Publication Date
In 2025 | 0 |
Since 2024 | 6 |
Since 2021 (last 5 years) | 14 |
Since 2016 (last 10 years) | 21 |
Since 2006 (last 20 years) | 25 |
Descriptor
Source
Author
Abdisalam, Salman | 1 |
Adriane B. Randolph | 1 |
Anne M. Brown | 1 |
Ashrafi, Noushin | 1 |
B. Bagby | 1 |
Babb, Jeffry S. | 1 |
Bajracharya, Biju | 1 |
Barkanic, Steve | 1 |
Binh Tran | 1 |
Birney, Lauren | 1 |
Burge, Jamika D. | 1 |
More ▼ |
Publication Type
Journal Articles | 26 |
Reports - Research | 15 |
Reports - Descriptive | 5 |
Reports - Evaluative | 3 |
Information Analyses | 2 |
Opinion Papers | 1 |
Education Level
Higher Education | 13 |
Postsecondary Education | 13 |
High Schools | 3 |
Secondary Education | 3 |
Two Year Colleges | 3 |
Adult Education | 1 |
Grade 11 | 1 |
Grade 12 | 1 |
Audience
Location
California | 1 |
Canada | 1 |
Denmark | 1 |
Florida (Miami) | 1 |
Georgia | 1 |
Indiana | 1 |
Iowa | 1 |
New York (New York) | 1 |
North Carolina | 1 |
Ohio | 1 |
Texas | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Samson O. Adeoye; Heather Lindberg; B. Bagby; Anne M. Brown; Feras A. Batarseh; Eric K. Kaufman – NACTA Journal, 2023
Cyberbiosecurity is an emerging field at the convergence of life sciences and the digital world. As technological advances improve operational processes and expose them to vulnerabilities in agriculture and life sciences, cyberbiosecurity has become increasingly important for addressing contemporary concerns. Unfortunately, at this time,…
Descriptors: Computer Security, Biology, Biological Sciences, Labor Force Development
Christopher A. Ramezan; Paul M. Coffy; Jared Lemons – Journal of Cybersecurity Education, Research and Practice, 2024
A trained workforce is needed to protect operational technology (OT) and industrial control systems (ICS) within national critical infrastructure and critical industries. However, what knowledge, skills, and credentials are employers looking for in OT cybersecurity professionals? To best train the next generation of OT cybersecurity professionals,…
Descriptors: Computer Security, Computer Science, Labor Force Development, Technical Occupations
Humayun Zafar; Carole L. Hollingsworth; Tridib Bandyopadhyay; Adriane B. Randolph – Journal of Cybersecurity Education, Research and Practice, 2024
This research article examines conversations happening between cybersecurity academics and industry leaders with a goal to improve the development of cybersecurity professionals. We specifically focus on efforts in the Southeast region of the United States. The discussion features insights from a panel consisting of an academic cybersecurity…
Descriptors: Computer Security, Career Pathways, Computer Science Education, Industry
Guth, Douglas J. – Community College Journal, 2022
Digital technologies are an integral facet of human existence, changing how humans find information, the way humans communicate and even human behavior. This transition applies to education as well, with the continued growth of artificial intelligence (AI) reshaping the higher education landscape at two- and four-year institutions alike. AI is…
Descriptors: Community Colleges, Artificial Intelligence, Computer Science Education, Labor Force Development
Karjalainen, Mika; Ojala, Anna-Liisa; Vatanen, Marko; Lötjönen, Jarno – International Journal of Adult Education and Technology, 2022
This qualitative study includes nine semi-structured interviews with cybersecurity experts from different security-related organizations who are familiar with cybersecurity exercises. Its contribution to cybersecurity workforce development focuses on organizational learning rather than individual skills development and relevant competencies. It…
Descriptors: Computer Security, Computer Science Education, Organizational Learning, Skill Development
Paul Wagner; Dalal Alharthi – Journal of Cybersecurity Education, Research and Practice, 2024
The United States faces persistent threats conducting malicious cyber campaigns that threaten critical infrastructure, companies and their intellectual property, and the privacy of its citizens. Additionally, there are millions of unfilled cybersecurity positions, and the cybersecurity skills gap continues to widen. Most companies believe that…
Descriptors: Artificial Intelligence, Computer Simulation, Information Technology, Computer Security
Mubashrah Saddiqa; Kristian Helmer Kjær Larsen; Robert Nedergaard Nielsen; Jens Myrup Pedersen – Journal of Cybersecurity Education, Research and Practice, 2024
Cybersecurity has traditionally been perceived as a highly technical field, centered around hacking, programming, and network defense. However, this article contends that the scope of cybersecurity must transcend its technical confines to embrace a more inclusive approach. By incorporating various concepts such as privacy, data sharing, and…
Descriptors: Labor Force Development, Diversity, Educational Background, Information Security
Liu, Feihong; Tu, Manghui – Journal of Education and Learning (EduLearn), 2020
An educated workforce is essential to government and industry, hence the need to provide a high-quality workforce has been crucial in higher education academic program development. In the cybersecurity field, the situation is not quite satisfactory, the reason comes down to the fact that this new industry is lacking a portable and measurable…
Descriptors: Labor Force Development, Computer Security, College Programs, Computer Science Education
Supanee Sengsri; Kheamparit Khunratchasana – International Education Studies, 2024
Artificial intelligence (AI) technology has made a significant impact on technological progress and has been integrated into various sectors and organizations. As a result, developing a workforce with knowledge and expertise in AI has become necessary. Skilled AI professionals will play a critical role in driving economic growth and…
Descriptors: Artificial Intelligence, Digital Literacy, Competence, Skill Development
Stoker, Geoff; Clark, Ulku; Vanajakumari, Manoj; Wetherill, William – Information Systems Education Journal, 2021
The United States, along with the rest of the developed world, is experiencing a shortage of cybersecurity talent in the workforce ((ISC)[superscript 2], 2019). Among the strategies being encouraged and used to close this workforce gap are work-based learning programs like cybersecurity apprenticeships. Well-designed apprenticeships can provide a…
Descriptors: Information Security, Computer Science Education, Workplace Learning, Apprenticeships
Bajracharya, Biju; Khan, Mohammad Shoeb – Information Systems Education Journal, 2023
The Autonomous Vehicles (AV) are a self-driving vehicle capable of sensing its environment and operating with minimal or no human intervention converting into a fully or partially automated vehicle. These automated vehicles have great potential to revolutionize the automotive industry and our daily lives. Thus, they are receiving a lot of…
Descriptors: Motor Vehicles, Interdisciplinary Approach, Computer Science Education, Artificial Intelligence
Oliver J. Mason; Siobhan Collman; Stella Kazamia; Ioana Boureanu – Journal of Cybersecurity Education, Research and Practice, 2024
This pilot study aims to assess the acceptability of Open University's training platform called Gamified Intelligent Cyber Aptitude and Skills Training course (GICAST), as a means of improving cybersecurity knowledge, attitudes, and behaviours in undergraduate students using both quantitative and qualitative methods. A mixed-methods, pre-post…
Descriptors: Career Readiness, Computer Science, Computer Security, Gamification
Hughes, Ciaran; Finke, Doug; German, Dan-Adrian; Merzbacher, Celia; Vora, Patrick M.; Lewandowski, H. J. – IEEE Transactions on Education, 2022
Background: Quantum information science and technology (QIST) has progressed significantly in the last decade, such that it is no longer solely in the domain of research labs, but is now beginning to be developed for, and applied in, industrial applications and products. With the emergence of this new quantum industry, a new workforce trained in…
Descriptors: Needs Assessment, Educational Policy, Quantum Mechanics, Information Science
Binh Tran; Karen C. Benson; Lorraine Jonassen – Journal of Cybersecurity Education, Research and Practice, 2023
One only needs to listen to the news reports to recognize that the gap between securing the enterprise and cybersecurity threats, breaches, and vulnerabilities appears to be widening at an alarming rate. An untapped resource to combat these attacks lies in the students of the secondary educational system. Necessary in the cybersecurity education…
Descriptors: Certification, College Curriculum, Information Security, Computer Security
Waguespack, Leslie J.; Babb, Jeffry S. – Information Systems Education Journal, 2019
Amidst academic societies and agencies that accredit computing education there is a growing enthusiasm to reexamine the efficacy of the traditional model of curricular description that focused on areas of knowledge. The knowledge model informed the architecture and design of programs of teaching and learning in post-secondary, degree-granting…
Descriptors: Competence, Computer Science Education, Curriculum, Labor Force Development
Previous Page | Next Page »
Pages: 1 | 2