ABSTRACT
The protection of information privacy is a timely issue, as the penetration of the Internet overwhelms every aspect of individuals' lives. Internet users’ privacy knowledge is often low, potentially due to the lack of theoretically founded methods for awareness raising and education. To address this gap, we propose the design of privacy learning activities based on a widely accepted learning theory (i.e., constructivism) derived from the education science. Since there is no specific pedagogy that guides towards specific practices for the application of the constructivism learning theory, in this paper we discuss the principles of constructivism, and we develop a set of requirements towards this direction. We adopt these requirements in information privacy learning, and we present an indicative scenario about the way that each requirement can be adopted in an educational activity, in order to result in changes of individual's privacy attitudes and behaviors.
- Pitkänen, O., & Tuunainen, V. K. (2012). Disclosing personal data socially—An empirical study on Facebook users' privacy awareness. Journal of Information Privacy and Security, 8(1), 3-29.Google ScholarCross Ref
- Papaioannou, T., Tsohou, A., & Karyda, M. (2021). Forming digital identities in social networks: the role of privacy concerns and self-esteem. Information & Computer Security.Google Scholar
- Soumelidou, A., & Tsohou, A. (2019). Effects of privacy policy visualization on users’ information privacy awareness level: The case of Instagram. Information Technology & People.Google Scholar
- Capistrano, E. P. S., & Chen, J. V. (2015). Information privacy policies: The effects of policy characteristics and online experience. Computer Standards & Interfaces, 42, 24-31.Google ScholarDigital Library
- Vemou, K., Karyda, M., & Kokolakis, S. (2014, October). Directions for raising privacy awareness in SNS platforms. In Proceedings of the 18th Panhellenic conference on informatics (pp. 1-6).Google ScholarDigital Library
- Soumelidou, A., & Tsohou, A. (2021). Towards the creation of a profile of the information privacy aware user through a systematic literature review of information privacy awareness. Telematics and Informatics, 61, 101592.Google ScholarCross Ref
- Gerber, N., Gerber, P., & Volkamer, M. (2018). Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior. Computers & security, 77, 226-261.Google Scholar
- IAAP (2017), The GDPR awareness guide, Retrieved May 4, 2022 from https://iapp.org/resources/article/gdpr-awareness-guide/Google Scholar
- Informational Commissioner's Office, Retrieved May 4, 2022 from https://ico.org.uk/for-organisations/accountability-framework/training-and-awareness/.Google Scholar
- Bada, S. O., & Olusegun, S. (2015). Constructivism learning theory: A paradigm for teaching and learning. Journal of Research & Method in Education, 5(6).Google Scholar
- Richardson, V. (2003). Constructivist Pedagogy. Teachers College Record, 105(9), 1623–1640.Google ScholarCross Ref
- Wilson, M., & Hash, J. (2003). Building an information technology security awareness and training program. NIST Special publication, 800(50), 1-39.Google ScholarDigital Library
- Tsohou, A., Kokolakis, S., Karyda, M., & Kiountouzis, E. (2008). Investigating information security awareness: research and practice gaps. Information Security Journal: A Global Perspective, 17(5-6), 207-227.Google ScholarDigital Library
- Ertmer, P. A., & Newby, T. J. (2013). Behaviorism, Cognitivism, Constructivism: Comparing Critical Features from an Instructional Design Perspective. Performance Improvement Quarterly, 26(2), 43–71.Google ScholarCross Ref
- Bereiter, C. (1994). Constructivism, socioculturalism, and Popper's world 3. Educational researcher, 23(7).Google Scholar
- Bednar, A. K., Cunningham, D. J., Duffy, T. M., & Perry, J. D. (1992). Theory into practice: How do we link? In T. M. Duffy & D. H. Jonassen (Eds.), Constructivism and the technology of instruction (pp. 17-34). Hillsdale, NJ: Lawrence Erlbaum Associates.Google Scholar
- Siraj-Blatchford, I. (2010). A focus on pedagogy: Case studies of effective practice. In Early childhood matters (pp. 165-181). Routledge.Google Scholar
- Alexander, R. (2008). Pedagogy, curriculum and culture. Pedagogy and practice: Culture and identities, 3-27.Google Scholar
- Gage, N. L. (1985). Hard Gains in the Soft Sciences: The Case of Pedagogy.Google Scholar
- Willis, J. (2000). The Maturing of Constructivist Instructional Design: Some Basic Principles That Can Guide Practice.Google Scholar
- Heinich, R. (1984). The proper study of instructional technology. Educational Communication and Technology Journal, 32(2) 67-87Google ScholarCross Ref
- Reigeluth, C. M. (1989). Educational technology at the crossroads: New mindsets and new directions. Educational Technology Research and Development, 37(1), 1042-1629.Google ScholarCross Ref
- Lebow, D. (1993). Constructivist values for instructional systems design: Five principles toward a new mindset. Educational Technology Research and Development, 41(3) 4-16.Google ScholarCross Ref
- Honebein, P.C. (1996). Seven goals for the design of constructivist learning environments.in Constructivist Learning Environments: Case Studies in Instructional Design. Brent G. Wilson (Ed.). Englewood Cliffs: Educational Technology Publications: 11-24.Google Scholar
- Partlow, K. M., & Gibbs, W. J. (2003). Indicators of constructivist principles in internet-based courses. Journal of Computing in Higher Education, 14(2).Google ScholarCross Ref
- Jonassen, D.H., Peck, K.L., & Wilson, B.G. (1999). Learning with technology. Columbus, OH: Prentice Hall.Google Scholar
- Driscoll, M.P. (2000). Psychology of learning for instruction. Needham Heights, MA: Allyn and Bacon.Google Scholar
- Dornisch, M.M, & Land, S.M. (2002). A conceptual framework for the integration of multiple perspectives with distributed learning environments. Journal of Computing in Higher Education, 14(1), 3-27.Google ScholarCross Ref
- Cunningham, D. J., & Duffy, T. M., Knuth, RA (1993). The textbook of the future. Hypertext: a psychological perspective. London: Horwood Publishing.Google Scholar
- Knuth, R. A., & Cunningham, D. J. (1993). Tools for constructivism. In Designing environments for constructive learning (pp. 163-188). Springer, Berlin, Heidelberg.Google ScholarCross Ref
- Tam, M. (2000). Constructivism, instructional design, and technology: Implications for transforming distance learning. Journal of Educational Technology & Society, 3(2), 50-60.Google Scholar
- Smith, J. K. (1993). After the demise of empiricism: The problem of judging social and educational inquiry. Ablex Publishing Corporation.Google Scholar
- Willis, J. (1995). A recursive, reflective instructional design model based on constructivist-interpretivist theory. Educational technology, 35(6), 5-23.Google Scholar
- Savery, J. R., and Duffy, T. M. (1995). Problem based learning: An instructional model and its constructivist framework. Educational technology, 35(5).Google Scholar
- Pande, M., & Bharathi, S. V. (2020). Theoretical foundations of design thinking–A constructivism learning approach to design thinking. Thinking Skills and Creativity, 36, 100637.Google ScholarCross Ref
- Goolishian, H. A., & Winderman, L. (1988). Constructivism, autopoiesis and problem determined systems. The Irish journal of psychology, 9(1), 130-143.Google Scholar
- Harjali, H. (2019). Building constructivist learning environment at senior high school in Indonesia. The Qualitative Report, 24(9), 2197-2214.Google Scholar
- Waxer, M., and Morton, J.B. (2012) Cognitive Conflict and Learning. In: Seel N.M. (eds) Encyclopedia of the Sciences of Learning. Springer, Boston, MA.Google ScholarCross Ref
- Finn, R.L., Wright, D. and Friedewald, M. (2013), Seven Types of Privacy, In: Gutwirth S., Leenes R., de Hert P., Poullet Y. (eds), European Data Protection: Coming of Age, pp 3-32, Springer, Dordrecht.Google Scholar
- Kokolakis, S. (2017). Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon. Computers & security, 64.Google Scholar
- Cover Your Tracks, A Project of the Electronic Frontier Foundation, Retrieved May 4, 2022 from https://coveryourtracks.eff.org/Google Scholar
- Ghostery, a privacy and security-related browser extension and mobile browser application, Retrieved May 4, 2022 from https://www.ghostery.com.Google Scholar
- Jonassen, D. H. (1991). Objectivism versus constructivism: do we need a new philosophical paradigm? Journal of Educational Research, 39 (3).Google Scholar
Index Terms
- Requirements for an Information Privacy Pedagogy based on the Constructivism Learning Theory
Recommendations
Promoting effective e-learning practices through the constructivist pedagogy
Although rapid advances in technology has allowed for the growth of collaborative e-learning experiences unconstrained by time and space, technology has not been heavily infused in the activities of teaching and learning. This article examines the ...
Fostering Meaningful Student Learning Through Constructivist Pedagogy and Technology Integration
While national statistics cite a remarkable improvement in technology tools and access to the Internet in most schools across the nation, many teachers are not integrating these tools into their instruction in ways that support and maximize student ...
Competition-Based Learning: A Model for the Integration of Competitions with Project-Based Learning using Open Source LMS
In an effort to enhance the learning process in higher education, a new model for Competition-Based Learning CBL is presented. The new model utilizes two well-known learning models, namely, the Project-Based Learning PBL and competitions. The new model ...
Comments