Learning Security

Qualitative Evaluation

By contrast, to evaluate the extent to which participants had actually adopted these habits in their daily lives, we asked them to:

  1. Show us the number of entries in their primary KeePassX database, or

  2. Describe any alternative systems they had adopted since the relevant workshop.

Both methodologies are works in progress—particularly the second—but we strongly encourage those designing and implementing future information-security curricula to attempt something similar.