PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Innovative doctorate programs in cybersecurity, engineering, and technology in the USA and UK that can be completed by professionals around the world without relocation

Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Konferencja
International Conference on Research in Management & Technovation (05-06.12.2020 ; Nagpur, Indie)
Języki publikacji
EN
Abstrakty
EN
Every year in the U.S., 40,000 jobs for information security analysts go unfilled, and employers are struggling to fill 200,000 other cybersecurity-related roles. Colleges and universities have created certificates, undergraduate and graduate programs to train professionals in these job roles. The challenge of meeting the cybersecurity workforce shortage through degree programs is intensified by the reality of the limited number of cybersecurity and engineering faculty at colleges and universities. This paper explores the essential need to develop more doctorate faculty in technology-related areas. It explains some unique and non-traditional paths to doctoral completion that allow professionals with significant real-world work experience to complete a doctorate without career interruption and relocation from highly respected and established universities in the U.K., USA, and Australia.
Rocznik
Tom
Strony
1--3
Opis fizyczny
Bibliogr. 31 poz.
Twórcy
  • Florida Institute of Technology
  • llinois Technical University
  • Temple University
Bibliografia
  • 1. Andre, P. (2016). A phenomenological study of frontline hiring professionals that recruit in a cybersecurity world (Order No. 10250990). Available from ProQuest Dissertations & Theses Global. (1868414289).
  • 2. Burrell, D., Nobles, C. (2018). Recommendations to Develop and Hire More Highly Qualified Women and Minority Cybersecurity Professionals. Proceedings of ICCWS 2018 13th International Conference on Cyber Warfare and Security. Academic Conferences International Limited.
  • 3. Cappelli, P. (2008). Talent management for the twenty-first century. Harvard business review, 86(3), 74.
  • 4. Cappelli, P., & Novelli, W. D. (2010). Managing the Older Worker: How to Prepare for the New Organizational Order. Harvard Business Press.
  • 5. Clancy, M. (2012). Improving faculty professional development in higher education high-tech programs: An action science research study of self-directed professional development (Order No. 3542028). Available from ProQuest Dissertations & Theses Global.
  • 6. Curricula, C. (2001). Computer Science. IEEE CS, ACM Joint Task Force on Computing Curricula.
  • 7. Delia, C. (2015). Exploring the social and organizational factors of the shortage of women in information technology: A multiple case study (Order No. 3732277). Available from ProQuest Dissertations & Theses Global. (1746623174).
  • 8. Fell, A.F., Flint, K.J., & Haines, I. (2011). Professional doctorates in the UK 2011. Lichfield, Staffordshire: UK Council for Graduate Education.
  • 9. Fenge, L.A. (2009). Professional doctorates: A better route for researching professionals? Social Work Education, 28(2), 165-176.
  • 10. Fink, D. (2006). The professional doctorate: its relativity to the PhD and relevance for the knowledge economy. International Journal of Doctoral Studies, 1, 35-44.
  • 11. Force, J. T. (2001). Computing curricula 2001: Computer science. Retrieved from https://www.acm.org/education/curric_vols/cc2001.pdf
  • 12. Fuller, C. R. (2016). Shortening the skills gap: An exploratory study of cybersecurity professional experience (Order No. 10250901). Available from ProQuest Dissertations & Theses Global. (1868417653).
  • 13. Hancock, K. L. (1991). The role and nature of the doctoral dissertation: a policy statement. Washington, DC: Council of Graduate Schools.
  • 14. Herling, L. (2011). Hispanic women overcoming deterrents to computer science: A phenomenological study (Order No. 3505844). Available from ProQuest Dissertations & Theses Global. (1013441827).
  • 15. Kauflin, J. (2017, March 16) The Fast-Growing Job with A Huge Skills Gap: Cyber Security. Forbes
  • 16. Li, J., & Daugherty, L. (2015). Training cyber warriors: What can be learned from defense language training? Santa Monica, CA: RAND National Defense Research Institute.
  • 17. McClurg, J. D. (2015). Cybersecurity in higher education: Oversight and due diligence (Order No. 10291072). Available from ProQuest Dissertations & Theses Global. (1846958719). Retrieved from https://search-proquest-com.contentproxy.phoenix.edu/docview/1846958719?accountid=35812
  • 18. Morgan, S. (2016, May 13). Top 5 industries at risk of cyber-attacks. Forbes.com. Retrieved on February 17, 2018, from https://www.forbes.com/sites/stevemorgan/2016/05/13/list-of-the-5-most-cyber-attacked-industries/#1edfc762715e
  • 19. Newman, L. (2017, July 1) The biggest cybersecurity disasters of 2017 so far. Wired.
  • 20. Palmer, R. T., Maramba, D. C., & Gasman, M. (Eds.). (2013). Fostering Success of Ethnic and Racial Minorities in STEM: The Role of Minority Serving Institutions. New York, NY: Routledge. 264 pp.
  • 21. Pierce, A. O. (2016). Exploring the cybersecurity hiring gap (Order No. 10250186). Available from ProQuest Dissertations & Theses Global. (1848667353).
  • 22. Perry, J. A., & Imig, D. G. (2008). A Stewardship of Practice in Education. Change Magazine, (November/December).
  • 23. President's Council of Advisors on Science and Technology. (2012). Report to the president: Engage to excel: Producing one million additional college graduates with degrees in science, technology, engineering, and mathematics. Retrieved from http://www.whitehouse.gov/sites/default/files/microsites/ostp/pcast-engageto-excel-final_2-25-12.pdf
  • 24. Rahim, E., Burrell, D. N., Duncan, T., & Finch, A. (2020). Best Practices and Emerging Trends for Knowledge-Based Organizations and Academic Institutions around E-Learning. International Journal of Smart Education and Urban Society (IJSEUS), 11(2), 16-27. http://dx.doi.org/10.4018/IJSEUS.2020040102
  • 25. Strayhorn, T. L. (2010). Undergraduate research participation and STEM graduate degree aspirations among students of color. New Directions for Institutional Research, 2010 (148).
  • 26. Sweem, S. L. (2009). Leveraging employee engagement through a talent management strategy: Optimizing human capital through human resources and organization development strategy in a field study (Order No. 3349408). Available from ProQuest Dissertations & Theses Global. (305162419).
  • 27. Shackelford, R., Lunt, B., McGettrick, A., Sloan, R., Topi, H., Davies, G., Lunt, B. (2006). Computing curricula 2005: The overview report. [Association for Computing Machinery] ACM [Special Interest Group on Computer Science Education] SIGCSE, 38(1), 456-457.
  • 28. Stevenson, G. V. (2017). Cybersecurity implications for industry, academia, and parents: A qualitative case study in NSF STEM education (Order No. 10624075). Available from ProQuest Dissertations & Theses Global. (1958945736).
  • 29. Tucker, A. B., Aiken, R. M., Barker, K., Bruce, K. B., & Cain, J. T. (1991). Computing curricula 1991: Report of the ACM/IEEE-CS Joint Curriculum Task Force. New York, NY: Association for Computing Machinery Press/IEEE Press.
  • 30. Van-Zadelhoff, Marc (2016, September). The Biggest Cybersecurity Threats Are Inside Your Company. Harvard Business Review.
  • 31. Wilson, M. D. (2015). A qualitative case study of the talent management process across project-oriented companies within the intellect industry (Order No. 3687744). Available from ProQuest Dissertations & Theses Global. (1669973498).
Uwagi
Opracowanie rekordu ze środków MNiSW, umowa Nr 461252 w ramach programu "Społeczna odpowiedzialność nauki" - moduł: Popularyzacja nauki i promocja sportu (2021).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-1e578c4e-4454-46b3-9e66-5c8c9f5c5b66
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.