Presentation is loading. Please wait.

Presentation is loading. Please wait.

Instructional Design Plan: Proprietary Information Protection Presented By: Tosha Sweat, L3 Communications Logistics Division March 16, 2015.

Similar presentations


Presentation on theme: "Instructional Design Plan: Proprietary Information Protection Presented By: Tosha Sweat, L3 Communications Logistics Division March 16, 2015."— Presentation transcript:

1 Instructional Design Plan: Proprietary Information Protection Presented By: Tosha Sweat, L3 Communications Logistics Division March 16, 2015

2 What IS Proprietary Information? Company Trade Secrets L3 Communications Business information Need-to-know documents and information Non-Disclosure Agreements Information regarding: Military personnel/operations Vendors Officers Employees Subsidiaries Shareholders

3 PHASE I Establish target audience Discuss and evaluate delivery methods Determine relevant and reasonable goals/expectations

4 TARGET AUDIENCE Daily interaction with government and company sensitive information Age demographics Technology awareness Previous knowledge Language and communication skills ◦Our instructional plan should always focus on the complex mindset of the audience with the intent to build the knowledge and acceptance of bigger ideas and long-lasting learning (Reiser & Dempsey, 2012).

5 DELIVERY METHODS Microsoft Power Point presentation Minimum 15-20 slides Question/Answer session Graphical Representation of security applicability Handouts dictating company policy and procedure Security point of contacts, summary, and PPT presentation emailed within 24 hours of instruction 1-2 hour block of instruction with breaks

6 Primary Goals 1. Employees will have a thorough understanding of what proprietary information is. 2.Employees will understand proper disposal of proprietary information. 3.Employees will understand proper storage of proprietary information. 4.Employees will understand their responsibilities to themselves and the company in handling proprietary information.

7 Analyzing Goal Specifics Needs Analysis Determines “What needs to take place based on what is going on in the environment” (Brown & Green, 2011, p.). Consideration for who wants the changes or needs the information What problems currently exist that can be resolved with the information contained in the instruction?

8 Analyzing Goal Specifics, cont’d Task Analysis “Provides important information about the content and/or tasks that will form the basis of the instruction” (Brown & Green, 2011, p.). Establish the correct content order Evaluate individual steps in collaboration with subject matter experts Utilize a learner’s perspective to evaluate appropriate teaching strategies.

9 PHASE II Establish objectives Define instructional strategies and activities What skills will the objectives use? Instructional technologies

10 Objectives, Strategies, & Activities OBJECTIVES: Upon completing the training, employees will be able to verbally demonstrate at least 5 different examples of proprietary information. Upon completion of the training, employees will successfully complete a multiple choice test to present thorough understanding of the proper storage and disposal of proprietary information. Upon completion of the training, employees will verbally present specific responsibilities of their immediate workplace and job requirements pertaining to proprietary information to their peers. Instructional Strategies/Activities: Knowledge-centered environment with a specific constructivist strategies Directed learning/teaching environment

11 PHASE III What is our timeline? ◦2 day course, each week, every 2 months Who will teach? ◦Ethics Officer ◦NCIS representative ◦Security Officer ◦IT representative

12 Resources What resources/materials are needed? ◦Projector screen ◦Power Point presentation uploaded to desktop or laptop computer ◦Printed study guide for students ◦Graph/Scattergram examples ◦Printed copy of Corporate electronic communications policy ◦Printed copy of Corporate Security Badges policy ◦Printed copy of L-3 IT Department Communications/Network Memo ◦Printed and laminated copy of Corporate ethics and security policy ◦Copy of Code of Ethics and Business Conduct booklet ◦Printed copy of Power Point presentation ◦Sign-in sheet ◦Accountability/Completion Certificate to be added to employee file

13 Implementation & Assessments How will we implement this plan? ◦Communicate: Company email initially distributed to HR and project managers to inventory each departments’ attendance. Detailed email distributed to all employees explaining breakdown of attendance dates for each department. ◦Interest & Commitment: Makeup days scheduled for those who cannot be present. Provide lunch both days for all those in attendance. Emphasize the value of information protection and validation in the workplace. Stressing the importance will more incline employee participation. ◦Participant Selection: In this case, participation is mandatory by every employee. I will be focusing on the immediate Hampton Roads area though and not instructing any of our other worldwide areas. This is the reason for breaking down the training into 2 days to accommodate the local employees. Analyzing an alphabetical breakdown would probably be the easiest and most efficient for dividing the attendance between both days. What formative assessments will be used? ◦Analogy prompts ◦Concept maps via PPT ◦Misconception prompts/quiz ◦Oral questioning

14 PHASE IV Learner Evaluation ◦Have the specific goals, objectives and overall outcome been successful? Evaluation Instruments ◦What will we use for evaluation?  Sample oral questions/quiz  Graphic organizer with PPT  Graphic organizer utilized as a handout for reference  Hard copy handout of the company policy and direction.  End of course survey Evaluation and the Future ◦How will we determine future decisions regarding the instruction and modifications to improve efficiency?

15 And so it begins…..

16 References Brown, A., & Green, T.D. (2011). The essentials of instructional design: Connecting fundamental principles with process and practice (2nd ed.). Boston, MA: Allyn and Bacon. Olivia, P. F., & Gordon, II, W.R. (2013). Developing the curriculum (8 th ed.). Upper Saddle River, NJ: Pearson Education, Inc. Reiser, R. A., & Dempsey, J. V. (2012). Trends and issues in instructional design and technology (3 rd ed.). Boston, MA: Pearson Education.


Download ppt "Instructional Design Plan: Proprietary Information Protection Presented By: Tosha Sweat, L3 Communications Logistics Division March 16, 2015."

Similar presentations


Ads by Google