Publication Date
| In 2026 | 0 |
| Since 2025 | 1 |
| Since 2022 (last 5 years) | 6 |
| Since 2017 (last 10 years) | 6 |
| Since 2007 (last 20 years) | 7 |
Descriptor
| Computer Security | 9 |
| Information Technology | 9 |
| Labor Force Development | 9 |
| Career Readiness | 3 |
| Computer Science Education | 3 |
| Higher Education | 3 |
| Information Security | 3 |
| Artificial Intelligence | 2 |
| Certification | 2 |
| Computer Science | 2 |
| Education Work Relationship | 2 |
| More ▼ | |
Author
| Paul Wagner | 2 |
| Binh Tran | 1 |
| Bogdanowicz, Marc | 1 |
| Burgelman, Jean-Claude | 1 |
| Christopher A. Ramezan | 1 |
| Cusak, Austin | 1 |
| Dalal Alharthi | 1 |
| Filipo Sharevski | 1 |
| Gourova, Elissaveta | 1 |
| Herrmann, Christoph | 1 |
| Ioana Boureanu | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 7 |
| Reports - Research | 7 |
| Information Analyses | 1 |
| Reports - Descriptive | 1 |
Education Level
| Higher Education | 5 |
| Postsecondary Education | 3 |
| High Schools | 2 |
| Secondary Education | 2 |
| Elementary Secondary Education | 1 |
Audience
| Policymakers | 2 |
| Administrators | 1 |
Location
| European Union | 1 |
| Georgia | 1 |
| United Kingdom | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Christopher A. Ramezan; Paul M. Coffy; Jared Lemons – Journal of Cybersecurity Education, Research and Practice, 2024
A trained workforce is needed to protect operational technology (OT) and industrial control systems (ICS) within national critical infrastructure and critical industries. However, what knowledge, skills, and credentials are employers looking for in OT cybersecurity professionals? To best train the next generation of OT cybersecurity professionals,…
Descriptors: Computer Security, Computer Science, Labor Force Development, Technical Occupations
Paul Wagner; Dalal Alharthi – Journal of Cybersecurity Education, Research and Practice, 2024
The United States faces persistent threats conducting malicious cyber campaigns that threaten critical infrastructure, companies and their intellectual property, and the privacy of its citizens. Additionally, there are millions of unfilled cybersecurity positions, and the cybersecurity skills gap continues to widen. Most companies believe that…
Descriptors: Artificial Intelligence, Computer Simulation, Information Technology, Computer Security
Cusak, Austin – Journal of Cybersecurity Education, Research and Practice, 2023
A qualitative case study focused on understanding what steps are needed to prepare the cybersecurity workforces of 2026-2028 to work with and against emerging technologies such as Artificial Intelligence and Machine Learning. Conducted through a workshop held in two parts at a cybersecurity education conference, findings came both from a…
Descriptors: Internet, Computer Security, Information Security, Labor Force Development
Paul Wagner; Melissa Dark; Robert Honomichl; Filipo Sharevski; Sandra Leiterman – Journal of Cybersecurity Education, Research and Practice, 2025
The increasing prevalence of cybersecurity threats and the shortage of qualified professionals necessitate innovative solutions for cybersecurity education at all levels. Despite the expansion of postsecondary cybersecurity programs, employer dissatisfaction with graduates and a lack of standardized introductory curricula highlights the need for…
Descriptors: Information Security, Computer Security, Computer Science Education, National Security
Oliver J. Mason; Siobhan Collman; Stella Kazamia; Ioana Boureanu – Journal of Cybersecurity Education, Research and Practice, 2024
This pilot study aims to assess the acceptability of Open University's training platform called Gamified Intelligent Cyber Aptitude and Skills Training course (GICAST), as a means of improving cybersecurity knowledge, attitudes, and behaviours in undergraduate students using both quantitative and qualitative methods. A mixed-methods, pre-post…
Descriptors: Career Readiness, Computer Science, Computer Security, Gamification
Binh Tran; Karen C. Benson; Lorraine Jonassen – Journal of Cybersecurity Education, Research and Practice, 2023
One only needs to listen to the news reports to recognize that the gap between securing the enterprise and cybersecurity threats, breaches, and vulnerabilities appears to be widening at an alarming rate. An untapped resource to combat these attacks lies in the students of the secondary educational system. Necessary in the cybersecurity education…
Descriptors: Certification, College Curriculum, Information Security, Computer Security
McQuade, Samuel C., III – Chronicle of Higher Education, 2007
A growing body of empirical research strongly suggests that adolescents and young adults are increasingly becoming both victims and perpetrators of crime and abuse enabled by information technology. The US federal government has stressed technological, legislative, and law-enforcement solutions to these problems. Efforts to protect children have…
Descriptors: Higher Education, Young Adults, Information Technology, Federal Government
National Association of State Universities and Land-Grant Colleges, 2004
This document represents the higher education and library community's guiding public policy agenda on information technology (IT) for the current year. The Higher Education Information Technology (HEIT) Alliance is a coalition of 11 national higher education and library associations, whose members represent a broad array of stakeholders on college…
Descriptors: Telecommunications, Library Associations, Information Technology, Intellectual Property
Gourova, Elissaveta; Burgelman, Jean-Claude; Bogdanowicz, Marc; Herrmann, Christoph – 2002
Trends in the development and utilization of information and communication technologies (ICT) in the 13 candidate countries for admission into the European Union(the CC13) were examined by a 12-member panel of experts and its staff. The analysis focused on the following topics: (1) the communication infrastructure available in the CC13; (2) issues…
Descriptors: Access to Computers, Communications, Computer Security, Economic Change

Peer reviewed
Direct link
