NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 6 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Christopher A. Ramezan; Paul M. Coffy; Jared Lemons – Journal of Cybersecurity Education, Research and Practice, 2024
A trained workforce is needed to protect operational technology (OT) and industrial control systems (ICS) within national critical infrastructure and critical industries. However, what knowledge, skills, and credentials are employers looking for in OT cybersecurity professionals? To best train the next generation of OT cybersecurity professionals,…
Descriptors: Computer Security, Computer Science, Labor Force Development, Technical Occupations
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Oliver J. Mason; Siobhan Collman; Stella Kazamia; Ioana Boureanu – Journal of Cybersecurity Education, Research and Practice, 2024
This pilot study aims to assess the acceptability of Open University's training platform called Gamified Intelligent Cyber Aptitude and Skills Training course (GICAST), as a means of improving cybersecurity knowledge, attitudes, and behaviours in undergraduate students using both quantitative and qualitative methods. A mixed-methods, pre-post…
Descriptors: Career Readiness, Computer Science, Computer Security, Gamification
Peer reviewed Peer reviewed
Direct linkDirect link
Welch, Vivian; Mathew, Christine; Marins, Luciana M.; Ghogomu, Elizabeth T.; Dowling, Sierra; Abdisalam, Salman; Madani, Mohamad T.; Murphy, Emma; Kebedom, Kisanet; Ogborogu, Jennifer; Gallagher-Mackay, Kelly – Campbell Systematic Reviews, 2020
The Organization for Economic Co-operation and Development (OECD) estimated that approximately 9% of current jobs within OECD member states are threatened with automation and digitalization--all significant successes and advances in artificial intelligence, robotics, and computer science. With such global changes and forecasts, in the labor…
Descriptors: Skill Development, International Organizations, Automation, Unemployment
Peer reviewed Peer reviewed
Direct linkDirect link
Yamaguchi, Ryoko; Burge, Jamika D. – Journal for Multicultural Education, 2019
Purpose: The purpose of this study is to investigate the narratives of 93 Black women in computing in the USA to identify salient themes that are at the intersection of race and gender in the field of computer science. Design/methodology/approach: The study uses a multi-method approach with a survey to describe the sample and a series of focus…
Descriptors: Blacks, African Americans, Females, Computer Science
Peer reviewed Peer reviewed
Direct linkDirect link
Fitzgerald, Brian K.; Barkanic, Steve; Cárdenas-Navia, Isabel; Chen, Janet; Elzey, Karen; Hughes, Debbie; Troyan, Danielle – Industry and Higher Education, 2016
BHEF has achieved particular success in operationalizing its National Higher Education and Workforce Initiative (HEWI) through regional initiatives in data science and analytics (DSA). Leveraging its membership of corporate CEOs, university presidents and government agency leaders, BHEF seeded new undergraduate pathways in DSA at Case Western…
Descriptors: Higher Education, Case Studies, Labor Force, Program Implementation
Malone, Thomas W.; Rockart, John F. – Scientific American, 1991
The ways in which computer networks are forging new kinds of markets and new ways to manage organizations are described. Discussed are the results of these innovations, which include changes in corporate structure and management style. (KR)
Descriptors: Administrative Organization, Computer Networks, Computer Oriented Programs, Computer Peripherals