What is Information Technology's Role in Cybersecurity?

被引:0
|
作者
Blair, Jean [1 ]
Sobiesk, Edward [1 ]
Ekstrom, Joseph J. [2 ]
Parrish, Allen [3 ]
机构
[1] US Mil Acad, West Point, NY 10996 USA
[2] Brigham Young Univ, Provo, UT 84602 USA
[3] US Naval Acad, Annapolis, MD 21402 USA
关键词
Cybersecurity roles; multi-discipline cybersecurity education;
D O I
10.1145/2978192.2978208
中图分类号
G40 [教育学];
学科分类号
040101 ; 120403 ;
摘要
This panel will discuss and debate what role(s) the information technology discipline should have in cybersecurity. Diverse viewpoints will be considered including current and potential ACM curricular recommendations, current and potential ABET and NSA accreditation criteria, the emerging cybersecurity discipline(s), consideration of government frameworks, the need for a multi-disciplinary approach to cybersecurity, and what aspects of cybersecurity should be under information technology's purview.
引用
收藏
页码:46 / 47
页数:2
相关论文
共 50 条
  • [1] Information Technology Governance: The Role of Board of Directors in Cybersecurity Oversight
    Al-Sartawi, Abdalmuttaleb
    PROCEEDINGS OF THE 18TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2019), 2019, : 15 - 21
  • [2] Cybersecurity Breaches and the Role of Information Technology Governance in Audit Committee Charters
    Lankton, Nancy
    Price, Jean B.
    Karim, Mohammad
    JOURNAL OF INFORMATION SYSTEMS, 2021, 35 (01) : 101 - 119
  • [3] Caregivers' Role in Cybersecurity for Aging Information Technology Users with Intellectual Disability
    Rocheleau, Jessica N.
    Chalghoumi, Hajer
    Jutai, Jeffrey
    Farrell, Susan
    Lachapelle, Yves
    Cobigo, Virginie
    CYBERPSYCHOLOGY BEHAVIOR AND SOCIAL NETWORKING, 2021, 24 (09) : 624 - 629
  • [4] Cybersecurity and information security - what goes where?
    von Solms, Basie
    von Solms, Rossouw
    INFORMATION AND COMPUTER SECURITY, 2018, 26 (01) : 2 - 9
  • [5] Editorial: What is IT/S? Information technology in business
    Human Systems Management, 18 (01):
  • [6] Information technology governance and cybersecurity at the board level
    Al-Sartawi, Abdalmuttaleb M. A. Musleh
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURES, 2020, 16 (02) : 150 - 161
  • [7] Survey of AI in Cybersecurity for Information Technology Management
    Chan, Leong
    Morgan, Ian
    Simon, Hayden
    Alshabanat, Fares
    Ober, Devin
    Gentry, James
    Min, David
    Cao, Renzhi
    2019 IEEE TECHNOLOGY & ENGINEERING MANAGEMENT CONFERENCE (TEMSCON), 2019,
  • [8] What are Information Technology's Key Qualifications?
    Doerge, Christina
    Schulte, Carsten
    ITICSE '08: PROCEEDINGS OF THE 13TH ANNUAL CONFERENCE ON INNOVATION AND TECHNOLOGY IN COMPUTER SCIENCE EDUCATION, 2008, : 296 - 300
  • [9] What's in a Name? Metaphors and Cybersecurity
    Branch, Jordan
    INTERNATIONAL ORGANIZATION, 2021, 75 (01) : 39 - 70
  • [10] What's New in the Economics of Cybersecurity?
    Felici, Massimo
    Wainwright, Nick
    Cavallini, Simona
    Bisogni, Fabio
    IEEE SECURITY & PRIVACY, 2016, 14 (03) : 11 - 13