Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 1 |
| Since 2007 (last 20 years) | 1 |
Descriptor
| Basic Skills | 1 |
| Computer Security | 1 |
| Delphi Technique | 1 |
| Difficulty Level | 1 |
| Educational Needs | 1 |
| Fundamental Concepts | 1 |
| Graduation Requirements | 1 |
| Higher Education | 1 |
| Information Security | 1 |
| Likert Scales | 1 |
| Needs Assessment | 1 |
| More ▼ | |
Author
| DeLatte, David | 1 |
| Herman, Geoffrey L. | 1 |
| Oliva, Linda | 1 |
| Parekh, Geet | 1 |
| Phatak, Dhananjay | 1 |
| Scheponik, Travis | 1 |
| Sherman, Alan T. | 1 |
Publication Type
| Journal Articles | 1 |
| Reports - Research | 1 |
Education Level
| Higher Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Parekh, Geet; DeLatte, David; Herman, Geoffrey L.; Oliva, Linda; Phatak, Dhananjay; Scheponik, Travis; Sherman, Alan T. – IEEE Transactions on Education, 2018
This paper presents and analyzes results of two Delphi processes that polled cybersecurity experts to rate cybersecurity topics based on importance, difficulty, and timelessness. These ratings can be used to identify core concepts--cross-cutting ideas that connect knowledge in the discipline. The first Delphi process identified core concepts that…
Descriptors: Delphi Technique, Specialists, Fundamental Concepts, Computer Security

Peer reviewed
Direct link
