Logo FedCSIS

Annals of Computer Science and Information Systems, Volume 24

Proceedings of the 2020 International Conference on Research in Management & Technovation

Logo PTI

Innovative doctorate programs in cybersecurity, engineering, and technology in the USA and UK that can be completed by professionals around the world without relocation

, ,

DOI: http://dx.doi.org/10.15439/2020KM34

Citation: Proceedings of the 2020 International Conference on Research in Management & Technovation, Shivani Agarwal, Darrell Norman Burrell, Vijender Kumar Solanki (eds). ACSIS, Vol. 24, pages 13 ()

Full text

Abstract. Every year in the U.S., 40,000 jobs for information security analysts go unfilled, and employers are struggling to fill 200,000 other cybersecurity-related roles. Colleges and universities have created certificates, undergraduate and graduate programs to train professionals in these job roles. The challenge of meeting the cybersecurity workforce shortage through degree programs is intensified by the reality of the limited number of cybersecurity and engineering faculty at colleges and universities. This paper explores the essential need to develop more doctorate faculty in technology-related areas. It explains some unique and non-traditional paths to doctoral completion that allow professionals with significant real-world work experience to complete a doctorate without career interruption and relocation from highly respected and established universities in the U.K., USA, and Australia

References

  1. Andre, P. (2016). A phenomenological study of frontline hiring professionals that recruit in a cybersecurity world (Order No. 10250990). Available from ProQuest Dissertations & Theses Global. (1868414289).
  2. Burrell, D., Nobles, C. (2018). Recommendations to Develop and Hire More Highly Qualified Women and Minority Cybersecurity Professionals. Proceedings of ICCWS 2018 13th International Conference on Cyber Warfare and Security. Academic Conferences International Limited.
  3. Cappelli, P. (2008). Talent management for the twenty-first century. Harvard business review, 86(3), 74.
  4. Cappelli, P., & Novelli, W. D. (2010). Managing the Older Worker: How to Prepare for the New Organizational Order. Harvard Business Press.
  5. Clancy, M. (2012). Improving faculty professional development in higher education high-tech programs: An action science research study of self-directed professional development (Order No. 3542028). Available from ProQuest Dissertations & Theses Global.
  6. Curricula, C. (2001). Computer Science. IEEE CS, ACM Joint Task Force on Computing Curricula.
  7. Delia, C. (2015). Exploring the social and organizational factors of the shortage of women in information technology: A multiple case study (Order No. 3732277). Available from ProQuest Dissertations & Theses Global. (1746623174).
  8. Fell, A.F., Flint, K.J., & Haines, I. (2011). Professional doctorates in the UK 2011. Lichfield, Staffordshire: UK Council for Graduate Education.
  9. Fenge, L.A. (2009). Professional doctorates: A better route for researching professionals? Social Work Education, 28(2), 165-176.
  10. Fink, D. (2006). The professional doctorate: its relativity to the PhD and relevance for the knowledge economy. International Journal of Doctoral Studies, 1, 35-44.
  11. Force, J. T. (2001). Computing curricula 2001: Computer science. Retrieved from https://www.acm.org/education/curric_vols/cc2001.pdf
  12. Fuller, C. R. (2016). Shortening the skills gap: An exploratory study of cybersecurity professional experience (Order No. 10250901). Available from ProQuest Dissertations & Theses Global. (1868417653).
  13. Hancock, K. L. (1991). The role and nature of the doctoral dissertation: a policy statement. Washington, DC: Council of Graduate Schools.
  14. Herling, L. (2011). Hispanic women overcoming deterrents to computer science: A phenomenological study (Order No. 3505844). Available from ProQuest Dissertations & Theses Global. (1013441827).
  15. Kauflin, J. (2017, March 16) The Fast-Growing Job with A Huge Skills Gap: Cyber Security. Forbes
  16. Li, J., & Daugherty, L. (2015). Training cyber warriors: What can be learned from defense language training? Santa Monica, CA: RAND National Defense Research Institute.
  17. McClurg, J. D. (2015). Cybersecurity in higher education: Oversight and due diligence (Order No. 10291072). Available from ProQuest Dissertations & Theses Global. (1846958719). Retrieved from https://search-proquest-com.contentproxy.phoenix.edu/docview/1846958719?accountid=35812
  18. Morgan, S. (2016, May 13). Top 5 industries at risk of cyber-attacks. Forbes.com. Retrieved on February 17, 2018, from https://www.forbes.com/sites/stevemorgan/2016/05/13/list-of-the-5-most-cyber-attacked-industries/#1edfc762715e
  19. Newman, L. (2017, July 1) The biggest cybersecurity disasters of 2017 so far. Wired.
  20. Palmer, R. T., Maramba, D. C., & Gasman, M. (Eds.). (2013). Fostering Success of Ethnic and Racial Minorities in STEM: The Role of Minority Serving Institutions. New York, NY: Routledge. 264 pp.
  21. Pierce, A. O. (2016). Exploring the cybersecurity hiring gap (Order No. 10250186). Available from ProQuest Dissertations & Theses Global. (1848667353).
  22. Perry, J. A., & Imig, D. G. (2008). A Stewardship of Practice in Education. Change Magazine, (November/December).
  23. President's Council of Advisors on Science and Technology. (2012). Report to the president: Engage to excel: Producing one million additional college graduates with degrees in science, technology, engineering, and mathematics. Retrieved from http://www.whitehouse.gov/sites/default/files/microsites/ostp/pcast-engageto-excel-final_2-25-12.pdf
  24. Rahim, E., Burrell, D. N., Duncan, T., & Finch, A. (2020). Best Practices and Emerging Trends for Knowledge-Based Organizations and Academic Institutions around E-Learning. International Journal of Smart Education and Urban Society (IJSEUS), 11(2), 16-27. http://dx.doi.org/10.4018/IJSEUS.2020040102
  25. Strayhorn, T. L. (2010). Undergraduate research participation and STEM graduate degree aspirations among students of color. New Directions for Institutional Research, 2010 (148).
  26. Sweem, S. L. (2009). Leveraging employee engagement through a talent management strategy: Optimizing human capital through human resources and organization development strategy in a field study (Order No. 3349408). Available from ProQuest Dissertations & Theses Global. (305162419).
  27. Shackelford, R., Lunt, B., McGettrick, A., Sloan, R., Topi, H., Davies, G., Lunt, B. (2006). Computing curricula 2005: The overview report. [Association for Computing Machinery] ACM [Special Interest Group on Computer Science Education] SIGCSE, 38(1), 456-457.
  28. Stevenson, G. V. (2017). Cybersecurity implications for industry, academia, and parents: A qualitative case study in NSF STEM education (Order No. 10624075). Available from ProQuest Dissertations & Theses Global. (1958945736).
  29. Tucker, A. B., Aiken, R. M., Barker, K., Bruce, K. B., & Cain, J. T. (1991). Computing curricula 1991: Report of the ACM/IEEE-CS Joint Curriculum Task Force. New York, NY: Association for Computing Machinery Press/IEEE Press.
  30. Van-Zadelhoff, Marc (2016, September). The Biggest Cybersecurity Threats Are Inside Your Company. Harvard Business Review.
  31. Wilson, M. D. (2015). A qualitative case study of the talent management process across project-oriented companies within the intellect industry (Order No. 3687744). Available from ProQuest Dissertations & Theses Global. (1669973498).