{"id":"https://openalex.org/W2928706969","doi":"https://doi.org/10.1109/mc.2018.2883567","title":"Cybersecurity Curricula 2017 and Boeing: Linking Curricular Guidance to Professional Practice","display_name":"Cybersecurity Curricula 2017 and Boeing: Linking Curricular Guidance to Professional Practice","publication_year":2019,"publication_date":"2019-03-01","ids":{"openalex":"https://openalex.org/W2928706969","doi":"https://doi.org/10.1109/mc.2018.2883567","mag":"2928706969"},"language":"en","primary_location":{"id":"doi:10.1109/mc.2018.2883567","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mc.2018.2883567","pdf_url":null,"source":{"id":"https://openalex.org/S178916657","display_name":"Computer","issn_l":"0018-9162","issn":["0018-9162","1558-0814"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048243555","display_name":"Diana Burley","orcid":"https://orcid.org/0000-0001-7263-9530"},"institutions":[{"id":"https://openalex.org/I193531525","display_name":"George Washington University","ror":"https://ror.org/00y4zzh67","country_code":"US","type":"education","lineage":["https://openalex.org/I193531525"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Diana L. Burley","raw_affiliation_strings":["Information Infrastructure Protection, The George Washington University, Washington, D.C., United States"],"affiliations":[{"raw_affiliation_string":"Information Infrastructure Protection, The George Washington University, Washington, D.C., United States","institution_ids":["https://openalex.org/I193531525"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113864864","display_name":"Alfred H. Lewis","orcid":null},"institutions":[{"id":"https://openalex.org/I1295339012","display_name":"Boeing (United States)","ror":"https://ror.org/04sm5zn07","country_code":"US","type":"company","lineage":["https://openalex.org/I1295339012"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Alfred H. Lewis","raw_affiliation_strings":["Cybersecurity Operations, Boeing Company, Herndon, Virginia United States"],"affiliations":[{"raw_affiliation_string":"Cybersecurity Operations, Boeing Company, Herndon, Virginia United States","institution_ids":["https://openalex.org/I1295339012"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5048243555"],"corresponding_institution_ids":["https://openalex.org/I193531525"],"apc_list":null,"apc_paid":null,"fwci":1.6957,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.87766054,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"52","issue":"3","first_page":"29","last_page":"37"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.951200008392334,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/workforce","display_name":"Workforce","score":0.7906476259231567},{"id":"https://openalex.org/keywords/economic-shortage","display_name":"Economic shortage","score":0.7651160359382629},{"id":"https://openalex.org/keywords/curriculum","display_name":"Curriculum","score":0.6535830497741699},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5615536570549011},{"id":"https://openalex.org/keywords/engineering-management","display_name":"Engineering management","score":0.48115718364715576},{"id":"https://openalex.org/keywords/workforce-development","display_name":"Workforce development","score":0.4754894971847534},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.42605340480804443},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.17740201950073242},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.14957892894744873},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.07845655083656311},{"id":"https://openalex.org/keywords/government","display_name":"Government (linguistics)","score":0.0708932876586914}],"concepts":[{"id":"https://openalex.org/C2778139618","wikidata":"https://www.wikidata.org/wiki/Q13440398","display_name":"Workforce","level":2,"score":0.7906476259231567},{"id":"https://openalex.org/C194051981","wikidata":"https://www.wikidata.org/wiki/Q1337691","display_name":"Economic shortage","level":3,"score":0.7651160359382629},{"id":"https://openalex.org/C47177190","wikidata":"https://www.wikidata.org/wiki/Q207137","display_name":"Curriculum","level":2,"score":0.6535830497741699},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5615536570549011},{"id":"https://openalex.org/C110354214","wikidata":"https://www.wikidata.org/wiki/Q6314146","display_name":"Engineering management","level":1,"score":0.48115718364715576},{"id":"https://openalex.org/C2779968149","wikidata":"https://www.wikidata.org/wiki/Q8034851","display_name":"Workforce development","level":3,"score":0.4754894971847534},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42605340480804443},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.17740201950073242},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.14957892894744873},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.07845655083656311},{"id":"https://openalex.org/C2778137410","wikidata":"https://www.wikidata.org/wiki/Q2732820","display_name":"Government (linguistics)","level":2,"score":0.0708932876586914},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mc.2018.2883567","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mc.2018.2883567","pdf_url":null,"source":{"id":"https://openalex.org/S178916657","display_name":"Computer","issn_l":"0018-9162","issn":["0018-9162","1558-0814"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G7819322008","display_name":null,"funder_award_id":"H98230-17-1-0219","funder_id":"https://openalex.org/F4320311089","funder_display_name":"National Security Agency"},{"id":"https://openalex.org/G8439904067","display_name":null,"funder_award_id":"1623104","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320307102","display_name":"Intel Corporation","ror":"https://ror.org/01ek73717"},{"id":"https://openalex.org/F4320311089","display_name":"National Security Agency","ror":"https://ror.org/0047bvr32"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2409086388","https://openalex.org/W3119366643","https://openalex.org/W1991687717","https://openalex.org/W2927589050","https://openalex.org/W2409569825","https://openalex.org/W4246010236","https://openalex.org/W4205279722","https://openalex.org/W3009734161"],"abstract_inverted_index":{"The":[0],"global":[1,25],"cybersecurity":[2,26,43],"workforce":[3,27],"shortage":[4],"is":[5],"one":[6],"of":[7,17],"the":[8,22],"world's":[9],"most":[10],"pressing":[11],"challenges.":[12],"With":[13],"an":[14],"estimated":[15],"shortfall":[16],"1.8":[18],"million":[19],"workers":[20],"by":[21],"year":[23],"2022,":[24],"needs":[28],"are":[29,35],"acute,":[30],"broad,":[31],"and":[32],"growing.":[33],"Employers":[34],"collaborating":[36],"with":[37],"academic":[38],"institutions":[39],"to":[40],"develop":[41],"robust":[42],"programs.":[44]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
