Skip to main content

Advertisement

Log in

A performance evaluation of information security training in public sector

  • Original Paper
  • Published:
Journal of Computer Virology and Hacking Techniques Aims and scope Submit manuscript

Abstract

Recently, as the incidents of the security breach and the personal information leakage in public institutions and the major information/communication infrastructure have increased, the importance of the development and training of human resources specialized in cybersecurity, who can immediately respond to this are emphasized. Accordingly, the government has announced policies for the development of human resources, established and operated public sector cybersecurity training centers; however, there is no method for understanding the investment performance and effect of the present cybersecurity education/training in the public sector. For the establishment of a training system and the quality control of continuing education, a method for evaluating the performance of the training is needed, and this can prove the justification of the promotion of the training program and the sustainability of the training center. The goal of this study is to analyze the outcome of education and training in the field of information security and economic return on investment. For this purpose, through literature research on the outcome of the domestic and overseas education and training, this study drew a model that can apply.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Lee, A.: Authentication scheme for smart learning system in the cloud computing environment. J. Comput. Virol. Hacking Tech. 11(3), 149–155 (2015)

    Article  Google Scholar 

  2. Curado, C., Martins Teixeira, S.: Training evaluation levels and ROI: the case of small logistics company. Eur. J. Train. Dev. 38(9), 845–870 (2014)

    Article  Google Scholar 

  3. Stufflebeam, D.L.: Toward a Science of Educational Evaluation. Educational Technology Publication, Englewood Cliffs (1973)

    Google Scholar 

  4. Kirkpatrick, D., Kirkpatrick, J.: Evaluating Training Program: The Four Levels, 3rd edn. Berrett-Koehler Publishers, San Francisco (2006)

    MATH  Google Scholar 

  5. Bushnell, D.S.: Input, process, output: a model for evaluating training. Train. Dev. J. 44(3), 41–44 (1990)

    MathSciNet  Google Scholar 

  6. Lee, H.J., Cha, Y.J.: A study on the effectiveness of privacy education using the CIPP model: focusing on the perceptions of local government officials. Korean J. Local Gov. Stud. 19(1), 95–119 (2015)

    MathSciNet  Google Scholar 

  7. Lee, H.J., Lee, H.C., Cha, Y.J.: A study on the performance of privacy education in local government: focused on Kirkpatrick model. Korean J. Local Gov. Stud. 24(1), 173–196 (2015)

    Google Scholar 

  8. McLaughlin, J.A., Jordan, G.B.: Using logic models. In: Handbook of practical program evaluation, pp. 7–32. Jossey-Bass Inc., San Francisco (2004)

    Google Scholar 

  9. Kim, J.H., Lee, K.H.: Vulnerabilities of intelligent automobiles using TPEG update based on T-DMB and its countermeasures. J. Comput. Virol. Hacking Tech. 11(3), 143–148 (2015)

    Article  Google Scholar 

  10. Phillips, J.J.: Handbook of Training Evaluation and Measurement Methods. Routledge, New York (1997)

    Google Scholar 

  11. Korea Internet & Security Agency: National information security white paper. Ministry of Science, ICT and Future Planning (2016)

  12. Choi, M.K., Han, K.S.: A study on the service quality of SMEs management consulting affecting the perceived management performance in mobile communication environments. J. Comput. Virol. Hacking Tech. 10(2), 145–156 (2014)

    Article  Google Scholar 

  13. Rafiq, M.: Training evaluation in an organization using Kirkpatrick model: a case study of PIA. J. Entrep. Organ. Manag. 4, 151 (2015)

  14. Grossman, R., Salas, E.: The transfer of training: what really matters. Int. J. Train. Dev. 15(2), 103–120 (2011)

    Article  Google Scholar 

  15. Toth, P., Klein, P.: A Role-Based Model for Federal Information Technology/Cybersecurity Training. NIST Special Publication 800-16, Gaithersburg (2014)

    Google Scholar 

  16. Warr, P., Bird, M., Rackham, N.: Evaluation of Management Training. Gower Press, London (1970)

    Google Scholar 

  17. Sorensen, S.E.: Comprehensive return on investment evaluation system for local self-government training in Bosnia and Herzegovina—case: project cycle management course. Perform. Improv. 54(1), 14–27 (2015)

    Article  Google Scholar 

  18. Goh, Y.S.: Design of the procedural ROI process model for human resource programs. Korean Soc. Educ. Technol. 21(2), 153–186 (2005)

    Google Scholar 

  19. Kim, Y.T., Jeong, Y.S.: A token-based authentication security scheme for Hadoop distributed file system using elliptic curve cryptography. J. Comput. Virol. Hacking Tech. 11(3), 137–142 (2015)

    Article  Google Scholar 

Download references

Acknowledgements

This research was supported by the Basic Science Research Program through the National Research Foundation of Korea funded by the Korean Government (NRF-2011-0025512). This work was supported by the Ministry of Education of the Republic of Korea and the National Research Foundation of Korea (NRF- 2015S1A5A2A01009763). This study was carried out with the support of ‘R&D Program for Forestry Technology (Project No. 2016004C10-1619-AB01)’ provided by Korea Forest Service.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tae-Sung Kim.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Park, SK., Lee, SH., Kim, TY. et al. A performance evaluation of information security training in public sector. J Comput Virol Hack Tech 13, 289–296 (2017). https://doi.org/10.1007/s11416-017-0305-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11416-017-0305-7

Keywords

Navigation