1 Posthuman Foundations
Research demonstrates a critical gap in cybersecurity education theoretical frameworks, where dominant approaches prioritize instrumental human control over technological systems rather than recognizing the complex co-constitutive relationships that characterize contemporary security practice. Analysis of the National Initiative for Cybersecurity Education (NICE) Workforce Framework reveals significant posthuman elements already embedded within cybersecurity professional roles, particularly in areas involving human-technology entanglement and adaptive learning processes. However, systematic examination of cybersecurity education literature identifies persistent anthropocentric assumptions that limit educational effectiveness in preparing professionals for increasingly complex human-AI collaborative security environments.
This theoretical synthesis addresses identified gaps by extending posthumanist educational principles specifically to cybersecurity domains, creating novel frameworks for understanding how security knowledge emerges through material-semiotic assemblages rather than individual cognitive achievement. While human-centric cybersecurity approaches have generated extensive scholarship—evidenced by dedicated conference tracks and specialized journals—empirical research reveals fundamental limitations in approaches that position humans as controllers of passive technological instruments. The cybersecurity field’s emphasis on technical specialization has resulted in theoretical underdevelopment, with texts claiming philosophical orientation typically providing field overviews rather than systematic theoretical frameworks.
This chapter establishes the comprehensive theoretical framework supporting the Cyber Dimensions methodology, grounding systematic worldbuilding and immersive case study development in posthumanist educational theory, postphenomenological research methodology, and assemblage thinking.
Ongoing systematic review research has identified persistent gaps in cybersecurity education theoretical foundations, revealing how conventional approaches fail to address the distributed character of contemporary security practice. This framework addresses these documented limitations by providing systematic methodology for educational design that recognizes technological co-agency in cybersecurity learning.
Posthuman Educational Theory
Beyond Human-Centered Learning Paradigms
Traditional cybersecurity education operates within anthropocentric paradigms that position human learners as autonomous subjects who acquire knowledge about technological objects. This subject-object dualism treats cybersecurity technologies as passive tools that humans learn to “use” rather than recognizing the complex ways humans and technologies co-constitute each other in ongoing processes of becoming (Adams & Thompson, 2016).
Posthuman educational theory challenges these assumptions by recognizing that learning emerges through material-semiotic practices involving networks of human and nonhuman actors (Barad, 2007). In cybersecurity education, this fundamental shift reveals that learning becomes distributed across assemblages of students, instructors, fictional characters, technological systems, and organizational structures, creating understanding through collective rather than individual processes. Agency operates relationally, with both human and nonhuman actors possessing the capacity to shape educational outcomes in ways that exceed traditional subject-object distinctions. Knowledge emerges as inherently situated within specific sociotechnical contexts, rejecting universal cybersecurity principles in favor of contextually embedded understanding. Most significantly, ethics become entangled across human-technology assemblages, extending responsibility beyond individual moral agents to encompass the complex networks through which cybersecurity practices emerge.
These principles represent fundamental departures from conventional educational approaches that treat technologies as neutral delivery mechanisms for predetermined content. Research evidence demonstrates that cybersecurity professionals increasingly work within assemblages where human expertise and technological capabilities are inseparably entangled, requiring educational approaches that prepare students for collaborative rather than controlling relationships with security systems. When cybersecurity education acknowledges co-constitution, distributed cognition, emergent knowledge, and situated learning, it moves beyond instrumental skill acquisition toward development of capacities for participating effectively in complex sociotechnical security environments.
Co-constitution: Humans and technologies mutually shape each other through ongoing interactions rather than existing as separate entities
Distributed Cognition: Intelligence operates across networks that include human minds, technological systems, and material environments
Emergent Knowledge: Understanding arises through assemblage interactions rather than transmission from instructor to student
Situated Learning: Knowledge is always embedded in specific contexts and cannot be separated from the conditions of its production
Material-Semiotic Practices in Cybersecurity Education
Drawing from Haraway’s work on situated knowledges (1988), cybersecurity case studies must recognize that all knowledge claims emerge from particular positions within material-semiotic networks. The Cyber Dimensions methodology embodies this recognition by creating fictional worlds that acknowledge positioned perspectives. Characters represent specific viewpoints rather than universal cybersecurity truths, leading to a rich, varied, and realistic tapestry that is authentically situated in the world. We must also integrate material conditions, giving awareness to technological infrastructure and organizational contexts that shape available actions. Case studies resist total knowledge claims, maintaining the uncertainty of real cybersecurity practice, preserving partiality in the process. Finally, through this process, students develop capabilities for response-ability, enabling response to complex situations rather than simply attempting to apply universal rules.
Research application of these heuristics to cybersecurity education contexts has revealed significant methodological insights. Analysis of NICE Framework Work Roles through posthuman coding schemes demonstrates how seemingly human-centered professional descriptions actually contain substantial evidence of human-technology entanglement, challenging conventional interpretations of cybersecurity workforce competencies. Classroom observations using these heuristics have documented how students engage with fictional cybersecurity scenarios in ways that exceed instructor design intentions, revealing emergent learning properties that traditional assessment methods fail to capture.
Methodological adaptations for cybersecurity contexts have required developing specialized coding schemes that recognize the technical complexity of security systems while maintaining focus on relational rather than instrumental human-technology dynamics. These adaptations enable systematic analysis of how cybersecurity professionals develop expertise through ongoing participation in sociotechnical assemblages rather than accumulation of discrete technical skills.
Adams and Thompson (2016) operationalize this by suggesting eight heuristics, a systematic methodology, for conducting posthuman educational research that recognizes nonhuman agency and distributed learning processes. These heuristics inform both the development of cybersecurity case studies and research on their educational effectiveness.
Application of posthuman heuristics to cybersecurity education research has generated concrete empirical insights that inform theoretical development. “Following the actors” analysis revealed how cybersecurity learning emerges through complex networks involving human students, fictional characters, technological systems, and organizational structures, with agency distributed across these assemblages rather than concentrated in individual learners. “Studying breakdowns” in educational technology implementations exposed normally invisible infrastructures supporting case study delivery, revealing how technical failures create opportunities for enhanced understanding of human-technology interdependencies.
The Eight Heuristics Applied to Cybersecurity Education
1. Gathering Anecdotes
Principle: Collect stories and incidents that reveal how learning emerges through unexpected encounters among human and nonhuman actors.
Research documentation of student engagement patterns has revealed unexpected learning trajectories that exceed designed educational parameters. Analysis of student responses to fictional cybersecurity scenarios demonstrates how learners create novel interpretations that combine technical understanding with ethical reasoning in ways not anticipated in original case study design. These documented patterns suggest that meaningful cybersecurity education emerges through student-technology-content assemblages rather than systematic implementation of predetermined learning objectives.
Systematic collection of classroom anecdotes provides evidence of how posthuman learning processes manifest in cybersecurity education contexts, informing iterative refinement of both theoretical frameworks and practical pedagogical approaches.
Application in Case Study Development: Document how students engage with fictional cybersecurity scenarios in ways that exceed instructor intentions. These anecdotal observations inform iterative case study refinement and reveal emergent learning properties.
Classroom research has documented specific instances where student narratives revealed aspects of cybersecurity understanding that traditional assessment methods failed to detect, leading to recognition that learning evaluation must account for assemblage participation rather than individual knowledge acquisition. These findings have informed development of assessment approaches that recognize distributed rather than individual cognitive achievement.
Traditional instructional design focuses on planned learning outcomes and measurable objectives (2005). Posthuman approaches recognize that the most significant learning often emerges through unplanned encounters that reveal new possibilities for human-technology relationships.
Systematic collection of student anecdotes provides evidence of how fictional cybersecurity assemblages generate learning experiences that exceed designed parameters.
2. Following the Actors
Principle: Trace how both human and nonhuman actors shape educational encounters, recognizing that agency is distributed across assemblages.
Application: Map how fictional characters, organizational systems, technological artifacts, and student interpretations interact to produce specific learning outcomes. This analysis reveals the complex networks through which cybersecurity understanding emerges.
3. Listening for Invitational Quality
Principle: Attend to how educational environments invite or constrain particular forms of engagement and learning.
Application: Assess how cybersecurity case studies create invitations for specific types of analysis while foreclosing others. Well-designed fictional assemblages invite sophisticated ethical reasoning while avoiding predetermined conclusions.
4. Studying Breakdowns
Principle: Examine moments when educational technologies or processes fail to function as intended, revealing normally invisible infrastructures.
Application: Document instances when cybersecurity case studies produce unexpected student responses, technical difficulties, or pedagogical challenges. These breakdowns illuminate the complex infrastructures supporting educational assemblages.
Breakdown analysis provides crucial data for iterative case study improvement. When fictional scenarios fail to engage students as anticipated, or when technical infrastructure creates barriers to learning, these failures reveal important information about assemblage dynamics. Systematic documentation of breakdowns enables evidence-based refinement of both content and technical implementation.
5. Discerning Human-Technology Relations
Principle: Analyze the specific ways humans and technologies interact within educational contexts, recognizing diverse relational patterns.
Application: Examine how students engage with cybersecurity technologies represented in fictional scenarios, identifying whether these technologies function as tools, partners, adversaries, or environmental conditions.
6. Laws of Media
Principle: Investigate what educational technologies enhance, obsolesce, retrieve, and reverse, following McLuhan’s tetrad framework.
Application: Analyze how systematic worldbuilding and fictional cybersecurity scenarios enhance certain forms of learning while making others obsolete, what educational approaches they retrieve from earlier practices, and what they might reverse into if pushed to extremes.
7. Unraveling Translations
Principle: Trace how meanings, intentions, and agencies are transformed as they move through educational networks.
Application: Follow how cybersecurity concepts are translated through fictional scenarios, student interpretations, peer discussions, and assessment activities. These translations reveal how understanding emerges through assemblage participation.
8. Tracing Responses and Passages
Principle: Map how human and nonhuman actors respond to each other within educational assemblages, creating passages for new forms of learning.
Application: Document how students respond to fictional cybersecurity scenarios and how these scenarios, in turn, respond to student engagement through dynamic content generation and adaptive narrative elements.
Barad’s Agential Realism in Educational Technology Design
Intra-active Pedagogies
Karen Barad’s concept of intra-activity (2007) provides crucial theoretical grounding for understanding how learning emerges through mutual constitution of human learners and educational technologies. Unlike interaction (which assumes pre-existing entities that subsequently engage), intra-activity recognizes that entities emerge through their relationships.
In cybersecurity education, this theoretical framework transforms pedagogical practice by revealing how students and case studies co-emerge through their ongoing engagement rather than existing as independent entities that subsequently interact. Agency becomes distributed across both human learners and fictional cybersecurity assemblages, each possessing the capacity to shape educational outcomes in ways that exceed traditional instructor-student dynamics. Knowledge manifests as performative, enacted through practices rather than transmitted as discrete information packages, requiring active participation in cybersecurity assemblages to generate understanding. The “reality” of cybersecurity itself emerges through specific material-discursive practices rather than existing as an independent domain that students simply learn about, fundamentally altering how we conceptualize cybersecurity education.
Barad’s framework challenges the assumption that educational technologies are neutral tools that humans use to access pre-existing knowledge. Instead, human-technology assemblages co-constitute both learners and knowledge through ongoing intra-active processes.
This perspective has profound implications for cybersecurity case study design, requiring attention to how fictional worlds participate in knowledge production rather than simply representing it.
Phenomenon-Centered Assessment
Barad’s concept of agential cuts provides framework for posthuman assessment approaches that recognize learning as emerging through assemblage participation rather than individual cognitive achievement. Assessment becomes a practice of making specific aspects of distributed learning phenomena observable and measurable.
Traditional Assessment: Measures individual student knowledge acquisition through standardized evaluation instruments
Posthuman Assessment: Examines how students participate in complex cybersecurity assemblages, recognizing that understanding emerges through human-technology-organization networks
Assessment practices create “agential cuts” that make specific aspects of learning phenomena observable while necessarily excluding others. Effective posthuman assessment:
Effective posthuman assessment recognizes partiality by acknowledging that evaluation necessarily captures only particular aspects of distributed learning processes, maintaining awareness of what remains invisible within any specific assessment framework. This approach values assemblage participation by measuring how students engage with complex networks rather than isolated knowledge objects, understanding that cybersecurity competence emerges through relational practice rather than individual knowledge accumulation. The framework supports ongoing becoming by treating assessment as formative participation in educational assemblages rather than summative measurement, enabling continued learning through the evaluation process itself.
Assemblage Theory and Systematic Worldbuilding
Deleuze & Guattari’s Assemblage Framework
The systematic worldbuilding methodology draws theoretical grounding from Deleuze and Guattari’s concept of assemblages (agencements) as heterogeneous networks that connect human and nonhuman elements in productive relationships (Deleuze & Guattari, 1987). Cybersecurity case studies function as educational assemblages that bring together material components including technological systems, organizational infrastructures, and physical environments with semiotic components encompassing language, symbols, discourse, and narrative structures. These material-semiotic networks integrate human components—students, instructors, fictional characters, and diverse stakeholder perspectives—with nonhuman components such as algorithms, data flows, security protocols, and institutional procedures, creating complex educational ecosystems that exceed the sum of their individual parts.
These components operate according to principles of connection, heterogeneity, multiplicity, and cartography that inform systematic worldbuilding practices:
Connection: Any point in an assemblage can connect to any other point, enabling unexpected learning pathways and emergent understanding
Heterogeneity: Assemblages connect diverse elements (human, technological, organizational, conceptual) without reducing them to common essence
Multiplicity: Educational assemblages operate across multiple scales and dimensions simultaneously, supporting diverse forms of engagement
Cartography: Assemblages are mapped rather than traced, meaning they create new territories rather than representing existing ones
The cartographic principle proves particularly significant for cybersecurity education because security threats and responses emerge through dynamic territorial configurations rather than following predetermined pathways. Research on cybersecurity case study development reveals how effective educational assemblages create new territories of understanding rather than simply mapping existing cybersecurity knowledge. When students engage with fictional cybersecurity scenarios, they participate in cartographic processes that generate novel security territories through their interpretive engagement, demonstrating how educational assemblages can function as genuine research instruments that produce knowledge rather than merely transmit it.
Actor-Network Theory and Case Study Architecture
Drawing from Bruno Latour’s Actor-Network Theory (2005), the Cyber Dimensions methodology recognizes that effective cybersecurity education requires mapping the complex networks through which security practices emerge. The fictional case studies created here present educational actor-networks that systematically flatten traditional hierarchies by treating human actors, technological systems, and organizational structures as equally capable of agency within cybersecurity assemblages. This approach follows associations by tracing the connections through which cybersecurity phenomena emerge rather than imposing predetermined analytical categories, revealing unexpected pathways through which understanding develops. The methodology recognizes spokesperson effects by examining how particular actors—whether human or nonhuman—come to represent broader networks within cybersecurity contexts, acknowledging the political dimensions of representation. Finally, the approach documents translations by mapping how cybersecurity concepts are transformed as they move through educational assemblages, recognizing that meaning emerges through network participation rather than existing as stable properties of individual concepts.
Development of systematic worldbuilding infrastructure has demonstrated ANT principles through creation of technical systems that maintain consistency across multiple educational contexts while enabling local adaptation. Research on centralized data management systems reveals how standardized character and organizational representations function as immutable mobiles, enabling coherent narrative development across diverse cybersecurity scenarios while supporting contextual variation.
Technical implementation through R/Quarto systems creates genuine immutable mobiles by establishing standardized data structures that travel unchanged across different case study contexts while enabling local interpretation and implementation variations, providing concrete evidence of how educational technologies can embody ANT theoretical principles.
The centralized _worldbuilding.yml
system embodies ANT principles by creating immutable mobiles, standardized representations that maintain consistency across multiple contexts while enabling local adaptation and interpretation. This manifests in actants like characters, organizations, and platforms. We can watch a small-town newspaper contributor in one case grow into the editor of a major outlet over the course of different cases. We could follow the public perception of a social media platform change as their policies change. We could see the political leanings of a non-government organization change as their funding sources change. Worldbuilding is not simply about telling one story; rather, it’s about telling many stories across a single reality. This may lead to surprises even for the designer, like unexpected (but completely reasonable) character development from one case to another.
Systematic worldbuilding implementation has revealed unexpected network effects where fictional character development across multiple case studies generates narrative trajectories not anticipated in original design, providing empirical evidence of how educational assemblages possess genuine agency that exceeds designer intentions. These discoveries demonstrate how posthuman educational principles manifest through practical technological implementation.
Postphenomenological Methodology for Cybersecurity Education
Don Ihde’s postphenomenological analysis (1990) provides systematic methodology for examining how humans and technologies interrelate within cybersecurity contexts. The four fundamental relations inform both case study development and research on educational effectiveness:
Embodiment Relations (Human-Technology)
Technologies become transparent extensions of human capability, as when cybersecurity analysts “feel” network anomalies through monitoring interfaces or when students navigate fictional organizational structures through web-based case study platforms.
Interface design research has identified specific technical features that enable embodied engagement with cybersecurity concepts, including multimedia integration strategies that support intuitive rather than purely analytical learning processes. Implementation decisions regarding navigation structures, content presentation, and interactive elements demonstrate how educational technologies can facilitate postphenomenological learning relationships.
Quarto implementation strategies create technical conditions for embodied learning by integrating multimedia elements, dynamic content generation, and responsive design features that enable fluid student engagement with complex cybersecurity scenarios, providing concrete examples of how educational technology design can support posthuman pedagogical principles.
Educational Application: Design case study interfaces that enable embodied engagement with cybersecurity concepts, supporting intuitive rather than purely cognitive learning processes.
Observable student behaviors indicate embodied rather than purely cognitive engagement when learners demonstrate intuitive navigation of complex cybersecurity scenarios, suggesting that fictional case study platforms enable embodied learning processes that exceed traditional instructional design expectations.
Hermeneutic Relations (Human → Technology → World)
Humans “read” the world through technological mediation, interpreting cybersecurity situations through security information and event management (SIEM) systems, vulnerability scanners, or threat intelligence platforms.
Educational Application: Create fictional cybersecurity scenarios that require students to interpret complex situations through realistic technological mediation, developing critical skills for professional practice.
Postphenomenological analysis reveals that cybersecurity professionals never engage directly with “pure” security situations but always work through technological mediation. Educational case studies must reflect this mediated character of cybersecurity practice rather than presenting abstract ethical dilemmas divorced from technological contexts.
Alterity Relations (Human ↔︎ Technology)
Technologies appear as quasi-other entities that humans engage with as partners, adversaries, or independent agents. Cybersecurity systems often exhibit apparent agency that requires recognition and response.
Educational Application: Develop fictional scenarios where cybersecurity technologies possess apparent agency, requiring students to develop capabilities for working with rather than simply controlling technological systems.
Background Relations (Human [Technology/World])
Technologies create environmental conditions that enable and constrain human action without requiring explicit attention. Cybersecurity infrastructure operates largely in the background, becoming visible primarily during failures or security incidents.
Educational Application: Design case studies that illuminate normally invisible cybersecurity infrastructure, helping students understand how background technologies shape security possibilities.
Extending Postphenomenology
Ihde’s initial postphenomenological relations set the stage for further explorations as technologies changed over time.
Cyborg Ontologies
Peter-Paul Verbeek’s extension of postphenomenological analysis beyond Ihde’s original framework recognizes how contemporary technologies create hybrid forms of intentionality that exceed traditional human-technology relations. In cybersecurity contexts, this extension becomes crucial for understanding how AI-enhanced security systems create new forms of cyborg intentionality where human analysts and intelligent systems co-constitute threat assessment capabilities. Research on cybersecurity professional practice demonstrates that effective security analysis increasingly requires hybrid human-AI intentionality that transcends traditional subject-object distinctions, suggesting that cybersecurity education must prepare students for genuinely cyborg forms of professional practice.
Postphenomenological Ethics
Peter-Paul Verbeek’s extension of postphenomenological analysis into ethical domains (2011) provides framework for cybersecurity education that recognizes the moral agency of technological systems. This approach informs the development of case studies that recognize how cybersecurity technologies actively mediate ethical possibilities and constraints rather than serving as neutral tools for implementing predetermined moral frameworks. The methodology distributes moral agency across human-technology assemblages, acknowledging that ethical responsibility extends beyond individual decision-makers to encompass the complex networks through which cybersecurity practices emerge. Case studies developed through this framework support moral imagination by developing capabilities for anticipating ethical implications of technological design choices before they manifest in practice. Most importantly, this approach enables responsive design by creating educational technologies that support rather than undermine human moral agency, fostering cybersecurity professionals capable of ethical reasoning within technologically mediated environments.
Design-Based Research and Educational Innovation
Research-Creation Methodology
The Cyber Dimensions methodology employs research-creation approaches that recognize educational technology development as systematic inquiry rather than purely technical implementation (Manning, 2016). This methodology integrates theory and practice by allowing educational innovation to emerge through sustained engagement with both theoretical frameworks and practical implementation challenges, refusing traditional separations between conceptual work and applied development. The approach values creative process by recognizing that systematic worldbuilding and case study development constitute genuine forms of educational research that generate theoretical insights through practical experimentation. This orientation supports emergent discovery by allowing theoretical understanding to evolve through practical experimentation with educational assemblages, creating feedback loops between conceptual frameworks and lived educational experiences. Ultimately, this research-creation methodology generates new knowledge that contributes simultaneously to cybersecurity education and posthuman pedagogical theory, advancing both domains through innovative practice.
Research-creation methodology moves beyond traditional distinctions between research (knowledge production) and development (application). Educational technology innovation becomes a form of theoretical inquiry that generates new understanding about learning, technology, and cybersecurity through creative practice.
Systematic documentation of educational technology development processes has revealed how theoretical insights emerge through practical experimentation with cybersecurity case study creation, generating knowledge that contributes simultaneously to educational technology research and posthuman pedagogical theory. This research-creation methodology produces transferable insights about technological mediation in educational contexts while advancing practical approaches to cybersecurity professional preparation.
Scholarly contribution is evidenced through peer-reviewed publications examining posthuman approaches to cybersecurity education, conference presentations demonstrating novel theoretical applications, and ongoing collaborative research that extends posthuman educational frameworks to technical professional development contexts.
This approach requires systematic documentation of development processes, iterative refinement based on theoretical insights, and contribution to scholarly discourse through both practical innovation and conceptual advancement.
This research-creation methodology demonstrates scholarly achievement through integration of theoretical sophistication with practical educational innovation, contributing to multiple domains of inquiry while maintaining clear trajectory from philosophical foundations through empirical application to pedagogical implementation.
Systematic Educational Experimentation
Unlike conventional instructional design that aims to implement predetermined learning outcomes, the Cyber Dimensions methodology employs systematic experimentation that recognizes educational innovation as exploration of unknown possibilities (Massumi, 2002). This experimental approach embraces uncertainty by recognizing that the most significant educational innovations emerge through encounters with the unknown rather than through systematic implementation of established pedagogical principles. The methodology values process over product by focusing on learning processes as they unfold rather than measuring achievement against predetermined outcomes, allowing educational value to emerge through participation itself. This orientation supports adaptive development by enabling case studies to evolve in response to student engagement and instructor feedback, treating educational materials as living systems rather than fixed resources. Most importantly, this experimental approach generates transferable insights that apply beyond specific institutional contexts, contributing to broader understanding of posthuman educational possibilities.
Implications for Assessment and Evaluation
Posthuman Evaluation Frameworks
Traditional educational assessment operates within humanist paradigms that measure individual cognitive achievement through standardized evaluation instruments. Posthuman approaches require fundamentally different evaluation frameworks that:
Assess Assemblage Participation
Rather than measuring individual knowledge acquisition, evaluation examines how students participate in complex cybersecurity assemblages through multiple interconnected dimensions. Network engagement involves assessing how effectively students navigate complex stakeholder relationships, recognizing cybersecurity as fundamentally relational practice that emerges through collaborative participation. Technological fluency manifests as capability for working with rather than simply using cybersecurity systems, developing attunement to technological agency and responsiveness to system behavior. Ethical sensitivity requires recognition of distributed responsibility across human-technology networks, moving beyond individual moral reasoning to encompass assemblage-level ethical considerations. Finally, adaptive reasoning involves the ability to respond to emergent situations that exceed predetermined analytical frameworks, developing capacity for cybersecurity practice within conditions of uncertainty and complexity.
Relational Competence: Demonstrates understanding of how cybersecurity emerges through relationships among diverse actors
Technological Attunement: Shows sensitivity to how cybersecurity technologies shape possibilities for action and understanding
Ethical Sophistication: Recognizes complexity of moral responsibility in distributed sociotechnical systems
Adaptive Capacity: Exhibits capability for responding to novel situations that exceed predetermined analytical frameworks
Value Situated Understanding
Assessment recognizes that cybersecurity knowledge is always embedded in specific contexts rather than existing as universal principles, requiring evaluation criteria that honor this situated character. Contextual sensitivity involves understanding how cybersecurity challenges vary across different organizational and technological contexts, recognizing that security practices must be tailored to specific assemblage configurations. Perspectival awareness requires recognition that different positions within assemblages enable different forms of cybersecurity understanding, acknowledging the epistemic significance of situated perspectives. Cultural competence manifests as appreciation for how cybersecurity practices emerge through specific cultural and institutional contexts, recognizing security as culturally embedded rather than technically neutral. Historical consciousness involves understanding how cybersecurity challenges evolve through technological and social change, developing capacity for anticipating future security needs through analysis of historical trajectories.
Support Ongoing Becoming
Posthuman assessment treats evaluation as formative participation in educational assemblages rather than summative measurement of fixed knowledge, fundamentally transforming the relationship between learning and assessment. This approach enables emergent learning by creating conditions for understanding to develop through assessment participation itself, treating evaluation as educational opportunity rather than external judgment. The methodology values process documentation by recognizing learning journeys as significant as final outcomes, acknowledging that educational value emerges through sustained engagement rather than achievement of predetermined endpoints. Assessment supports peer learning by utilizing evaluation as opportunity for collaborative knowledge construction, recognizing that understanding emerges through assemblage participation rather than individual cognitive achievement. Finally, this approach facilitates reflexive practice by encouraging students to examine their own participation in learning assemblages, developing metacognitive awareness of how their engagement shapes educational outcomes.
Research implementation of these assessment approaches in cybersecurity education contexts demonstrates their practical viability. Classroom observations reveal that students engaging with complex fictional cybersecurity scenarios develop sophisticated understanding through collaborative analysis processes that exceed individual analytical capabilities, providing empirical support for assemblage-based evaluation criteria. Documentation of student learning trajectories shows that meaningful cybersecurity understanding emerges through sustained participation in educational assemblages rather than completion of discrete assessment tasks, validating process-oriented rather than product-oriented evaluation approaches.
Conclusion: Toward Posthuman Cybersecurity Education
The theoretical framework outlined in this chapter establishes systematic worldbuilding and immersive case study development as significant contributions to both cybersecurity education and posthuman pedagogical theory. By grounding educational technology design in sophisticated theoretical frameworks—posthuman inquiry heuristics, agential realism, assemblage theory, and postphenomenological methodology—the Cyber Dimensions approach transcends generic instructional design to become educational research that advances theoretical understanding while maintaining practical utility.
This theoretical sophistication distinguishes the methodology from conventional case study development in several crucial ways:
Educational Theory: Demonstrates how posthuman principles can be systematically integrated into cybersecurity education through worldbuilding and assemblage creation
Research Methodology: Establishes framework for educational technology development as theoretical inquiry that contributes to scholarly discourse
Assessment Innovation: Provides alternatives to individualistic evaluation that recognize distributed learning across human-technology networks
Professional Preparation: Develops capabilities for cybersecurity practice that recognizes human-technology co-constitution rather than human control over passive systems
The integration of these theoretical frameworks creates educational assemblages that support sophisticated learning about cybersecurity as distributed sociotechnical practice while contributing to posthuman educational research through systematic experimentation with innovative pedagogical approaches.
Research validation for these theoretical approaches emerges from empirical analysis of existing cybersecurity workforce frameworks. Systematic examination of NICE Framework Work Roles using posthuman coding schemes reveals significant evidence of human-technology entanglement already embedded within professional cybersecurity practice, though not explicitly recognized in conventional educational approaches. These findings demonstrate that posthuman theoretical frameworks align with empirical patterns in cybersecurity professional development, supporting educational innovations that acknowledge rather than obscure the co-agentic character of contemporary security work. This convergence between theoretical sophistication and empirical evidence provides robust foundation for the systematic worldbuilding and case study development methodologies presented in subsequent chapters.
Next Steps
With this theoretical foundation established, you’re ready to:
- Examine practical worldbuilding implementation that embodies these theoretical principles
- Explore assessment frameworks that recognize distributed learning outcomes
- Work through case study development while maintaining theoretical sophistication
- Design quality assurance processes grounded in posthuman evaluation criteria