Abstract Introduction What Does Industry Need?

Size: px
Start display at page:

Download "Abstract Introduction What Does Industry Need?"

Transcription

1 Connecting Information Systems and Cybersecurity Education with the Demands for Cybersecurity Experts in Modern Firms Jason G. Caudill, PhD Associate Professor of Business King University Abstract: The rapidly changing cybersecurity environment in which today s businesses operate is demanding additional resources in the field of information systems generally and specifically in the preparation of cybersecurity professionals. This paper examines the shifting demands of information systems professionals, the needs of industry, and the structure of information systems program delivery in higher education. The goal is to begin a discussion of how to best develop information systems academic programs to provide qualified, effective information systems professionals to today s businesses. Introduction The past year has, very publicly, exposed the risks that are faced by commercial enterprises and their customers from the growing threats of cybercrime. Data breaches at major American retailers have become unnervingly familiar, with up to 70 million customers impacted by the Target Corporation data breach discovered in December of 2013 (Target Corporate) and 56 million customer payment cards potentially compromised by the Home Depot breach that was discovered in September of 2014 (Home Depot, 2014). Other recent breaches include Neiman Marcus Group, Supervalu grocery stores, and P.F. Chang s China Bistro (Sidel, 2014). Sidel (2014) also cites Javelin Strategy & Research s 2014 fraud report indicating that there was a 45% rise in customer fraud losses in 2013, totaling $16 billion. With fraud losses mounting, and attacks increasing, there clearly needs to be some action taken. This is necessary for a variety of reasons. Ethically, as responsible corporate citizens, retailers need to make their best efforts to protect the privacy and security of customers who trust the company with their business. Competitively, to best serve their shareholders, companies need to provide customers with assurances that they are safe doing business with the company in order to retain and attract consumers to the business. These needs, necessary in a rapidly changing competitive and security environment, require businesses and business leaders to become more knowledgeable about cybersecurity in general and the qualities of cybersecurity specialists, their future employees, in particular. The goal of this paper is to present the current state of information systems curriculum and how that curriculum addresses the needs of today s businesses. Going forward there will be an ever- increasing need for business and higher education to partner in developing these experts and keeping everyone in the process up to date on the most recent developments. By understanding the academic process as well as the needs of academic institutions business leaders will be better positioned to provide information to the universities and assist in developing the best information systems and cybersecurity experts that are needed in industry. Information Systems programs in general will be the primary point of discussion as cybersecurity is most often an emphasis within the broader program. What Does Industry Need? At the most basic level it is clear that industry needs more experts in cybersecurity. The Bureau of Labor Statistics projects 37% growth in the demand for information security analysts from and 2012 median pay, the most recent year of available data, averaged over $86,000 per year. This is a high growth rate, and high rate of pay, for professionals that are increasingly necessary for today s business environment to succeed. The question for businesses and universities is one of what these in- demand professionals need to learn in order to deliver appropriate value to their future employers.

2 In a 2013 study Amadi and Born identified that employers want Information Systems (IS) graduates to have skill sets in both business and technology, with the top three categories, ranked by importance, being: knowledge of business ethics and privacy issues, IS security, and client- server database. These categories are a very close reflection of just what went wrong in the breach events cited earlier. The security of customer information certainly concerns both ethics and privacy, and the mechanisms to best safeguard that privacy are through IS security, in particular the secure data exchange between clients and servers, the process of which is where customer information is exposed to possible interception and theft. In the area of business skills the Amadi and Born (2013) study also explored what business skills were recognized as important in IS professionals by employers. Ranked behind business ethics and privacy issues were the categories of the general business environment and business models. This is an important point as a skilled IS professional is not only a technologist. Rather, to effectively build and maintain secure systems that serve the needs of a business the IS professional needs to understand business concepts and business models. Effectively addressing these needs is a challenge for both academic programs and companies, with communication between the two being a key to successful preparation and practice. Legier, Woodward, and Martin (2013) explain that the rapid changes experienced in IS as a discipline demand frequent updates to curriculum to best match the demands of the workplace. Their study also discovered a rating of only 3.54/5 from employers on the quality of preparation new IS graduates brought to their first job. This identifies a disconnect between industry needs and academic content and sets the stage for the challenge of partnerships between the two sectors. To best begin addressing the disconnect, an explanation of how the education and development process functions will help executives to understand how to best inform and partner with universities. Developing New Cybersecurity Professionals Training competent cybersecurity professionals is a complex and time- intensive process. Martin & Woodward (2013) suggest that the United States may not have the capacity to train the number of professionals needed. Simply defining the academic program connected to cybersecurity specialists can be difficult, as the names of the discipline, the academic unit in which the discipline is housed, and the content of a cybersecurity program is different in different universities (Sharma, Murphy, Rosso, & Grant, 2013). Sharma, et. al. (2013) also note that there is little research to date on what industry actually wants from graduates of a cybersecurity program, a fact which further complicates the task of supplying companies with the needed help to address the problem of security breaches. To understand how these future professionals are being trained the first step may be to examine the ways in which IS and cybersecurity curricula are being designed. The history of such curricula is longer than many in industry might expect, with the Data Processing Management Association (DPMA), which later became the Association for Computing Machinery (ACM) actually beginning investigation of the needs for education in computing for business and industry in 1965 (Longenecker, Feinstein, & Clark, 2013). To illustrate just how much change occurs in the teaching of IS, a core factor in the complexity of developing professionals in the field, Longenecker, et. al. (2013) identified a total of 138 skills tied to IS curricula and examined their presence in curricula over a fifty year period finding: by grouping the various skills according to use by the various models, we were able to show that of the 138 total skills, 37 skills were either retired or too new to be included in any of the models. Of the remaining 101 skills, some were common to all programs (35), remaining skills were common for programs up to IS 2010 when a significant number were abandoned (64) (p74).

3 With such constant change IS curriculums, including the training for cybersecurity, need to continually evolve. One approach to successful curriculum development is to build an integrated program that concludes with a capstone exercise providing real world experience in a live consulting environment or something similar. In the author s experience as a program coordinator for a Computer Information Systems program this was the approach; graduating seniors worked with local businesses and other organizations in a semester- long, team- based consulting project to build and deploy a live technical product. This process of integrated curriculum and related capstone project is not, however, a one- time effort. To remain applicable the curriculum needs annual review and adjustments to best address the demands of industry (Reinicke, Janicki, & Gebauer, 2013). As part of this continuing review IS programs must adapt to address the expressed needs of industry. Adding to the complexity of remaining current in the teaching of technical skills there is also a challenge of integrating related skills into an IS curriculum to produce graduates who have a full skill set to satisfy the needs of employers. Beyond the technical skills, today s IS practitioners also need interpersonal skills and an understanding of business operations and organization strategies (Simon & Jackson, 2013). This mix of necessary, and constantly evolving, skill sets poses very real challenges to both education and industry. The placement of such programs inside universities, and the informing of such programs by the corporate bodies hiring the graduates, will be of paramount importance going forward. Degree Program Placement and Partnerships The evolving operating and security environment faced by today s businesses poses challenges to professionals and also to educators. The mix of skills demanded of IS professionals makes the program a difficult one to place in the academic environment. From a technical perspective the program is a natural fit for a College of Arts and Sciences in a modern university. Computer Science programs are often found here, as are departments of Mathematics, both of which contribute to the discipline of Information Systems. The demands for communication skills may also fit into the Arts and Sciences model as the study of literature, rhetoric, and other related disciplines are often housed here. The contrasting view to the Arts and Sciences model is to house an IS program in the College of Business to serve the need to provide IS professionals with an understanding of business strategy and business models. These are topics that are generally not found in other areas of a campus. Colleges of Business also have traditionally included technical skills including quantitative reasoning and business transaction processing. Colleges of Business also incorporate business communication skills into their curriculum, focusing on professional communication in both oral and written forms. Additionally, much of the demand for IS professionals comes from the business community where graduates will be working to support and create business operations. The linkage between IS and Colleges of Business also extends well beyond campus. Business schools traditionally do very well in placing students in internships and other live business environment experiences as part of their education. Combined with the usual practice of business faculty being actively involved with organizations as consultants, board members, or networking with businesses for research purposes placing an IS academic program inside a College of Business provides for the active exchange of information that is necessary between industry and IS to prepare students with the proper mix of skills for success as graduates in the workplace. As has been indicated through the literature there is great variability in the content and placement of IS programs. The variability of curriculum can be expected as different programs are reacting at different paces to different shifts in the work environment. The placement of the programs in academic schools, however, could be better standardized in response to the identified needs of companies. For most academic disciplines there is standard placement across most universities. It

4 appears, based on the expressed needs of industry, that IS needs to be either housed in, or at a minimum partnered with, a College of Business to best prepare students with the mix of skills and experiences that are needed for successful professional practice. Conclusion The relationship of training and practice in the field of Information Systems is a very challenging contrast of cultures. While academic practice generally evolves slowly, IS programs are under pressure to better adapt to an increasingly rapidly changing business environment. Placing IS programs consistently inside of Colleges of Business may not be the only solution to the challenges being faced today, but it is an effective and natural fit. Just as IS has moved from being an ancillary activity to a core strategic element in businesses it will be necessary going forward for IS programs to become a core element in the degrees delivered and awarded by Colleges of Business. Making this shift will better prepare IS professionals, better serve businesses, and by extension better serve and protect customers in an increasingly dangerous cybersecurity environment. References Amadi, E. & Born, A. (2013). Information systems programs and business needs: Case study of a midwestern university. Research in Business and Economics Journal, 7, p Bureau of Labor Statistics. Information security analysts. Occupational Outlook Handbook. Retrieved from: and- information- technology/information- security- analysts.htm. Home Depot. (2014). The Home Depot completes malware elimination and enhanced encryption of payment data in all U.S. stores. Retrieved from: Legier, J., Woodward, B., & Martin, N. (2013). Reassessing the skills required of graduates of an information systems technology program: An updated analysis. Information Systems Education Journal, 11(3), p Longenecker, H., Feinstein, D., & Clark, J. (2013). Information systems curricula: A fifty year journey. Information Systems Education Journal, 11(6), p Reinicke, B., Janicki, T., & Gebauer, J. (2013). Implementing an integrated curriculum with an iterative process to support a capstone course in information systems. Information Systems Education Journal, 11(6), p Sharma, A., Murphy, M., Rosso, M., & Grant, D. (2013). Developing an undergraduate information systems security track. Information Systems Education Journal, 11(4), p Sidel, R. (2014). Fraudulent transactions surface in wake of Home Depot breach. The Wall Street Journal. September 23, Simon, D. & Jackson, K. (2013). A closer look at information systems graduate preparation and job needs: Implications for higher education curriculum enhancements. World Journal of Education, 3(3), p

5 Target Corporate. Retrieved from experience/payment- card- issue- FAQ.

Associate s Degree Program

Associate s Degree Program Information Technology-Computer Network Systems Associate s Degree Program The ITT Technical Institutes offer a variety of career-focused curricula. This sheet helps describe the Associate s Degree program

More information

Software Applications Development Bachelor s Degree Program

Software Applications Development Bachelor s Degree Program Education for the future. The six schools of study at the ITT Technical Institutes 3 (School of Information Technology, School of Electronics Technology, School of Drafting and Design, School of Business,

More information

How To Get A Computer Science Degree At Coastal Carolina University

How To Get A Computer Science Degree At Coastal Carolina University New Degree Program in Information Technology Mike Murphy, Ph.D., Assistant Professor, Department of Computing Sciences Will Jones, Ph.D., Associate Professor and Chair, Department of Computing Sciences

More information

Cybersecurity AAS Program

Cybersecurity AAS Program Cybersecurity AAS Program New Program Proposal State Submission Steve Buchholz, Dean of Accreditation and Advancement July 2015 TABLE OF CONTENTS Executive Summary... 2 Identification and Description of

More information

Bachelor of Science Degree Cyber Security Advancing the nation s workforce one graduate at a time

Bachelor of Science Degree Cyber Security Advancing the nation s workforce one graduate at a time Flexible Online Bachelor s Degree Completion Programs Bachelor of Science Degree Cyber Security Advancing the nation s workforce one graduate at a time Cyber Security Major The Program You ve heard about

More information

MEETING THE NATION S INFORMATION SECURITY CHALLENGES

MEETING THE NATION S INFORMATION SECURITY CHALLENGES MEETING THE NATION S INFORMATION SECURITY CHALLENGES TO ADDRESS SKILLS AND WORKFORCE SHORTAGES IN THE INFORMATION SECURITY INDUSTRY, THE NATIONAL SECURITY AGENCY AND THE DEPARTMENT OF HOMELAND SECURITY

More information

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST Protecting Identities. Enhancing Reputations. IDT911 1 DATA BREACHES AND SUBSEQUENT IDENTITY THEFT AND FRAUD THREATEN YOUR ORGANIZATION

More information

Law & Ethics, Policies & Guidelines, and Security Awareness

Law & Ethics, Policies & Guidelines, and Security Awareness Law & Ethics, Policies & Guidelines, and Security Awareness Modifications by Prof. Dong Xuan and Adam C. Champion Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of

More information

Software Development

Software Development Software Development Associate s Degree The ITT Technical Institutes offer a variety of career-focused curricula. This sheet helps describe the associate s degree program in Software Development 1 offered

More information

New Program Proposal Bachelor of Science Major in Information Systems Coastal Carolina University

New Program Proposal Bachelor of Science Major in Information Systems Coastal Carolina University CHE 9/30/2009 Agenda Item 8.02.A.3 New Program Proposal Bachelor of Science Major in Information Systems Coastal Carolina University Summary Coastal Carolina University requests approval to offer a program

More information

UST BUSINESS OPUS COLLEGE OF UNDERGRADUATE PROGRAMS. Minnesota

UST BUSINESS OPUS COLLEGE OF UNDERGRADUATE PROGRAMS. Minnesota Minnesota UST OPUS COLLEGE OF BUSINESS UNDERGRADUATE PROGRAMS Table of Contents The St. Thomas Approach 3 Message from the Dean 4 Message from the Director 5 Business departments Accounting 7 Decision

More information

Proposal for a BA in Applied Computing

Proposal for a BA in Applied Computing Proposal for a BA in Applied Computing Introduction One of the challenges in designing Computer Science curricula is the fast pace of growth of the field of Computer Science. While the curriculum should

More information

Computer Security and Investigations

Computer Security and Investigations Computer Security and Investigations Program Locations: Program Code: Coordinator: Credential: Peterborough CSI Blair Brown Ontario College Advanced Diploma Start Dates: September 06, 2016 January 09,

More information

::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: Trends

::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: Trends Quarterly Cybersecurity BILT Meeting October 10, 2012 Meeting Minutes ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: Trends Stephen

More information

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation By Marc Ostryniec, vice president, CSID The increase in volume, severity, publicity and fallout of recent data breaches

More information

USING INFORMATION ASSURANCE CURRICULUM STANDARDS AS A BASIS FOR A GRADUATE DEGREE

USING INFORMATION ASSURANCE CURRICULUM STANDARDS AS A BASIS FOR A GRADUATE DEGREE USING INFORMATION ASSURANCE CURRICULUM STANDARDS AS A BASIS FOR A GRADUATE DEGREE N. Paul Schembari, Mike Jochen East Stroudsburg University of Pennsylvania {nschembari, mjochen}@esu.edu ABSTRACT We describe

More information

NOS for IT User and Application Specialist. IT Security (ESKITU04) November 2014 V1.0

NOS for IT User and Application Specialist. IT Security (ESKITU04) November 2014 V1.0 NOS for IT User and Application Specialist IT Security (ESKITU04) November 2014 V1.0 NOS Reference ESKITU040 ESKITU041 ESKITU042 Level 3 not defined Use digital systems NOS Title Set up and use security

More information

WRITTEN TESTIMONY BEFORE THE HEARING ON FEBRUARY 4, 2014 TESTIMONY OF JOHN MULLIGAN TARGET

WRITTEN TESTIMONY BEFORE THE HEARING ON FEBRUARY 4, 2014 TESTIMONY OF JOHN MULLIGAN TARGET WRITTEN TESTIMONY BEFORE THE SENATE COMMITTEE ON THE JUDICIARY HEARING ON PRIVACY IN THE DIGITAL AGE: PREVENTING DATA BREACHES AND COMBATING CYBERCRIME FEBRUARY 4, 2014 TESTIMONY OF JOHN MULLIGAN EXECUTIVE

More information

How To Get A Degree In Armenian Higher Education

How To Get A Degree In Armenian Higher Education Programmes Taught in ENGLISH at Armenian Higher Education Institutions HIGHER EDUCATION INSTITUTION BA Programme(s) Name: Armenian State University of Economics Acronym: ASUE www.asue.am Name: Bachelor

More information

Careers in Economics. Presented by. Career Services The University of Toledo

Careers in Economics. Presented by. Career Services The University of Toledo Careers in Economics Presented by Career Services The University of Toledo Occupations today require a college educated individual who can Write and speak well Solve problems Learn new information quickly

More information

Cybersecurity: A View from the Boardroom

Cybersecurity: A View from the Boardroom An Executive Brief from Cisco Cybersecurity: A View from the Boardroom In the modern economy, every company runs on IT. That makes security the business of every person in the organization, from the chief

More information

I n t r o d u c t i o n

I n t r o d u c t i o n and Mission Information technology is a dynamic discipline that addresses the use of computing and I n t r o d u c t i o n information technology in business, education, government, and other organizations.

More information

Three- Year Dual Degree LBJ School and UT School of Law FAQs

Three- Year Dual Degree LBJ School and UT School of Law FAQs 1 Three- Year Dual Degree LBJ School and UT School of Law FAQs Q. For whom are the dual degree programs in law and policy well- suited? A. Students who are interested in working in positions at the intersection

More information

Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program

Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program Community Commission Request for New, Pilot or Revised Degree or Certificate Program A. : Laramie County Community B. Date submitted to WCCC: C. Program 1. Request for: X New Program Pilot Program Revised

More information

Careers in Psychology

Careers in Psychology Careers in Psychology Presented by Career Services The University of Toledo Occupations today require a college educated individual who can Write and speak well Solve problems Learn new information quickly

More information

Networking and Information Security

Networking and Information Security Networking and Information Security College of Engineering & Information Sciences Careers That Fit You Build a career around your interests and talents Do you like figuring out how things work? Solving

More information

Human Resource Management

Human Resource Management Majoring in..... Human Resource Management Description of Human Resource Management What is human resource management? Human resource management is a major functional area of all businesses and includes

More information

MATHEMATICS What can I do with this degree?

MATHEMATICS What can I do with this degree? MATHEMATICS What can I do with this degree? Transferable Skills In addition to the specific subject matter that Mathematics majors learn, they acquire many skills that they can easily transfer to any field.

More information

A Business Perspective on Promoting Cybersecurity. Art Reilly Cisco Systems For the ICC

A Business Perspective on Promoting Cybersecurity. Art Reilly Cisco Systems For the ICC A Business Perspective on Promoting Cybersecurity Art Reilly Cisco Systems For the ICC Topics Culture of Cybersecurity Role of Business Cooperation with the Stakeholders ICC Companion documents to the

More information

MC-MGMTACT Master of Management (Accounting)

MC-MGMTACT Master of Management (Accounting) MC-MGMTACT Master of Management (Accounting) Year and Campus: 2016 - Parkville CRICOS Code: Fees Information: Level: Duration & Credit Coordinator: 064499E Subject EFTSL, Level, Discipline & Census Date,

More information

University of Maryland Cybersecurity Center (MC 2 )

University of Maryland Cybersecurity Center (MC 2 ) University of Maryland Cybersecurity Center (MC 2 ) Responding to the Needs of the State, the Nation, and the Global Community Pat Prof. Michael Hicks Director www.cyber.umd.edu/ Cybersecurity Challenge

More information

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing

More information

Business Program: Social Media Marketing Option

Business Program: Social Media Marketing Option Business Program: Social Media Marketing Option State Submission Kelly O Brien 1/4/2012 Table of Contents EXECUTIVE SUMMARY... 2 IDENTIFICATION AND DESCRIPTION OF THE PROGRAM... 3 OBJECTIVES AND PURPOSE

More information

DATA SECURITY: EVERYTHING YOU NEED TO KNOW

DATA SECURITY: EVERYTHING YOU NEED TO KNOW DATA SECURITY: EVERYTHING YOU NEED TO KNOW! Data Breaches: Where, What and Why! Federal and State Regulations to Protect Data! EMV Chip Technology! PIN or Signature?! Existing and Emerging Security Options!

More information

Review of the B.S. in Computer Science 11.0701

Review of the B.S. in Computer Science 11.0701 Review of the B.S. in Computer Science 11.0701 Context and overview. The B.S. in Computer Science program is housed in the School of Information Technology within the College of Applied Science and Technology.

More information

Five Trends to Track in E-Commerce Fraud

Five Trends to Track in E-Commerce Fraud Five Trends to Track in E-Commerce Fraud Fraud is nothing new if you re in the e-commerce business you probably have a baseline level of fraud losses due to stolen credit cards, return fraud and other

More information

Information Security Awareness Training. Course Outline. Provides a brief orientation to the topics covered in the module.

Information Security Awareness Training. Course Outline. Provides a brief orientation to the topics covered in the module. Information Security Awareness Training Course Outline Module 1 Information security risks 1. explain what information security means. 2. define the four aspects of information security. 3. understand

More information

BOARD OF GOVERNORS STATE UNIVERSITY SYSTEM OF FLORIDA NEW DOCTORAL DEGREE PROPOSAL STAFF ANALYSIS

BOARD OF GOVERNORS STATE UNIVERSITY SYSTEM OF FLORIDA NEW DOCTORAL DEGREE PROPOSAL STAFF ANALYSIS BOARD OF GOVERRS STATE UNIVERSITY SYSTEM OF FLORIDA NEW DOCTORAL DEGREE PROPOSAL STAFF ANALYSIS Program: Doctor of Social Work CIP Code: 51.1503 Institution: Florida Atlantic University Proposed Implementation

More information

Chairman Johnson, Ranking Member Carper, and Members of the committee:

Chairman Johnson, Ranking Member Carper, and Members of the committee: UNITED STATES OFFICE OF PERSONNEL MANAGEMENT STATEMENT OF THE HONORABLE KATHERINE ARCHULETA DIRECTOR U.S. OFFICE OF PERSONNEL MANAGEMENT before the COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS

More information

Nottingham Trent University Course Specification

Nottingham Trent University Course Specification Nottingham Trent University Course Specification Basic Course Information 1. Awarding Institution: Nottingham Trent University 2. School/Campus: Nottingham Business School /City Campus 3. Final Award,

More information

MASTER OF FINE ARTS (MFA) IN CREATIVE TECHNOLOGIES

MASTER OF FINE ARTS (MFA) IN CREATIVE TECHNOLOGIES MASTER OF FINE ARTS (MFA) IN CREATIVE TECHNOLOGIES Background and Overview The proposed MFA in Creative Technologies is a 60-credit hour terminal degree focused on two areas of emphasis: interactive new

More information

Global IT Security Risks: 2012

Global IT Security Risks: 2012 Global IT Security Risks: 2012 Kaspersky Lab is a leading developer of secure content and threat management solutions and was recently named a Leader in the Gartner Magic Quadrant for Endpoint Protection

More information

Careers in Management Information Systems

Careers in Management Information Systems Careers in Management Information Systems In today s high-tech and globally competitive world, effective information systems management plays an important role in business success. However, a critical

More information

Geographic Information Systems (GIS) Master s Degrees: An Evaluation of Degrees for GIS Librarians. Samantha Guss. HPSE 2046, Spring 2014

Geographic Information Systems (GIS) Master s Degrees: An Evaluation of Degrees for GIS Librarians. Samantha Guss. HPSE 2046, Spring 2014 GIS MASTER S DEGREES 1 Geographic Information Systems (GIS) Master s Degrees: An Evaluation of Degrees for GIS Librarians Samantha Guss HPSE 2046, Spring 2014 Assignment 1: Curriculum Analysis GIS MASTER

More information

The National Communication Association s Standards for Undergraduate Communication Programs Updated April, 2011

The National Communication Association s Standards for Undergraduate Communication Programs Updated April, 2011 The National Communication Association s Standards for Undergraduate Communication Programs Updated April, 2011 A variety of disciplinary organizations have developed specialized accreditation standards

More information

Liberal Arts programs

Liberal Arts programs Liberal Arts programs Founded in 1949, Grand Canyon University is Arizona s private university. For more than 60 years, GCU has been preparing learners to become global citizens, critical thinkers, effective

More information

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC. Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies

More information

New Program Proposal Bachelor of Arts Intelligence and National Security Coastal Carolina University

New Program Proposal Bachelor of Arts Intelligence and National Security Coastal Carolina University New Program Proposal Bachelor of Arts Intelligence and National Security Coastal Carolina University Summary Coastal Carolina University requests approval to offer a program leading to the Bachelor of

More information

Program Description. Doctorate of Health Sciences to Be Offered by Indiana State University, Terre Haute, IN

Program Description. Doctorate of Health Sciences to Be Offered by Indiana State University, Terre Haute, IN Program Description Doctorate of Health Sciences to Be Offered by Indiana State University, Terre Haute, IN 1. Characteristics of the Program a. Campus(es) Offering Program: Indiana State University, Terre

More information

Curriculum Proposal Training Assessment Forms Center for Teaching and Learning

Curriculum Proposal Training Assessment Forms Center for Teaching and Learning Curriculum Proposal Training Assessment Forms Center for Teaching and Learning Monica Varner, Ph.D. Director of Assessment and Institutional Effectiveness and Center for Teaching and Learning Associate

More information

Surviving the Era of Hack Attacks Cyber Security on a Global Scale

Surviving the Era of Hack Attacks Cyber Security on a Global Scale Surviving the Era of Hack Attacks Cyber Security on a Global Scale Dr. Adriana Sanford ASU Lincoln Professor of Global Corporate Compliance and Ethics Clinical Associate Professor of Law and Ethics This

More information

Cyber threats are growing.

Cyber threats are growing. Cyber threats are growing. So are your career opportunities. Put the future of your cybersecurity career in the hands of a respected online education leader. Everything you need to succeed. Excelsior College

More information

Information Technology An Academic Discipline

Information Technology An Academic Discipline Information Technology An Academic Discipline This document represents a summary of the following two publications defining Information Technology (IT) as an academic discipline. IT 2008: Curriculum Guidelines

More information

Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program

Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program A. College: Laramie County Community College B. Date submitted to WCCC: C. Program 1. Request for: X

More information

INDIANAPOLIS, IN 2011 CATALOG Volume 78

INDIANAPOLIS, IN 2011 CATALOG Volume 78 TABLE OF CONTENTS CURRICULA 2 SCHOOL OF INFORMATION TECHNOLOGY 2 INFORMATION SYSTEMS AND CYBERSECURITY (RESIDENCE PROGRAM) 2 INFORMATION SYSTEMS AND CYBERSECURITY (ONLINE PROGRAM) 3 INFORMATION SYSTEMS

More information

Academic Collaboration: Double Degree Program Curriculum Challenges, Report on BU and Finance University Program SALEEM KHAN BLOOMSBURG UNIVERSITY

Academic Collaboration: Double Degree Program Curriculum Challenges, Report on BU and Finance University Program SALEEM KHAN BLOOMSBURG UNIVERSITY Academic Collaboration: Double Degree Program Curriculum Challenges, Report on BU and Finance University Program SALEEM KHAN BLOOMSBURG UNIVERSITY Academic Initiatives Three academic initiatives undertaken

More information

Commission on Peer Review and Accreditation

Commission on Peer Review and Accreditation Commission on Peer Review and Accreditation Network of Schools of Public Policy, Affairs, and Administration ACCREDITATION STANDARDS For Master s degree programs Adopted October 16, 2009 at the NASPAA

More information

PSYCHOLOGY. Master of Science in Applied Psychology

PSYCHOLOGY. Master of Science in Applied Psychology CJ 515 Budgetary Planning in Public Agencies Examines the nature of public budgeting and financial management from the perspective of a public manager. Explores public budgeting from an analytical perspective.

More information

What the Biggest Data Breaches in Retail Have Taught Us about Cyber Security

What the Biggest Data Breaches in Retail Have Taught Us about Cyber Security What the Biggest Data Breaches in Retail Have Taught Us about Cyber Security With the holiday season upon us, much attention turns to the retail sector, which is expected to see unprecedented activity

More information

Developing Communication-Related Master s Degree Programs

Developing Communication-Related Master s Degree Programs ACADEMIC AFFAIRS FORUM Developing Communication-Related Master s Degree Programs Custom Research Brief Research Associate Amanda Michael Research Manager Nalika Vasudevan December 2012 2 of 13 3 of 13

More information

Why is this National Cyber Security Month? Stephen G. Austin, CPA, MBA Swenson Advisors, LLP

Why is this National Cyber Security Month? Stephen G. Austin, CPA, MBA Swenson Advisors, LLP Why is this National Cyber Security Month? Stephen G. Austin, CPA, MBA, LLP Created as a collaborative effort between government and industry to ensure every American has the resources they need to stay

More information

REVISED &APPROVED NOVEMBER 19, 2001 GRADUATE FACULTY COUNCIL DOC. NO. 868 TABLED OCTOBER 15, 2001

REVISED &APPROVED NOVEMBER 19, 2001 GRADUATE FACULTY COUNCIL DOC. NO. 868 TABLED OCTOBER 15, 2001 REVISED &APPROVED NOVEMBER 19, 2001 GRADUATE FACULTY COUNCIL DOC. NO. 868 TABLED OCTOBER 15, 2001 RECOMMENDATION OF THE GRADUATE CURRICULUM COMMITTEE AND THE FACULTY OF THE SCHOOL OF EDUCATION AND THE

More information

3/4/2015. Scope of Problem. Data Breaches A Daily Phenomenon. Cybersecurity: Minimizing Risk & Responding to Breaches. Anthem.

3/4/2015. Scope of Problem. Data Breaches A Daily Phenomenon. Cybersecurity: Minimizing Risk & Responding to Breaches. Anthem. Cybersecurity: Minimizing Risk & Responding to Breaches March 5, 2015 Andy Chambers Michael Kelly Jimmie Pursell Scope of Problem Data Breaches A Daily Phenomenon Anthem JP Morgan / Chase Sony Home Depot

More information

CURRICULUM RECOMMENDATIONS FOR INFORMATION TECHNOLOGY RELATED DEGREES

CURRICULUM RECOMMENDATIONS FOR INFORMATION TECHNOLOGY RELATED DEGREES CURRICULUM RECOMMENDATIONS FOR INFORMATION TECHNOLOGY RELATED DEGREES Cheryl L. Aasheim, Georgia Southern University, PO Box 8150, Statesboro, GA 30460-8150, caasheim@georgiasouthern.edu Lixin Li, Georgia

More information

University of Illinois Department of Computer Science Goals, Objectives, and Assessments January 2009

University of Illinois Department of Computer Science Goals, Objectives, and Assessments January 2009 University of Illinois Department of Computer Science Goals, Objectives, and Assessments January 2009 Introduction The University of Illinois Computer Science Department is among the oldest CS departments

More information

Description of Psychology

Description of Psychology Majoring in.... Psychology Description of Psychology What is psychology? Psychology is the study of human behavior and mental processes. What do psychology majors study? Psychology students study how thoughts,

More information

Client Update NFA Adopts Interpretive Notice Regarding Information Systems Security Programs

Client Update NFA Adopts Interpretive Notice Regarding Information Systems Security Programs 1 Client Update NFA Adopts Interpretive Notice Regarding Information Systems Security Programs NEW YORK Byungkwon Lim blim@debevoise.com Gary E. Murphy gemurphy@debevoise.com Michael J. Decker mdecker@debevoise.com

More information

Information Systems. College of Engineering & Information Sciences. Careers That Fit You

Information Systems. College of Engineering & Information Sciences. Careers That Fit You Information Systems College of Engineering & Information Sciences Careers That Fit You Build your career around your talents Do you have an interest in computers and how their programs work? Do you have

More information

TOPIC: Towson University: Master of Science in Marketing Intelligence and Embedded Post- Baccalaureate Certificate in Interactive Marketing

TOPIC: Towson University: Master of Science in Marketing Intelligence and Embedded Post- Baccalaureate Certificate in Interactive Marketing BOARD OF REGENTS SUMMARY OF ITEM FOR ACTION, INFORMATION, OR DISCUSSION TOPIC: Towson University: Master of Science in Marketing Intelligence and Embedded Post- Baccalaureate Certificate in Interactive

More information

Criteria for Accrediting Computer Science Programs Effective for Evaluations during the 2004-2005 Accreditation Cycle

Criteria for Accrediting Computer Science Programs Effective for Evaluations during the 2004-2005 Accreditation Cycle Criteria for Accrediting Computer Science Programs Effective for Evaluations during the 2004-2005 Accreditation Cycle I. Objectives and Assessments The program has documented, measurable objectives, including

More information

PCI Data Security Standard 3.0

PCI Data Security Standard 3.0 SECURELY ENABLING BUSINESS PCI Data Security Standard 3.0 Training Strategies That Work Presented by Doug Hall May 20, 2014 AGENDA PCI DSS 3.0 Training Strategies That Work PCI DSS 3.0 Overview PCI Training

More information

Computer Information Systems Curriculum Development Trends

Computer Information Systems Curriculum Development Trends Computer Information Systems Curriculum Development Trends Dr. Jay Hettiarachchy (principal contact person) Computer Information Systems Department Ferris State University Big Rapids, MI 49307 Phone: 231-591-2477

More information

Review of Business Information Systems December 2014 Volume 18, Number 2

Review of Business Information Systems December 2014 Volume 18, Number 2 A Descriptive Study Of Graduate Information Systems Curriculums Charles H. Apigian, Middle Tennessee State University, USA Stan Gambill, Middle Tennessee State University, USA ABSTRACT The purpose of this

More information

2015 VORMETRIC INSIDER THREAT REPORT

2015 VORMETRIC INSIDER THREAT REPORT Research Conducted by 2015 VORMETRIC INSIDER THREAT REPORT Trends and Future Directions in Data Security HEALTHCARE EDITION #2015InsiderThreat RESEARCH BRIEF U.S. HEALTHCARE SPOTLIGHT ABOUT THIS RESEARCH

More information

FORENSIC SCIENCE EDUCATION PROGRAMS ACCREDITATION COMMISSION. FEPAC Computing and Information Science Technology. Call for Comments September 2015

FORENSIC SCIENCE EDUCATION PROGRAMS ACCREDITATION COMMISSION. FEPAC Computing and Information Science Technology. Call for Comments September 2015 FORENSIC SCIENCE EDUCATION PROGRAMS ACCREDITATION COMMISSION FEPAC Computing and Information Science Technology Call for Comments September 2015 Pursuant to the Forensic Science Education Programs Accreditation

More information

Developing an Undergraduate Information Systems Security Track

Developing an Undergraduate Information Systems Security Track Developing an Undergraduate Information Systems Security Track Aditya Sharma asharma@nccu.edu Marianne C. Murphy mmurphy@nccu.edu Mark A. Rosso mrosso@nccu.edu Donna Grant grantd@nccu.edu Computer Information

More information

Software Development Educational Pathway: AS to BAS

Software Development Educational Pathway: AS to BAS Software Development Educational Pathway: AS to BAS Colin Archibald 1, Richard Grant 2, Craig Tidwell 3, Ali Orooji 4 and Greg Garver 5 1 Information Technology, Valencia College, Orlando, FL, USA 2 Computer

More information

White Paper on Financial Industry Regulatory Climate

White Paper on Financial Industry Regulatory Climate White Paper on Financial Industry Regulatory Climate According to a 2014 report on threats to the financial services sector, 45% of financial services organizations polled had suffered economic crime during

More information

Microsoft s cybersecurity commitment

Microsoft s cybersecurity commitment Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade

More information

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY RECOGNIZED MARKETABLE

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY RECOGNIZED MARKETABLE RECOGNIZED PROVEN RESPECTED MARKETABLE FLEXIBLE Bryan Rolle Student SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY Apply today: strayer.edu/apply FLEXIBLE /

More information

New Program Proposal Master in Engineering Systems Engineering Clemson University

New Program Proposal Master in Engineering Systems Engineering Clemson University New Program Proposal Master in Engineering Systems Engineering Clemson University Summary Clemson University requests approval to offer a program leading to the Master in Engineering degree with a major

More information

BYOD Strategy (Service Mobility) 2014

BYOD Strategy (Service Mobility) 2014 Information Resources BYOD Strategy (Service Mobility) 2014 BYOD Strategy Group Joseph Casabona Lee DeAngelis Adam Edwards Diane Kennedy Calvin Krzywiec (Chair) Timothy Meade Glen Pace Jason Wimmer 1 Summary

More information

Site Visit: March 2014 Report: August 2014

Site Visit: March 2014 Report: August 2014 Attachment 5 Review of the Bachelor s of Science in Information Science and Technology Academic Program and Curriculum Committee Committee: Dave Clark, Associate Professor of English (Chair) Tian Zhao,

More information

Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus

Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus cdoulig at unipi dot gr Department of Informatics University of Piraeus Safety & Security in Cyber Space: Building up Trust in the EU Athens, 6-7 March 2014 Cybersecurity: where do we stand? Major Trends

More information

Doctorate of Nursing Practice (DNP)

Doctorate of Nursing Practice (DNP) Doctorate of Nursing Practice (DNP) Earn Your Doctorate & Advance the Profession of Nursing Are you an experienced clinician who wants to take your practice to the next level? Pursuing a doctoral degree

More information

Insurance Underwriter

Insurance Underwriter Insurance Underwriter It s About You Curious about the risks involved in life events? Can you think at a macro-level, into the long-term and across broad groups of people and businesses? Do you enjoy working

More information

SANTA CLARA UNIVERSITY SCHOOL OF ENGINEERING. Engineering Management and Leadership Program STUDENT HANDBOOK 2011-2012

SANTA CLARA UNIVERSITY SCHOOL OF ENGINEERING. Engineering Management and Leadership Program STUDENT HANDBOOK 2011-2012 SANTA CLARA UNIVERSITY SCHOOL OF ENGINEERING Engineering Management and Leadership Program STUDENT HANDBOOK 2011-2012 Contents Introduction 3 The Master of Science in Engineering Management and Leadership

More information

2015 VORMETRIC INSIDER THREAT REPORT

2015 VORMETRIC INSIDER THREAT REPORT Research Conducted by 2015 VORMETRIC INSIDER THREAT REPORT Trends and Future Directions in Data Security RETAIL EDITION #2015InsiderThreat RESEARCH BRIEF RETAIL CUSTOMERS AT RISK ABOUT THIS RESEARCH BRIEF

More information

Urban and Regional Studies Program Career Information

Urban and Regional Studies Program Career Information Urban and Regional Studies Program Career Information What can you do with a degree in Urban and Regional Studies? Skills and Abilities Researching Interpreting information Strong interpersonal skills

More information

FINANCIAL FRAUD: THE IMPACT ON CORPORATE SPEND IT SECURITY RISKS SPECIAL REPORT SERIES

FINANCIAL FRAUD: THE IMPACT ON CORPORATE SPEND IT SECURITY RISKS SPECIAL REPORT SERIES FINANCIAL FRAUD: THE IMPACT ON CORPORATE SPEND IT SECURITY RISKS SPECIAL REPORT SERIES Kaspersky Lab 2 Corporate IT Security Risks Survey details: More than 5,500 companies in 26 countries around the world

More information

DATA BREACHES: HOW IT IMPACTS THE CUSTOMER & THE FINANCIAL INSTITUTION. Prepared For: First Citizens Federal Credit Union 3/18/2015

DATA BREACHES: HOW IT IMPACTS THE CUSTOMER & THE FINANCIAL INSTITUTION. Prepared For: First Citizens Federal Credit Union 3/18/2015 DATA BREACHES: HOW IT IMPACTS THE CUSTOMER & THE FINANCIAL INSTITUTION. Prepared For: First Citizens Federal Credit Union TABLE OF CONTENTS Data Breach Trends Financial Institutions Impact How First Citizens

More information

AC 2010-1485: DEVELOPMENT AND IMPLEMENTATION OF A MASTERS PROGRAM IN COMPUTER INFORMATION TECHNOLOGY

AC 2010-1485: DEVELOPMENT AND IMPLEMENTATION OF A MASTERS PROGRAM IN COMPUTER INFORMATION TECHNOLOGY AC 2010-1485: DEVELOPMENT AND IMPLEMENTATION OF A MASTERS PROGRAM IN COMPUTER INFORMATION TECHNOLOGY Hetal Jasani, Northern Kentucky University Hetal Jasani is an assistant professor in the Department

More information

IT Workforce snapshot

IT Workforce snapshot 2013 IT Workforce snapshot The energy sector is being impacted by changes that will continue to challenge this sector into the foreseeable future. Technology is an essential player driving and supporting

More information

Metrics that Matter Security Risk Analytics

Metrics that Matter Security Risk Analytics Metrics that Matter Security Risk Analytics Rich Skinner, CISSP Director Security Risk Analytics & Big Data Brinqa rskinner@brinqa.com April 1 st, 2014. Agenda Challenges in Enterprise Security, Risk

More information

BBA Accounting Executive Summary

BBA Accounting Executive Summary BBA Accounting Executive Summary Program Overview Business education continues to experience high demand from graduates of domestic high schools, mature students, working students and international students.

More information

Cybersecurity. Are you prepared?

Cybersecurity. Are you prepared? Cybersecurity Are you prepared? First Cash, then your customer, now YOU! What is Cybersecurity? The body of technologies, processes, practices designed to protect networks, computers, programs, and data

More information

FAYETTEVILLE STATE UNIVERSITY FAYETTEVILLE, NORTH CAROLINA FACULTY SENATE

FAYETTEVILLE STATE UNIVERSITY FAYETTEVILLE, NORTH CAROLINA FACULTY SENATE FAYETTEVILLE STATE UNIVERSITY FAYETTEVILLE, NORTH CAROLINA FACULTY SENATE ACADEMIC AFFAIRS COMMITTEE PROPOSAL PRESENTATION COVER SHEET (Proposal from College of Arts and Sciences) I. Proposal: Notification

More information

Request for Authorization to Establish a Bachelor of Science in Sport Management at Elizabeth City State University

Request for Authorization to Establish a Bachelor of Science in Sport Management at Elizabeth City State University Request for Authorization to Establish a Bachelor of Science in Sport Management at Elizabeth City State University Elizabeth City State University requests authorization to establish a B.S. in Sport Management

More information

MS In Forensic Computing (MSFC) Saint Joseph s College. (33 Credits, including a Practicum/Internship)

MS In Forensic Computing (MSFC) Saint Joseph s College. (33 Credits, including a Practicum/Internship) MS In Forensic Computing (MSFC) Saint Joseph s College (33 Credits, including a Practicum/Internship) The MS in Forensic Computing will be an interdisciplinary degree integrating curriculum from three

More information

Time Is Not On Our Side!

Time Is Not On Our Side! An audit sets the baseline. Restricting The next steps Authenticating help prevent, Tracking detect, and User Access? respond. It is rare for a few days to pass without news of a security breach affecting

More information