Facebooktwittergoogle_plusredditlinkedintumblrmail

Curricular Foundations of Cybersecurity–CALL FOR PAPERS

Full papers due: 1 August 2018

Notification of acceptance date: 19 November 2018

Publication date: March 2019

Computer plans a March 2019 special issue on Curricular Foundations of Cybersecurity.

Because of rapidly increasing workforce demand, cybersecurity has become a very popular topic for professional training. It is considerably less pervasive within the mainstream of the undergraduate university, where the primary objective is education rather than training. It is the compelling need for educated cybersecurity professionals that drives universities to offer educational programs in computing, business, and criminal justice that include cybersecurity content. These programs are of two types: either involving integration of cybersecurity content into existing programs or offering new degree programs entitled “cybersecurity” or something similar.

Both types of cybersecurity education are valid and have the potential to positively address the workforce demand. Regarding the integration of cybersecurity content within existing degree programs, the DHS/NSA Centers for Academic Excellence (CAE) have already had significant impact for approximately 20 years. Furthermore, Cybersecurity Curricula 2017 (CSEC2017) was recently released, providing additional guidance in integrating cybersecurity content into existing programs. Regarding the offering of new cybersecurity programs, it is unclear to what extent CAE and CSEC2017 really help in defining parameters for undergraduate programs that are simply identified as “cybersecurity,” as their focus is on the original program.

If higher education is to assume a role in educating cybersecurity professionals, well-understood curricular foundations are needed for institutions to use as models for designing and assessing programs. This includes models for integrating cybersecurity into existing disciplines and for viewing cybersecurity as its own discipline. These models must also accommodate the broad landscape that cybersecurity covers, and as such a one-size-fits-all approach is insufficient. Degree program variants of cybersecurity must be defined on overall educational objectives, and ultimately, a standard nomenclature of degree types and names needs to be developed—much like the NICE framework that provides a nomenclature of job categories on the workforce side of the equation. These program variants would share a common core, with different specializations based on discipline.

In this special issue of Computer, the guest editors seek to cover different approaches to creating effective curricular foundations for cybersecurity. Specific topics include but are not limited to the following:

  • Assessment of current practices in cybersecurity undergraduate education;
  • Historical surveys and evaluative comparisons among different curriculum models, as well as proposals to unify or standardize existing terminology and/or curriculum models;
  • Guidance for developing standalone cybersecurity programs, or for developing programs that conform to CSEC2017 or CAE;
  • Non-computing cybersecurity curricular foundations within programs; and
  • Differentiating between cybersecurity curricular foundations for the high school, 2- and 4-year college, and graduate levels.

Only submissions that describe previously unpublished, original, state-of-the-art research and that are not currently under review by a conference or journal will be considered. Extended versions of conference papers must be at least 30 percent different from the original conference work.

There is a strict 6,000-word limit (figures and tables are equivalent to 300 words each) for final manuscripts. Computer also caps references at 20. Authors should be aware that Computer cannot accept or process papers that exceed word count or reference limits.

Articles should be understandable by a broad audience of computer science and engineering professionals, avoiding a focus on theory, mathematics, jargon, and abstract concepts. All manuscripts are subject to peer review on both technical merit and relevance to Computer’s readership.

Accepted papers must be well written and understandable, as the level of editing will be a light copyedit. For accepted papers, authors will be required to provide electronic files for each figure according to the following guidelines: for graphs and charts, authors must submit them in their original editable source format (PDF, Visio, Excel, Word, PowerPoint, etc.); for screenshots or photographs, authors must submit high-resolution files (300 dpi or higher at the largest possible dimensions) in JPEG or TIFF formats.

Questions?
Please direct any questions about submissions to the guest editors (co-0319@computer.org):
Ann Sobel, Department of Computer Science and Software Engineering, Miami University (sobelae@miamioh.edu)
Allen Parrish, Office of Research and Economic Development/Department of Computer Science and Engineering, Mississippi State University, (aparrish@research.msstate.edu)
Rajendra K. Raj, Department of Computer Science, Rochester Institute of Technology (rkr@cs.rit.edu)

For author guidelines and information on how to submit a manuscript electronically, visit www.computer.org/web/peer-review/magazines.
For full paper submission, please visit mc.manuscriptcentral.com/com-cs.