NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 21 results Save | Export
Robert Chapa – ProQuest LLC, 2024
While the cybersecurity landscape continually evolves, with new technologies, attack vectors, and defense mechanisms emerging regularly, cybersecurity certificate programs remain challenged to stay current and relevant, often resulting in the delivery of outdated course content in existing programs. Scholars note that the absence of standardized…
Descriptors: Program Development, Computer Security, Electronic Learning, Certification
Peer reviewed Peer reviewed
Direct linkDirect link
Muhammad Al-Abdullah; Alper Yayla; Mohammed Salem Al-Atoum – Journal of Information Systems Education, 2024
In today's cybersecurity landscape, organizations need frameworks that provide a holistic approach to risk assessment as part of the risk management process. This case introduces SecureEnd Solutions, a rapidly growing cybersecurity company, and its core team, including Alan Touring, Ada Lovecode, Bob Jobs, and Suzan, the head of development. The…
Descriptors: Risk Assessment, Risk Management, Computer Security, Holistic Approach
Peer reviewed Peer reviewed
Direct linkDirect link
Ramezan, Christopher A. – Journal of Information Systems Education, 2023
While demand for cybersecurity professionals is high, the field is currently facing a workforce shortage and a skills gap. Thus, an examination of current cybersecurity position hiring requirements may be advantageous for helping to close the skills gap. This work examines the education, professional experience, industry certification, security…
Descriptors: Computer Security, Information Technology, Job Skills, Digital Literacy
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Humayun Zafar; Carole L. Hollingsworth; Tridib Bandyopadhyay; Adriane B. Randolph – Journal of Cybersecurity Education, Research and Practice, 2024
This research article examines conversations happening between cybersecurity academics and industry leaders with a goal to improve the development of cybersecurity professionals. We specifically focus on efforts in the Southeast region of the United States. The discussion features insights from a panel consisting of an academic cybersecurity…
Descriptors: Computer Security, Career Pathways, Computer Science Education, Industry
Peer reviewed Peer reviewed
Direct linkDirect link
Felichism Kabo; Annaliese Paulson; Doreen Bradley; Ken Varnum; Stephanie Teasley – College & Research Libraries, 2024
Seeking to better understand the longitudinal association between online usage of library-licensed content and short- and long-term student performance, we linked EZproxy logs to institutional university data to study how library usage impacts semester and cumulative GPAs. Panel linear mixed effects regression models indicate online library usage…
Descriptors: Undergraduate Students, Academic Achievement, Contracts, Bibliographic Databases
Victor Ramon Arenas – ProQuest LLC, 2021
Cybersecurity faculty do not have the time to respond to the rapid and pervasive cybersecurity academic landscape. For faculty to respond to this challenge, they are expected to continuously adapt to remain competitive. The purpose of this descriptive phenomenological study was to explore the cybersecurity faculty's perceptions of their need to…
Descriptors: Course Content, Computer Security, Professional Education, Industry
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Binh Tran; Karen C. Benson; Lorraine Jonassen – Journal of Cybersecurity Education, Research and Practice, 2023
One only needs to listen to the news reports to recognize that the gap between securing the enterprise and cybersecurity threats, breaches, and vulnerabilities appears to be widening at an alarming rate. An untapped resource to combat these attacks lies in the students of the secondary educational system. Necessary in the cybersecurity education…
Descriptors: Certification, College Curriculum, Information Security, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Cummings, Jeff; Janicki, Thomas; Matthews, Kevin – Journal of Information Systems Education, 2023
Faculty in the information systems (IS) and information technology (IT) fields are faced with the challenge to keep their curriculum relevant and current. What was taught two years ago will often be outdated and faculty must constantly update their curriculum on which courses should be taught as well as what should be taught within a particular…
Descriptors: Computer Science Education, Information Technology, Information Systems, Job Skills
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Marquardson, Jim; Elnoshokaty, Ahmed – Information Systems Education Journal, 2020
People starting cybersecurity careers have three main avenues for achieving entry-level job qualifications: learning in-demand skills, earning industry certifications, and graduating with a college degree. Though people can pursue skills, certificates, and degrees together, financial and time constraints often make people focus their efforts to…
Descriptors: Information Security, Computer Security, Employment Opportunities, Employment Qualifications
Hodge, Timothy D. – ProQuest LLC, 2018
The Department of Defense (DoD), like most very large organizations rightly have concerns over the functionality of their Cybersecurity employees and their ability to perform core duties in a professional manner. To validate this ability, the DoD imposed a mandatory certifications policy based upon positions within the organization. The DoD…
Descriptors: Public Agencies, Government Employees, Computer Security, Outcomes of Education
Bates, Justin D. – ProQuest LLC, 2017
The goal of this research was to discover a list of changes that can be applied to IT security certifications to enhance the day-to-day capabilities of IT security professionals. Background: IT security professionals are often required to obtain certifications that do not adequately prepare them for the full scope of work that will be necessary…
Descriptors: Information Technology, Information Security, Professional Personnel, Certification
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Yates, David J.; Frydenberg, Mark; Waguespack, Leslie J.; McDermott, Isabelle; OConnell, Jake; Chen, Frankie; Babb, Jeffry S. – Information Systems Education Journal, 2019
The importance of updating, expanding and improving what is taught in cybersecurity curricula is increasing as the security threat landscape becomes more dangerous, breaches become more frequent, and the number of deployed Internet of Things (IoT) devices, known for their security challenges, grows exponentially. This paper argues that a profile…
Descriptors: Information Security, Computer Security, Curriculum Design, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Cummings, Jeff; Janicki, Thomas – Journal of Information Systems Education, 2021
In the fields of information technology and information systems, faculty must consistently adjust the curriculum to meet the demands of the field. However, a challenge they often face is understanding what should be covered, especially given the limited number of courses most universities are able to offer. This research is a biennial report of…
Descriptors: Computer Science Education, Information Technology, Information Systems, Job Skills
Nilsen, Richard K. – ProQuest LLC, 2017
Organizational information system users (OISU) that are victimized by cyber threats are contributing to major financial and information losses for individuals, businesses, and governments. Moreover, it has been argued that cybersecurity competency is critical for advancing economic prosperity and maintaining national security. The fact remains…
Descriptors: Computer Security, Information Security, Knowledge Level, Competence
Peer reviewed Peer reviewed
Direct linkDirect link
Knapp, Kenneth J.; Maurer, Christopher; Plachkinova, Miloslava – Journal of Information Systems Education, 2017
Much has been published about developing a cybersecurity curriculum for institutes of higher learning (IHL). Now that a growing number of IHLs globally offer such programs, a need exists on how to guide, maintain, and improve the relevancy of existing curricula. Just as cybersecurity professionals must be hone their skills continually to keep with…
Descriptors: Information Security, Computer Security, Computer Science Education, Certification
Previous Page | Next Page ยป
Pages: 1  |  2