{"id":"https://openalex.org/W4400410765","doi":"https://doi.org/10.1109/educon60312.2024.10578783","title":"Assessing the Consistency of Cyber Security Education","display_name":"Assessing the Consistency of Cyber Security Education","publication_year":2024,"publication_date":"2024-05-08","ids":{"openalex":"https://openalex.org/W4400410765","doi":"https://doi.org/10.1109/educon60312.2024.10578783"},"language":"en","primary_location":{"id":"doi:10.1109/educon60312.2024.10578783","is_oa":false,"landing_page_url":"https://doi.org/10.1109/educon60312.2024.10578783","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE Global Engineering Education Conference (EDUCON)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5033160778","display_name":"Steven Furnell","orcid":"https://orcid.org/0000-0003-0984-7542"},"institutions":[{"id":"https://openalex.org/I142263535","display_name":"University of Nottingham","ror":"https://ror.org/01ee9ar58","country_code":"GB","type":"education","lineage":["https://openalex.org/I142263535"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Steven Furnell","raw_affiliation_strings":["School of Computer Science, University of Nottingham,Notingham,UK"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, University of Nottingham,Notingham,UK","institution_ids":["https://openalex.org/I142263535"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5032212838","display_name":"Eliana Stavrou","orcid":"https://orcid.org/0000-0003-4040-4942"},"institutions":[{"id":"https://openalex.org/I59746437","display_name":"Open University of Cyprus","ror":"https://ror.org/033sm2k57","country_code":"CY","type":"education","lineage":["https://openalex.org/I59746437"]}],"countries":["CY"],"is_corresponding":false,"raw_author_name":"Eliana Stavrou","raw_affiliation_strings":["Open University of Cyprus,Faculty of Pure and Applied Sciences,Nicosia,Cyprus"],"affiliations":[{"raw_affiliation_string":"Open University of Cyprus,Faculty of Pure and Applied Sciences,Nicosia,Cyprus","institution_ids":["https://openalex.org/I59746437"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5033160778"],"corresponding_institution_ids":["https://openalex.org/I142263535"],"apc_list":null,"apc_paid":null,"fwci":2.4426,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.90711404,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.979200005531311,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.979200005531311,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/consistency","display_name":"Consistency (knowledge bases)","score":0.6621708273887634},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6255955696105957},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5684417486190796},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1346297562122345}],"concepts":[{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.6621708273887634},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6255955696105957},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5684417486190796},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1346297562122345}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/educon60312.2024.10578783","is_oa":false,"landing_page_url":"https://doi.org/10.1109/educon60312.2024.10578783","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE Global Engineering Education Conference (EDUCON)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W3084472358","https://openalex.org/W4385256125","https://openalex.org/W4388049971"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W2382290278","https://openalex.org/W4395014643"],"abstract_inverted_index":{"Cyber":[0,94],"security":[1,48],"is":[2,141],"now":[3],"a":[4,49,57,106,178],"well-established":[5],"topic":[6,35,122,153],"in":[7,112,143,150,177],"higher":[8],"education":[9],"contexts":[10],"internationally.":[11],"However,":[12,105],"while":[13],"numerous":[14],"qualifications":[15],"are":[16,91,99],"available":[17],"at":[18],"undergraduate":[19],"and":[20,30,96,120,124,127,155,175],"postgraduate":[21,87],"levels,":[22],"it":[23],"can":[24,172],"be":[25,173],"challenging":[26],"for":[27],"prospective":[28],"students":[29],"employers":[31],"to":[32,55,145,164,189],"understand":[33],"the":[34,40,66,77,83,102,113,125,131,138,148,152,156,167,186],"coverage":[36],"that":[37],"sits":[38],"under":[39],"degree":[41,88],"title":[42],"(and":[43],"what":[44],"aspects":[45],"of":[46,63,82,85,118,137,170],"cyber":[47,119,132],"graduate":[50],"will":[51],"have":[52],"been":[53],"exposed":[54],"as":[56],"result).":[58],"Following":[59],"an":[60,80],"initial":[61],"illustration":[62],"how":[64,166],"even":[65],"term":[67],"\u2018cyber":[68],"security\u2019":[69],"itself":[70],"has":[71],"varying":[72],"interpretations,":[73],"this":[74],"paper":[75],"evidences":[76],"challenge":[78],"through":[79],"examination":[81],"content":[84,136,169],"ten":[86],"programmes.":[89],"All":[90],"titled":[92],"\u2018MSc":[93],"Security\u2019":[95],"thus":[97],"all":[98],"ostensibly":[100],"addressing":[101],"same":[103],"topic.":[104],"syllabus-level":[107],"assessment":[108],"reveals":[109],"considerable":[110],"differences":[111],"programme":[114],"composition":[115],"(in":[116],"terms":[117],"non-cyber":[121],"coverage,":[123],"technical":[126,135],"non-technical":[128],"split":[129],"within":[130],"material).":[133],"The":[134,160],"candidate":[139],"programmes":[140,171],"compared":[142,176],"order":[144],"further":[146],"demonstrate":[147],"difference":[149],"both":[151],"emphasis":[154],"resulting":[157],"student":[158],"experience.":[159],"discussion":[161],"then":[162],"proceeds":[163],"consider":[165],"actual":[168],"communicated":[174],"more":[179],"informative":[180],"manner,":[181],"using":[182],"mock-ups":[183],"based":[184],"on":[185],"earlier":[187],"metrics":[188],"illustrate":[190],"potential":[191],"approaches.":[192]},"counts_by_year":[{"year":2025,"cited_by_count":3}],"updated_date":"2025-12-26T23:08:49.675405","created_date":"2025-10-10T00:00:00"}
