ongoing efforts to focus employees’ attention on day-to-day security issues, provide them with general security knowledge and skills, and offer insights into why security protection is needed

37
Q

What is the goal of a SETA program

A

is to improve employees’ security-related behaviors and reduce security risks in the organization.

38
Q

What is surface learning

A

memorization and reproducing the learning material with the intention to learn facts with little ability to see relationships between ideas and concepts. Typically, surface-level learning is characterized by short-term memory recall

39
Q

What is deep learning

A

characterized by critical thinking and self-development of understanding. It involves a more thorough understanding of the material, including the relationships between ideas and concepts

40
Q

what are desireable difficulites

A

are conditions of instruction that appear to create difficulties for the learner, slowing the rate of apparent learning, but often optimize long-term retention and transfer

41
Q

What is generation

A

refers to any learning activity that requires the learner to generate potential answers, solutions, and explanations before an understanding of the to-be-learned material is complete

42
Q

What are some “generation” Learning Activites

A

guessing, pretesting, and elaborative interrogation

43
Q

Why does generation work

A

Researchers believe that generation activities work because they activate a network of memory associations that can be used to encode the new information when it is learned

44
Q

What is self-explaining

A

a learning strategy that involves the learner explaining each step in a learning task to themselves or others, either out loud or silently.

45
Q

What is spaced practice

A

distributed practice, is a learning strategy that involves spreading out the study of to-be-learned material over several study sessions separated by some time delay

46
Q

What is retrival practice

A

learning strategy that involves actively retrieving information from memory through the use of practice tests or quizzes. Retrieval practice

47
Q

What is interleaving

A

A learning technique that involves mixing up different types of problems or materials within a single study session.

48
Q

What is elaborate interrogation

A

learning technique that involves asking oneself questions about the to-be-learned material.