-- Zettelkasten


Karte 144.1 ZitierfähigEffective IT security awareness presentations2008-10-07

Effective IT security awareness presentations must be designed with the recognition that people
tend to practice a tuning-out process called acclimation. If a stimulus, originally an attentiongetter,
is used repeatedly, the learner will selectively ignore the stimulus. Thus, awareness
presentations must be on-going, creative, and motivational, with the objective of focusing the
learner’s attention so that the learning will be incorporated into conscious decision-making. This
is called assimilation, a process whereby an individual incorporates new experiences into an
existing behavior pattern.

Quelle: Mark Wilson and Dorothea E. de Zafra and Sadie I. Pitcher and John D. Tressler and John B. Ippolito (2003) : Information Technology Security Training Requirements: A Role- and Performance-Based Model (S. 24)        
Zitiert in:         Andere Karten der Quelle

Siehe auch: Sicherheit; Awareness; SAK; Verhalten;
Kollokationsgraphen:Sicherheit; Awareness; SAK; Verhalten;
Literatur:Sicherheit; Awareness; SAK; Verhalten;

<-- LaTeX-Code Bearbeiten Bibliographieeintrag (Text) -->

Startseite Neue Karte
Autor: Stefan Schumacher, Stefan.Schumacher [at] Bildungswissenschaft [dot] info
$Id:,v 1.20 2018/04/11 09:46:42 stefan Exp $
$Id:,v 1.11 2011/04/10 13:39:05 stefan Exp $

(Anzeige) Mehr zu mir auf meiner Agenturseite: