{"id":"https://openalex.org/W4410986628","doi":"https://doi.org/10.1109/educon62633.2025.11016598","title":"Postgraduate Cybersecurity Education for Non-Specialist Professionals","display_name":"Postgraduate Cybersecurity Education for Non-Specialist Professionals","publication_year":2025,"publication_date":"2025-04-22","ids":{"openalex":"https://openalex.org/W4410986628","doi":"https://doi.org/10.1109/educon62633.2025.11016598"},"language":"en","primary_location":{"id":"doi:10.1109/educon62633.2025.11016598","is_oa":false,"landing_page_url":"https://doi.org/10.1109/educon62633.2025.11016598","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE Global Engineering Education Conference (EDUCON)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5043054372","display_name":"James H. Davenport","orcid":"https://orcid.org/0000-0002-3982-7545"},"institutions":[{"id":"https://openalex.org/I51601045","display_name":"University of Bath","ror":"https://ror.org/002h8g185","country_code":"GB","type":"education","lineage":["https://openalex.org/I51601045"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"James H. Davenport","raw_affiliation_strings":["University of Bath,Department of Computer Science,Bath,U.K.,BA2 7AY"],"raw_orcid":"https://orcid.org/0000-0002-3982-7545","affiliations":[{"raw_affiliation_string":"University of Bath,Department of Computer Science,Bath,U.K.,BA2 7AY","institution_ids":["https://openalex.org/I51601045"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030763134","display_name":"Tim French","orcid":"https://orcid.org/0000-0002-0748-8040"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Tim French","raw_affiliation_strings":["Founder, Fuji horizons UK,Luton,U.K.,LU2 7GJ"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Founder, Fuji horizons UK,Luton,U.K.,LU2 7GJ","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5043054372"],"corresponding_institution_ids":["https://openalex.org/I51601045"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.16854756,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9340000152587891,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5023753643035889},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.46838998794555664},{"id":"https://openalex.org/keywords/engineering-management","display_name":"Engineering management","score":0.3563661575317383},{"id":"https://openalex.org/keywords/medical-education","display_name":"Medical education","score":0.3344879746437073},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.24454742670059204},{"id":"https://openalex.org/keywords/medicine","display_name":"Medicine","score":0.08193981647491455}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5023753643035889},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.46838998794555664},{"id":"https://openalex.org/C110354214","wikidata":"https://www.wikidata.org/wiki/Q6314146","display_name":"Engineering management","level":1,"score":0.3563661575317383},{"id":"https://openalex.org/C509550671","wikidata":"https://www.wikidata.org/wiki/Q126945","display_name":"Medical education","level":1,"score":0.3344879746437073},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.24454742670059204},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.08193981647491455}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/educon62633.2025.11016598","is_oa":false,"landing_page_url":"https://doi.org/10.1109/educon62633.2025.11016598","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE Global Engineering Education Conference (EDUCON)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W43667552","https://openalex.org/W2094653601","https://openalex.org/W2137383679","https://openalex.org/W2150341374","https://openalex.org/W2896943399","https://openalex.org/W2915486754","https://openalex.org/W2940713590","https://openalex.org/W3038017244","https://openalex.org/W4376623567","https://openalex.org/W4376627133","https://openalex.org/W4376627249","https://openalex.org/W4385080277","https://openalex.org/W4385819523","https://openalex.org/W4385819544","https://openalex.org/W4392564553","https://openalex.org/W4405450590"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"This":[0],"paper":[1],"describes":[2],"the":[3,85,90,93,105,117,123],"authors'":[4,106,124],"experience":[5],"in":[6,22,71],"teaching":[7],"a":[8,19,36,64,76],"cybersecurity":[9],"module":[10],"as":[11],"part":[12],"of":[13,28,92],"general":[14],"MSc":[15,21,38,68],"courses,":[16],"rather":[17],"than":[18],"specialist":[20],"Cybersecurity.":[23],"There":[24,95],"are":[25,96],"three":[26],"variants":[27],"this":[29],"course":[30,70],"which":[31],"have":[32],"been":[33],"fully":[34],"delivered:":[35],"traditional":[37],"generalist":[39,69],"course,":[40],"fulltime":[41],"and":[42,99,104,119],"face-to-face,":[43],"largely":[44],"aimed":[45],"at":[46],"people":[47],"without":[48],"much":[49],"formal":[50],"Computer":[51,72],"Science":[52],"training;":[53],"an":[54],"MSc-level":[55],"degree":[56],"apprenticeship":[57],"for":[58,78,84,102],"those":[59],"sponsored":[60],"by":[61],"their":[62],"employers;":[63],"purely":[65],"on-line":[66],"part-time":[67],"Science.":[73],"In":[74],"addition":[75],"version":[77],"second-year":[79],"undergraduates":[80],"is":[81],"being":[82],"delivered":[83],"first":[86],"time,":[87],"overlapping":[88],"with":[89],"writing":[91],"paper.":[94],"numerous":[97],"comments":[98],"curriculum":[100],"suggestions":[101],"cybersecurity,":[103],"had":[107],"to":[108,116],"choose":[109],"what":[110,113,120],"was":[111],"relevant,":[112],"would":[114,121],"appeal":[115],"students,":[118],"leverage":[122],"strengths.":[125]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
