{"id":"https://openalex.org/W2927117308","doi":"https://doi.org/10.1109/mc.2019.2898240","title":"Curricular Foundations for Cybersecurity","display_name":"Curricular Foundations for Cybersecurity","publication_year":2019,"publication_date":"2019-03-01","ids":{"openalex":"https://openalex.org/W2927117308","doi":"https://doi.org/10.1109/mc.2019.2898240","mag":"2927117308"},"language":"en","primary_location":{"id":"doi:10.1109/mc.2019.2898240","is_oa":true,"landing_page_url":"https://doi.org/10.1109/mc.2019.2898240","pdf_url":"https://ieeexplore.ieee.org/ielx7/2/8677309/08677331.pdf","source":{"id":"https://openalex.org/S178916657","display_name":"Computer","issn_l":"0018-9162","issn":["0018-9162","1558-0814"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://ieeexplore.ieee.org/ielx7/2/8677309/08677331.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5086388086","display_name":"Ann E. Kelley Sobel","orcid":"https://orcid.org/0000-0001-7272-1227"},"institutions":[{"id":"https://openalex.org/I83328450","display_name":"Miami University","ror":"https://ror.org/05nbqxr67","country_code":"US","type":"education","lineage":["https://openalex.org/I83328450"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ann Sobel","raw_affiliation_strings":["Miami University of Ohio, United States"],"affiliations":[{"raw_affiliation_string":"Miami University of Ohio, United States","institution_ids":["https://openalex.org/I83328450"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110336376","display_name":"Allen Parrish","orcid":null},"institutions":[{"id":"https://openalex.org/I99041443","display_name":"Mississippi State University","ror":"https://ror.org/0432jq872","country_code":"US","type":"education","lineage":["https://openalex.org/I4210141039","https://openalex.org/I99041443"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Allen Parrish","raw_affiliation_strings":["Mississippi State University, United States"],"affiliations":[{"raw_affiliation_string":"Mississippi State University, United States","institution_ids":["https://openalex.org/I99041443"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039893757","display_name":"Rajendra K. Raj","orcid":"https://orcid.org/0000-0003-2378-1068"},"institutions":[{"id":"https://openalex.org/I155173764","display_name":"Rochester Institute of Technology","ror":"https://ror.org/00v4yb702","country_code":"US","type":"education","lineage":["https://openalex.org/I155173764"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Rajendra K. Raj","raw_affiliation_strings":["Rochester Institute of Technology"],"affiliations":[{"raw_affiliation_string":"Rochester Institute of Technology","institution_ids":["https://openalex.org/I155173764"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5086388086"],"corresponding_institution_ids":["https://openalex.org/I83328450"],"apc_list":null,"apc_paid":null,"fwci":1.3566,"has_fulltext":true,"cited_by_count":7,"citation_normalized_percentile":{"value":0.85451978,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"52","issue":"3","first_page":"14","last_page":"17"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.946399986743927,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7327476143836975},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6897741556167603},{"id":"https://openalex.org/keywords/engineering-management","display_name":"Engineering management","score":0.3855651319026947},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1029539406299591}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7327476143836975},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6897741556167603},{"id":"https://openalex.org/C110354214","wikidata":"https://www.wikidata.org/wiki/Q6314146","display_name":"Engineering management","level":1,"score":0.3855651319026947},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1029539406299591}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mc.2019.2898240","is_oa":true,"landing_page_url":"https://doi.org/10.1109/mc.2019.2898240","pdf_url":"https://ieeexplore.ieee.org/ielx7/2/8677309/08677331.pdf","source":{"id":"https://openalex.org/S178916657","display_name":"Computer","issn_l":"0018-9162","issn":["0018-9162","1558-0814"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1109/mc.2019.2898240","is_oa":true,"landing_page_url":"https://doi.org/10.1109/mc.2019.2898240","pdf_url":"https://ieeexplore.ieee.org/ielx7/2/8677309/08677331.pdf","source":{"id":"https://openalex.org/S178916657","display_name":"Computer","issn_l":"0018-9162","issn":["0018-9162","1558-0814"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2927117308.pdf","grobid_xml":"https://content.openalex.org/works/W2927117308.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2478288626","https://openalex.org/W2350741829","https://openalex.org/W2530322880","https://openalex.org/W1596801655"],"abstract_inverted_index":{"Cybersecurity":[0],"has":[1,19],"emerged":[2],"at":[3],"the":[4,11,23,26,29,48,57,60],"center":[5],"of":[6,25,31,59],"several":[7],"international":[8],"crises,":[9],"and":[10,28],"demand":[12],"for":[13],"well-educated":[14],"professionals":[15],"in":[16],"this":[17],"area":[18,27],"rapidly":[20],"escalated.":[21],"Given":[22],"newness":[24],"lack":[30],"curricular":[32,62],"consensus":[33],"about":[34],"cybersecurity,":[35],"education":[36,50],"providers":[37],"have":[38],"struggled":[39],"to":[40],"keep":[41],"up.":[42],"More":[43],"engagement":[44],"is":[45],"needed":[46],"from":[47],"cybersecurity":[49],"community,":[51],"but":[52],"recent":[53],"developments,":[54],"such":[55],"as":[56],"release":[58],"CSEC2017":[61],"guidelines,":[63],"are":[64],"promising.":[65]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
