International Journal of Management, Knowledge and Learning https://toknowpress.net/submission/index.php/ijmkl <p>The International Journal of Management, Knowledge and Learning (IJMKL) aims to bring together researchers and practitioners in business, education and other sectors to provide advanced knowledge in the areas of <strong>management</strong>, knowing and <strong>learning in organisations</strong>, <strong>education</strong>, <strong>business</strong>, <strong>social science</strong>, <strong>entrepreneurship</strong>, and <strong>innovation</strong> in businesses, and others.</p> <p>The journal encourages the <strong>exchange of academic research</strong> and provides all those involved in research and practice with new research findings, case examples and discussions. It brings new ideas and offers practical case studies to researchers, practitioners, consultants, and especially <strong>young researchers and doctoral students</strong> worldwide.</p> en-US ijmkl.editor@toknowpress.net (Valerij Dermol) info@toknowpress.net (Alen Ježovnik) Sun, 01 Jan 2023 00:00:00 +0000 OJS 3.3.0.6 http://blogs.law.harvard.edu/tech/rss 60 Peer Instruction as Teaching Method in Cybersecurity and Data Privacy https://toknowpress.net/submission/index.php/ijmkl/article/view/103 <p>Cybersecurity and data privacy are important fields today. Basic education in these two interconnected areas should already be offered in schools, as practically everyone today can encounter the dangers and risks of the Internet in terms of data theft, data manipulation or the like. However, the topics of cybersecurity and data privacy are generally abstract, and many people are not interested in such rather technical topics. To arouse interest and provide a certain basic education, we used ‘peer instruction’ combined with storytelling as a promising method. Within the framework of an EU project called GEIGER and with the support of students who have learned data privacy by means of the presented method, the method has been further developed, applied, tested, reflected, and iteratively improved. In summary, the method presented is useful for the topics of cybersecurity and data privacy, but the recommendations compiled must be considered in particular with regard to careful preparation and testing.</p> Bettina Scheider, Petra Maria Asprion Copyright (c) 2023 Bettina Scheider, Petra Maria Asprion https://creativecommons.org/licenses/by-sa/4.0 https://toknowpress.net/submission/index.php/ijmkl/article/view/103 Wed, 18 Jan 2023 00:00:00 +0000