Linked e-resources

Details

Intro
Preface
Contents
About the Editors
Challenges and Opportunities of Teaching Cybersecurity in UK University Computing Programmes
1 Introduction
2 Policy and Teaching Cybersecurity in the UK
2.1 National Cyber Security Centre (NCSC) Certification
2.1.1 The Cyber Security Body of Knowledge (CyBOK)
2.1.2 The Application Process
2.1.3 Certification Assessment Criteria
2.1.4 A Rigorous Process of Certification
2.1.5 The Merits of the Certification
2.1.6 NCSC Review and Survey
2.2 BCS Degree Accreditation

2.3 Quality Assurance Agency (QAA) Benchmark Statements
2.4 ACM Curricula
2.5 Industrial View
3 Case Studies
3.1 Northumbria University
3.1.1 The Approach
3.1.2 Applied Modules/Programme
3.1.3 Effects and Effectiveness
3.1.4 Similar Practice in Other HEIs
3.1.5 Future Actions
3.1.6 Final Notes
3.2 Sunderland University
3.2.1 The Approach
3.2.2 The Applied Modules/Programmes
3.2.3 Effects and Effectiveness
3.2.4 Similar Practice in Other HEIs
3.2.5 Future Actions
3.2.6 Final Notes
3.3 Manchester Metropolitan University
3.3.1 The Approach

3.3.2 Applied Modules/Programmes
3.3.3 Effects and Effectiveness
3.3.4 Similar Practice in Other HEIs
3.3.5 Future Actions
3.3.6 Final Notes
3.4 University of Bath
3.4.1 The Approach
3.4.2 Applied Modules/Programmes
3.4.3 Future Actions
3.4.4 Final Notes
3.5 University of Glasgow
3.5.1 The Approach
3.5.2 Applied Modules/Programmes
3.5.3 Effects and Effectiveness
3.5.4 Similar Practice in Other HEIs
3.5.5 Future Actions
3.5.6 Final Notes
3.6 University of Strathclyde
3.6.1 The Approach
3.6.2 Applied Module/Programmes

3.6.3 Effects and Effectiveness
3.6.4 Similar Practice in Other HEIs
3.6.5 Future Actions
3.7 University of Gloucestershire
3.7.1 The Approach
3.7.2 Applied Modules/Programmes
3.7.3 Effects and Effectiveness
3.7.4 Similar Practice in Other HEIs
3.7.5 Future Actions
3.7.6 Final Notes
4 Key Themes from Case Studies
4.1 Cyber Security Content Delivery
4.2 Employer Involvement in Curriculum Design
4.3 Employability
4.4 Accreditation
5 Conclusions and Recommendations
References

Using the Delphi Method to Elicit Requirements for an International Master's Program in Information SecurityManagement
1 Introduction
2 Case Background
2.1 Research and Education Environment
2.2 Project Organization
2.3 Didactic Model
3 Collecting Requirements Using the Delphi Method
3.1 Our Adapted Delphi Method
4 Illustrative Example
Social Aspects of Information Security
4.1 Program Overview
4.2 Social Aspects of Information Security
Elicited Requirements
4.3 Social Aspects of Information Security
Implementation of Requirements

Browse Subjects

Show more subjects...

Statistics

from
to
Export