Cybersecurity Study Programs: What's in a Name?

被引:0
作者
Vykopal, Jan [1 ]
Svabensky, Valdemar [2 ]
Lopez, Michael Tuscano, II [3 ]
Celeda, Pavel [1 ]
机构
[1] Masaryk Univ, Fac Informat, Brno, Czech Republic
[2] Kyushu Univ, Fac Informat Sci & Elect Engn, Fukuoka, Japan
[3] Ateneo Manila Univ, Dept Informat Syst & Comp Sci, Quezon City, Philippines
来源
PROCEEDINGS OF THE 56TH ACM TECHNICAL SYMPOSIUM ON COMPUTER SCIENCE EDUCATION, SIGCSE TS 2025, VOL 2 | 2025年
关键词
cyber security; curricular guidelines; CSEC2017; CC2020; higher education; university programs; global perspective;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Improving cybersecurity education has become a priority for many countries and organizations worldwide. Computing societies and professional associations have recognized cybersecurity as a distinctive computing discipline and created specialized cybersecurity curricular guidelines. Higher education institutions are introducing new cybersecurity programs, attracting students to this expanding field. In this paper, we examined 101 study programs across 24 countries. Based on their analysis, we argue that top-ranked universities have not yet fully implemented the guidelines and offer programs that have "cyber" in their name but lack some essential elements of a cybersecurity program. In particular, most programs do not sufficiently cover non-technical components, such as law, policies, or risk management. Also, most programs teach knowledge and skills but do not expose students to experiential learning outside the traditional classroom (such as internships) to develop their competencies. As a result, graduates of these programs may not meet employer expectations and may require additional training. To help program directors and educators improve their programs and courses, this paper offers examples of effective practices from cybersecurity programs around the world and our teaching practice.
引用
收藏
页码:1169 / 1175
页数:7
相关论文
共 43 条
[1]   The role of national cybersecurity strategies on the improvement of cyb ersecurity e ducation [J].
AlDaajeh, Saleh ;
Saleous, Heba ;
Alrabaee, Saed ;
Barka, Ezedin ;
Breitinger, Frank ;
Choo, Kim-Kwang Raymond .
COMPUTERS & SECURITY, 2022, 119
[2]  
[Anonymous], 1968, COMMUN ACM, V11, P151
[3]  
[Anonymous], [Online]. Available at https://www.nesta.org.uk/report/the-challenge-of-co-production/. (Accessed 10 February 2020)
[4]  
[Anonymous], 2023, Times Higher Education
[5]  
[Anonymous], 2020, Global Cybersecurity Index
[6]  
[Anonymous], Information and services - The Official Portal of the UAE Government. (n.d.) [online]. [Accessed 23 November 2021]. Available at: https://u.ae/en/information-and-services/#/
[7]  
[Anonymous], [13] Khronos Group, . URL https://www.khronos.org/opencl/. last accessed: February 27 2024.
[8]   A Case Study of a Cybersecurity Programme Curriculum Design, Resource Management, and Reflections [J].
Asghar, Muhammad Rizwan ;
Luxton-Reilly, Andrew .
SIGCSE 2020: PROCEEDINGS OF THE 51ST ACM TECHNICAL SYMPOSIUM ON COMPUTER SCIENCE EDUCATION, 2020, :16-22
[9]  
Beuran Razvan, 2023, Capability Assessment Methodology and Comparative Analysis of Cybersecurity Training Platforms, V128
[10]   Creating a Multifarious Cyber Science Major [J].
Blaine, Raymond W. ;
Blair, Jean R. S. ;
Chewar, Christa M. ;
Harrison, Rob ;
Raftery, James J., Jr. ;
Sobiesk, Edward .
PROCEEDINGS OF THE 52ND ACM TECHNICAL SYMPOSIUM ON COMPUTER SCIENCE EDUCATION, SIGCSE 2021, 2021, :1205-1211