Using Complexity Theory to Identify K-12+ Pedagogical Misalignment With a Security Mindset
Cover - CISSE Volume 9, Issue 1
PDF

Keywords

security mindset
complexity
K-12 education
cybersecurity

How to Cite

Using Complexity Theory to Identify K-12+ Pedagogical Misalignment With a Security Mindset. (2022). Journal of The Colloquium for Information Systems Security Education, 9(1), 6. https://doi.org/10.53735/cisse.v9i1.154

Abstract

The current state of growing connectivity in society calls for a security mindset for K-12 and post-secondary (K-12+) populations. A security mindset offers an important approach to support security and can usefully be understood through the lens of complexity theory. Complexity theory also provides a helpful lens for identifying limitations inherent within some common pedagogical frameworks and practices in K-12+ education systems that may pose challenges for the cultivation of a security mindset. Hence, this paper brings awareness to examples of some of the most prominent pedagogical frameworks and practices that stand in potential misalignment with a security mindset when they are implemented in an imposing, monolithic manner. These include: rigid, prescriptive curricula; binary thinking, compliance, and standardized assessments; and disciplinary constraints. By identifying ways that common pedagogical practices stand to potentially undermine the cultivation of a security mindset, this paper contributes to clearing the way forward for K-12+ educational systems to design for emergence in support of building a more secure society.

PDF

Open Access License Notice:

This article is © its author(s) and is licensed under the Creative Commons Attribution 4.0 International License (CC BY 4.0). Beginning with Volume 13 (2026), this license is included directly within all published PDFs. For earlier articles, a cover page has been added to indicate the correct licensing terms. Any legacy copyright or pricing statements appearing within the PDF reflect prior print production workflows and do not represent the Journal’s current open access policy. For full details, please see the Journal’s License Terms.