Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 2 |
Descriptor
Computer Security | 2 |
Training | 2 |
Barriers | 1 |
Case Studies | 1 |
College Faculty | 1 |
College Students | 1 |
Community Colleges | 1 |
Computer Science Education | 1 |
Costs | 1 |
Disproportionate… | 1 |
Diversity (Institutional) | 1 |
More ▼ |
Author
Cherrise Ficke | 1 |
Isabella Piasecki | 1 |
Maria Chaparro Osman | 1 |
Maureen Namukasa | 1 |
Meredith Carroll | 1 |
Stark, Adam | 1 |
T. J. O'Connor | 1 |
Publication Type
Dissertations/Theses -… | 1 |
Journal Articles | 1 |
Reports - Research | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 1 |
Audience
Location
Florida | 2 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Maria Chaparro Osman; Maureen Namukasa; Cherrise Ficke; Isabella Piasecki; T. J. O'Connor; Meredith Carroll – Journal of Cybersecurity Education, Research and Practice, 2023
A robust cybersecurity workforce is critical for protection against a range of malicious attacks. However, it has been noted that there are many vacancies and a shortage of individuals entering the cybersecurity workforce. This workforce shortage has partly been attributed to the lack of diversity in the cybersecurity field, with women, African…
Descriptors: Diversity (Institutional), Labor Force, Computer Security, Disproportionate Representation
Stark, Adam – ProQuest LLC, 2017
This case study research explored the cybersecurity systems and training and education of IT professionals at a member college of the Florida College System. Thematic analysis was utilized to analyze interview transcripts of 6 respondents. A more descriptive analysis was completed using the survey responses from 15 respondents. From this analysis…
Descriptors: Case Studies, Information Security, Computer Security, Information Technology