skip to main content
10.1145/1029533.1029541acmconferencesArticle/Chapter ViewAbstractPublication PagesiteConference Proceedingsconference-collections
Article

Designing an information security program as a core competency of network technologists

Published: 28 October 2004 Publication History

Abstract

In the article, "Clarke Warns Educators About the Need for Better Security", Deborah Radcliff states that information security programs focus solely on technology issues without regard to business value and critical thinking. [1] Another issue is the lack of undergraduate programs in information security for front line network engineers and technicians. Most unmet employer needs today consists of front-line workers in the information security field that contains the greatest number of information security jobs in the marketplace. However, few professionals at this level are currently educated and trained in information security. This level is a niche area for undergraduate programs to provide needed education and training in information security. Most information security programs today are at the post-graduate level, which trains for higher level jobs than what most employers are looking for. The purpose of this paper is to review the author's research in information security employer needs, present the high level competencies needed in information security programs as developed by an industry focus group, investigate the different ways to integrate information security into IT programs, and discuss the implications for network technology programs in the future.

References

[1]
D. Radcliff, "Clarke warns educators about the need for better security," vol. 2002: Computerworld, 2002.
[2]
L. A. Gordon, M. P. Loeb, W. Lucyshyn, and R. Richardson, "2004 CSI/FBI Computer Crime and Security Survery," vol. 2004. San Franscisco: FBI, 2004.
[3]
B. Cohen, "ITAA Survey Explores Issues in Information Security Hiring," vol. 2004: ITAA, 2003.
[4]
S. E. Berryman, "Learning for the workplace," Review of Research in Education, pp. 343--401, 1993.
[5]
A. P. Carnevale, L. J. Gainer, and A. S. Meltzer, "Workplace basics: The skills employers want," Washington, DC 1988.
[6]
J. P. Diesen and K. P. Borman, "Addressing the national needs for skills technical degree graduates," Indian River Community College, University of South Florida, Tampa, FL, Fort Pierce, FL, Final Report NSF Project 9628036, 1998 1998.
[7]
G. P. Gabriel, "Employee characteristics and skills valued by Northern Virginia employers," Northern Virginia Community College, Annandale 19--00, December 2000 2000.
[8]
W. B. Johnston and A. H. Packer, "Workforce 2000: Work and workers for the 21st century," Hudson Institute., Indianapolis, IN 1987.
[9]
P. McLagan, "Models for HRD practice," Training and Development Journal, pp. 43, 1989.
[10]
P. Denning, "Educating a new engineer," Communications of the ACM, vol. 35, pp. 85--97, 1992.
[11]
G. Scragg, D. Baldwin, and H. Koomen, "Computer Science Needs an Insight-Based Curriculum," presented at Proceedings of the twenty-fifth SIGCSE symposium on Computer science education, 1994.
[12]
R. C. Schank, Designing world class e-learning: how IBM, GE, Harvard Business School, and Columbia University are succeeding at e-learning. New York: McGraw-Hill, 2002.

Cited By

View all
  • (2009)Design and Delivery of Undergraduate IT Security Management CourseProceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance10.1007/978-3-642-02617-1_41(402-411)Online publication date: 18-Jun-2009
  • (2007)Common Body of Knowledge for Information SecurityIEEE Security and Privacy10.1109/MSP.2007.325:2(64-67)Online publication date: 1-Mar-2007
  • (2006)StingrayProceedings of the 7th conference on Information technology education10.1145/1168812.1168827(53-58)Online publication date: 19-Oct-2006

Index Terms

  1. Designing an information security program as a core competency of network technologists

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CITC5 '04: Proceedings of the 5th conference on Information technology education
    October 2004
    300 pages
    ISBN:1581139365
    DOI:10.1145/1029533
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 28 October 2004

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. IT education
    2. information security education
    3. network security
    4. security

    Qualifiers

    • Article

    Conference

    SIGITE04
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 176 of 429 submissions, 41%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)4
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 07 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2009)Design and Delivery of Undergraduate IT Security Management CourseProceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance10.1007/978-3-642-02617-1_41(402-411)Online publication date: 18-Jun-2009
    • (2007)Common Body of Knowledge for Information SecurityIEEE Security and Privacy10.1109/MSP.2007.325:2(64-67)Online publication date: 1-Mar-2007
    • (2006)StingrayProceedings of the 7th conference on Information technology education10.1145/1168812.1168827(53-58)Online publication date: 19-Oct-2006

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media