
 
The UX approach employs methodologies rooted 
in phenomenology, such as cultural studies on UX 
(McCarthy and Wright, 2004), and other qualitative 
methods used, for example, in investigations on co-
experiences (Battarbee, 2003). Users’ experiential 
interaction with applications of educational tech-
nologies in school context is seen as a continuum of 
processes within which users actively engage with 
learning experiences. With the UX approach, for 
instance students’ awareness of information security 
in learning settings and many experiences of infor-
mation security’s impact on different types of E-
learning could be clarified. In the same way, the UX 
approach could be employed in users’ demands for 
information security and privacy protection capabili-
ties of educational technologies, as well as in their 
strategies for managing security in socially embed-
ded virtual worlds. 
To be able to consider information security in 
schools from a viewpoint that facilitates socio-
technical understanding of IT-related security on an 
organisational level that incorporates the behaviour 
of individuals and groups of people to the organisa-
tional facilities and norms, the concept of informa-
tion security culture (ISC) needs to be implemented 
in the study of schools. ISC is a newish concept, and 
its definition is not yet stabilised. In literature, ISC is 
considered from many viewpoints, namely: ISC as 
an aid in protecting valuable assets, ISC as a holistic 
issue forming a part of the broader corporate culture, 
ISC as a solely human aspect, ISC as information 
security governance, and ISC as an issue of organ-
isational learning and knowledge creation in enter-
prises (Mazhelis and Isomäki, 2009). Some re-
searchers also connect the combination of corporate 
culture, governance and information security to in-
formation security obedience (Thomson and von 
Solms, 2005). 
The theoretical commitments that seem most 
appropriate for understanding information security 
culture in school settings include a constructionist 
stance, the view of learning as socially constructed 
and mediated (e.g., Lave and Wenger, 1991), and an 
insistence that information security culture should be 
studied on the basis of concrete discursive practices 
and interactions while using IT in learning, teaching, 
or management of the school. Analyses of ISC in 
schools would disclose various organisational level 
issues of end-user security behaviour intertwined 
with the use of educational technology. A qualitative 
approach facilitates also the study of different genres 
or social rules producing social order within infor-
mation security culture and its dissemination, stu-
dents’, teachers’ and rectors‘ authentic strategies for 
managing security as an everyday problem, and 
power relations inherent in a particular information 
security culture. 
3 INFORMATION SECURITY OF 
PEDAGOGICAL SOFTWARE 
Typical for the development of information security 
guidelines and practices of pedagogical software is 
that there are both generic and E-learning specific 
requirements (e.g., Eibl and Schubert, 2008; Furnell, 
Onions, Knahl, Sanders, Bleimann, Gojny, and 
Roder, 1998). (Weippl 2005) also attends to both 
generic and E-learning specific security require-
ments for systems used in IT-supported learning. 
The generic requirements include secrecy, integrity, 
availability and non-repudiation. Secrecy denotes 
that users may obtain access only to those objects for 
which they have received authorization, whereas 
integrity means that only authorized users or proc-
esses are permitted to modify data or programs. Ac-
cording to Weippl (2005, 5), availability is also a 
security concern. Justification for this is pedagogical 
in that students’ productivity decreases dramatically 
if network-based learning applications, such as 
WebCT, FirstClass and Optima, are too slow or not 
available due to denial-of-service attacks. Non-
repudiation presumes that users are able to plausibly 
deny having carried out certain actions, or, if a user 
has provided or changed a certain piece of informa-
tion he or she cannot deny having done it. For in-
stance, if some grades of students are altered, it must 
be possible to reliably trace the source of those 
changes.  
The generic requirements do not usually require 
any specific skills or performance of IT support staff 
in educational institutions but are included in nonde-
script security risk analyses and maintenance. Non-
repudiation issues can, however, be cumbersome in 
that they may cause risks for users’ privacy. For 
instance, if students' all actions are made traceable in 
the net by using, e.g., spyware, it may endanger pri-
vacy and diminish trust building in E-learning envi-
ronments. 
Information security requirements for E-learning 
often concern unauthorized use of digital content, 
trust, exams, and organization (Weippl, 2005, 6). 
The first of these may be tricky to address, because 
in addition to people who do not have authorized 
access to the content, people who have legitimate 
access to the content may copy or modify it without 
permission and/or disseminate it further.  
INFORMATION TECHNOLOGY AND SECURITY IN SCHOOLS - A Research Agenda
327