NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 11 results Save | Export
Robert Chapa – ProQuest LLC, 2024
While the cybersecurity landscape continually evolves, with new technologies, attack vectors, and defense mechanisms emerging regularly, cybersecurity certificate programs remain challenged to stay current and relevant, often resulting in the delivery of outdated course content in existing programs. Scholars note that the absence of standardized…
Descriptors: Program Development, Computer Security, Electronic Learning, Certification
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Christopher A. Ramezan; Paul M. Coffy; Jared Lemons – Journal of Cybersecurity Education, Research and Practice, 2024
A trained workforce is needed to protect operational technology (OT) and industrial control systems (ICS) within national critical infrastructure and critical industries. However, what knowledge, skills, and credentials are employers looking for in OT cybersecurity professionals? To best train the next generation of OT cybersecurity professionals,…
Descriptors: Computer Security, Computer Science, Labor Force Development, Technical Occupations
Peer reviewed Peer reviewed
Direct linkDirect link
Megan Andrew; Jonah Kushner; Lucas Greer; Christine Mulhern; Jenna W. Kramer; Daniel Schwam – RAND Corporation, 2024
Many states, including Ohio, intend to strengthen and grow their computer science (CS) and information technology (IT) workforces. Jobs in CS and IT are projected to grow in coming years, but it is not always clear how states can expand and diversify their CS and IT workforces. In this report, the authors leverage representative national and state…
Descriptors: Computer Science, Information Technology, Labor Force Development, Job Development
Peer reviewed Peer reviewed
Direct linkDirect link
Megan Andrew; Christine Mulhern; Jenna W. Kramer; Jonah Kushner; Lucas Greer; Daniel Schwam – RAND Corporation, 2024
The number of jobs in computer science (CS) and information technology (IT) is projected to grow rapidly in the United States over the next decade as the demand for workers expands and current CS and IT workers retire. Against the larger backdrop of growth in CS and IT employment and wages nationally, Ohio is looking for ways to grow and diversify…
Descriptors: Computer Science, Information Technology, Labor Force Development, Job Development
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Humayun Zafar; Carole L. Hollingsworth; Tridib Bandyopadhyay; Adriane B. Randolph – Journal of Cybersecurity Education, Research and Practice, 2024
This research article examines conversations happening between cybersecurity academics and industry leaders with a goal to improve the development of cybersecurity professionals. We specifically focus on efforts in the Southeast region of the United States. The discussion features insights from a panel consisting of an academic cybersecurity…
Descriptors: Computer Security, Career Pathways, Computer Science Education, Industry
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Paul Wagner; Dalal Alharthi – Journal of Cybersecurity Education, Research and Practice, 2024
The United States faces persistent threats conducting malicious cyber campaigns that threaten critical infrastructure, companies and their intellectual property, and the privacy of its citizens. Additionally, there are millions of unfilled cybersecurity positions, and the cybersecurity skills gap continues to widen. Most companies believe that…
Descriptors: Artificial Intelligence, Computer Simulation, Information Technology, Computer Security
Mike Morris – ProQuest LLC, 2024
To meet the employment demands in the information technology industry, it is crucial for higher education institutions to design sustainable curricula to prepare students with the knowledge and skills needed to enter and stay competitive in an ever-changing workforce. A review of one Mid-Atlantic University's information technology programs…
Descriptors: Graduate Students, Information Technology, Computer Science Education, Computer Software
Colorado Department of Higher Education, 2024
Senate Bill 22-192, titled Opportunities for Credential Attainment called on the Colorado Department of Higher Education (CDHE) to work collaboratively with other state agencies, institutions of higher education (IHEs), employers and other stakeholders to build 10 stackable credential pathways across five high-value, high-demand industries between…
Descriptors: Career Pathways, Education Work Relationship, Health Services, Computer Software
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mubashrah Saddiqa; Kristian Helmer Kjær Larsen; Robert Nedergaard Nielsen; Jens Myrup Pedersen – Journal of Cybersecurity Education, Research and Practice, 2024
Cybersecurity has traditionally been perceived as a highly technical field, centered around hacking, programming, and network defense. However, this article contends that the scope of cybersecurity must transcend its technical confines to embrace a more inclusive approach. By incorporating various concepts such as privacy, data sharing, and…
Descriptors: Labor Force Development, Diversity, Educational Background, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Supanee Sengsri; Kheamparit Khunratchasana – International Education Studies, 2024
Artificial intelligence (AI) technology has made a significant impact on technological progress and has been integrated into various sectors and organizations. As a result, developing a workforce with knowledge and expertise in AI has become necessary. Skilled AI professionals will play a critical role in driving economic growth and…
Descriptors: Artificial Intelligence, Digital Literacy, Competence, Skill Development
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Oliver J. Mason; Siobhan Collman; Stella Kazamia; Ioana Boureanu – Journal of Cybersecurity Education, Research and Practice, 2024
This pilot study aims to assess the acceptability of Open University's training platform called Gamified Intelligent Cyber Aptitude and Skills Training course (GICAST), as a means of improving cybersecurity knowledge, attitudes, and behaviours in undergraduate students using both quantitative and qualitative methods. A mixed-methods, pre-post…
Descriptors: Career Readiness, Computer Science, Computer Security, Gamification