Publication Date
In 2025 | 0 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 6 |
Since 2016 (last 10 years) | 8 |
Since 2006 (last 20 years) | 9 |
Descriptor
Source
Information Systems Education… | 2 |
Journal of Information… | 2 |
ProQuest LLC | 2 |
College & Research Libraries | 1 |
Journal of Cybersecurity… | 1 |
Journal of Information… | 1 |
Author
Cummings, Jeff | 2 |
Janicki, Thomas | 2 |
Annaliese Paulson | 1 |
Babb, Jeffry S. | 1 |
Binh Tran | 1 |
Chen, Frankie | 1 |
Doreen Bradley | 1 |
Elnoshokaty, Ahmed | 1 |
Felichism Kabo | 1 |
Frydenberg, Mark | 1 |
Karen C. Benson | 1 |
More ▼ |
Publication Type
Journal Articles | 7 |
Reports - Research | 5 |
Dissertations/Theses -… | 2 |
Information Analyses | 1 |
Reports - Descriptive | 1 |
Education Level
Postsecondary Education | 9 |
Higher Education | 7 |
High Schools | 1 |
Secondary Education | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Robert Chapa – ProQuest LLC, 2024
While the cybersecurity landscape continually evolves, with new technologies, attack vectors, and defense mechanisms emerging regularly, cybersecurity certificate programs remain challenged to stay current and relevant, often resulting in the delivery of outdated course content in existing programs. Scholars note that the absence of standardized…
Descriptors: Program Development, Computer Security, Electronic Learning, Certification
Felichism Kabo; Annaliese Paulson; Doreen Bradley; Ken Varnum; Stephanie Teasley – College & Research Libraries, 2024
Seeking to better understand the longitudinal association between online usage of library-licensed content and short- and long-term student performance, we linked EZproxy logs to institutional university data to study how library usage impacts semester and cumulative GPAs. Panel linear mixed effects regression models indicate online library usage…
Descriptors: Undergraduate Students, Academic Achievement, Contracts, Bibliographic Databases
Professional Industry Certifications as the Guiding Factor for Cybersecurity Course Content Delivery
Victor Ramon Arenas – ProQuest LLC, 2021
Cybersecurity faculty do not have the time to respond to the rapid and pervasive cybersecurity academic landscape. For faculty to respond to this challenge, they are expected to continuously adapt to remain competitive. The purpose of this descriptive phenomenological study was to explore the cybersecurity faculty's perceptions of their need to…
Descriptors: Course Content, Computer Security, Professional Education, Industry
Binh Tran; Karen C. Benson; Lorraine Jonassen – Journal of Cybersecurity Education, Research and Practice, 2023
One only needs to listen to the news reports to recognize that the gap between securing the enterprise and cybersecurity threats, breaches, and vulnerabilities appears to be widening at an alarming rate. An untapped resource to combat these attacks lies in the students of the secondary educational system. Necessary in the cybersecurity education…
Descriptors: Certification, College Curriculum, Information Security, Computer Security
Cummings, Jeff; Janicki, Thomas; Matthews, Kevin – Journal of Information Systems Education, 2023
Faculty in the information systems (IS) and information technology (IT) fields are faced with the challenge to keep their curriculum relevant and current. What was taught two years ago will often be outdated and faculty must constantly update their curriculum on which courses should be taught as well as what should be taught within a particular…
Descriptors: Computer Science Education, Information Technology, Information Systems, Job Skills
Marquardson, Jim; Elnoshokaty, Ahmed – Information Systems Education Journal, 2020
People starting cybersecurity careers have three main avenues for achieving entry-level job qualifications: learning in-demand skills, earning industry certifications, and graduating with a college degree. Though people can pursue skills, certificates, and degrees together, financial and time constraints often make people focus their efforts to…
Descriptors: Information Security, Computer Security, Employment Opportunities, Employment Qualifications
Dotting i's and Crossing T's: Integrating Breadth and Depth in an Undergraduate Cybersecurity Course
Yates, David J.; Frydenberg, Mark; Waguespack, Leslie J.; McDermott, Isabelle; OConnell, Jake; Chen, Frankie; Babb, Jeffry S. – Information Systems Education Journal, 2019
The importance of updating, expanding and improving what is taught in cybersecurity curricula is increasing as the security threat landscape becomes more dangerous, breaches become more frequent, and the number of deployed Internet of Things (IoT) devices, known for their security challenges, grows exponentially. This paper argues that a profile…
Descriptors: Information Security, Computer Security, Curriculum Design, Internet
Cummings, Jeff; Janicki, Thomas – Journal of Information Systems Education, 2021
In the fields of information technology and information systems, faculty must consistently adjust the curriculum to meet the demands of the field. However, a challenge they often face is understanding what should be covered, especially given the limited number of courses most universities are able to offer. This research is a biennial report of…
Descriptors: Computer Science Education, Information Technology, Information Systems, Job Skills
Li, Chengcheng – Journal of Information Technology Education: Innovations in Practice, 2015
As both the frequency and the severity of network breaches have increased in recent years, it is essential that cybersecurity is incorporated into the core of business operations. Evidence from the U.S. Bureau of Labor Statistics (Bureau of Labor Statistics, 2012) indicates that there is, and will continue to be, a severe shortage of cybersecurity…
Descriptors: Curriculum Development, Computer Security, Internet, Computer Networks