Fluency with Information Technology (and Cybersecurity)
A report entitled Being Fluent with Information Technology published several years ago by the National Research Council (NRC) sought to identify what everyone—every user—ought to know about information technology.1 Written in 1999, that report mentioned security issues in passing as one subtopic within the general area of information systems. Subsequently, Lawrence Snyder, chair of the NRC Committee on Information Technology Literacy responsible for the 1999 report, wrote Fluency with Information Technology: Skills, Concepts, and Capabilities.2 The University of Washington course for 2006 based on this book (http://www.cs.washington.edu/education/courses/100/06wi/labs/lab11/lab11.html) addresses security issues in greater detail by setting forth the following objectives for the security unit:
Another NRC report, ICT Fluency and High Schools: A Workshop Summary,3 released in 2006, suggested that security issues were one possible update to the fluency framework described in the 1999 NRC report.
Taken together, these reports indicate that in the 8 years since Being Fluent with Information Technology was released, issues related to cybersecurity have begun to become important even to the most basic IT education efforts.
ing and background in this subfield. For example, security understandings are often based on physical-world metaphors, such as locking doors and obscuring sensitive information. These metaphors have some utility, and yet considerable education is needed to teach users the limitations of the metaphors. (Consider that in a world of powerful search tools [e.g., Google’s desktop, and Spotlight on Mac computers], it is not realistic for those in possession of sensitive information to rely on “trusting other people not to look for sensitive information” or “burying information in