Reference Hub1
Opportunities and Challenges of Cybersecurity for Undergraduate Information Systems Programs

Opportunities and Challenges of Cybersecurity for Undergraduate Information Systems Programs

Shouhong Wang, Hai Wang
Copyright: © 2019 |Volume: 15 |Issue: 2 |Pages: 20
ISSN: 1550-1876|EISSN: 1550-1337|EISBN13: 9781522564072|DOI: 10.4018/IJICTE.2019040104
Cite Article Cite Article

MLA

Wang, Shouhong, and Hai Wang. "Opportunities and Challenges of Cybersecurity for Undergraduate Information Systems Programs." IJICTE vol.15, no.2 2019: pp.49-68. http://doi.org/10.4018/IJICTE.2019040104

APA

Wang, S. & Wang, H. (2019). Opportunities and Challenges of Cybersecurity for Undergraduate Information Systems Programs. International Journal of Information and Communication Technology Education (IJICTE), 15(2), 49-68. http://doi.org/10.4018/IJICTE.2019040104

Chicago

Wang, Shouhong, and Hai Wang. "Opportunities and Challenges of Cybersecurity for Undergraduate Information Systems Programs," International Journal of Information and Communication Technology Education (IJICTE) 15, no.2: 49-68. http://doi.org/10.4018/IJICTE.2019040104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

This article investigates the opportunities and challenges of cybersecurity for information systems (IS) programs and proposes a curriculum structure of cybersecurity track for IS programs. The study has collected data from eighty-two course websites of thirteen institutions at the graduate level and sixteen institutions at the undergraduate level as well as twenty descriptions of cybersecurity jobs posted on the internet. The collected qualitative data has been analyzed from the from the perspective of IS education. The findings indicate that the topics of cybersecurity management and essential cybersecurity technology are relevant to the IS discipline. The article suggests that these topics can be the components of two cybersecurity courses offered by IS programs to meet the demands and challenges of cybersecurity.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.