ABSTRACT
This paper introduces the concept of the Master of Information Security and Analytics (MISA) program for the graduate students with a background in CS, IS and IT. The 10-course graduate level program is benchmarked against existing masters programs in the areas of Information Security and Data Analytics, and an assessment was done on the estimated demand for MISA graduates in the nation. The program outcomes were then mapped against the course objectives to insure the correct mix of courses and topics. The program's admission requirement is also being discussed. This paper discusses the design process and possible ways to reduce risk in the start-up of a new degree program. How a program is marketed to prospective students and what program graduates will do after program completion is just as important as the initial design of the program. Planning for the administration of the program and the assessment process is an important phase of the initial design.
- University of Maryland Cybersecurity Program. Retrieved May 26, 2014 from http://cyber.umd.edu/education/meng-cybersecurityGoogle Scholar
- Virginia College Online Programs. Retrieved May 26, 2014 from htttp://www.vconline.edu/graduate-degrees-online/cyber-security-degree.cfmGoogle Scholar
- Washington Governor's University. Retrieved May 16 2014 from http://washington.wgu.edu/online_it_degrees/information_s ecurity_assurance_degreeGoogle Scholar
- Utica College Cyber Security -- Intelligence and Forensics. Retrieved May 26, 2014 from http://programs.online.utica.edu/programs/masters-cybersecurity.aspGoogle Scholar
- NJIT MS Cybersecruity Program. Retrieved May 26, 2014 from http://cs.njit.edu/academics/graduate/mscsp.phpGoogle Scholar
- Department of Computer Science, George Washington University. Retrieved May 16, 2014 from http://www.cs.gwu.edu/academics/graduate_programs/master/cybersecurityGoogle Scholar
- Master of Science in Cyber Security and Leadership Curriculum UWT. Retrieved May 31, 2014 from https://www.tacoma.uw.edu/institute-technology/master-cybersecurity-leadership-curriculuGoogle Scholar
- Master of Arts in Intelligence Studies, American Military University. Retrieved May 316, 2014 from http://www.amu.apus.edu/academic/programs/degree/1604/master-of-science-in-cybersecurity-studiesGoogle Scholar
- Bureau of Labor Statistics, Retrieved May 2014 from http://www.bls.gov/news.release/empsit.nr0.htmGoogle Scholar
- McKinsey Global Institute, Retrieved May 2014 from www.mckinsey.com/insights/americas/us_game_changersGoogle Scholar
- Dept. of Labor Cybersecurity jobs statistics Retrieved April 30, 2014 from http://www.umuc.edu/cybersecurity/careers/Google Scholar
- Wall street Journal Report retrieved May 2014 from http://blogs.wsj.com/cio/2013/03/04/demand-for-cyber-security-jobs-is-soaring/Google Scholar
- Petrova, K., Kaskenpalo, P., Philpott, A., Buchan, J., Enbedding Information Security Curricula in Existing Programmes. In InforSecCD Conference '04, pages 20--29 Kennesaw GA, USA, 2005. ACM Press. Google ScholarDigital Library
- Bacon, T., Tikekar, R., Experiences With Developing A Computer Security Information Assurance Curriculum, In Consortium for Computing in Small Colleges, 2003, 254--267. Google ScholarDigital Library
- Taylor, C., Ednicott-Popovsky, B., Phillips, A.,Forensics Education: Assessment and Measures of nd Workshop on Systematic Approaches to Digital Forensic Engineering, Seattle WA, USA April 10--12, 2007 IEEE Computer Society Google ScholarDigital Library
- R.H. L. Chiang, P. Goes, and E.A. Stohr, "Business Intelligence and Analytics Education, and Program Development: A Unique Opportunity for the Information Systems Discipline, ACM Transactions on Management Information Systems (TMIS), Volume 3 Issue 3, October 2012. Google ScholarDigital Library
- P.J. Piety, D.T. Hickey and M. J. Bishop, "Educational data sciences: framing emergent practices for analytics of learning, organizations, and systems", Proceedings of the Fourth International Conference on Learning Analytics And Knowledge, March 2014. Google ScholarDigital Library
- P. Anderson, J. Bowring, R. McCauley, G. Pothering and C. Starr, "An undergraduate degree in data science: curriculum and a decade of Implementation experience", Proceedings of the 45th ACM technical symposium on Computer science Education, March 2014. Google ScholarDigital Library
- Survey of Analytics Programs. Retrieved on May 28 2014 from http://analytics.ncsu.edu/?page_id=4184Google Scholar
- Suskie, L. "Assessing student learning: A common sense guide". Anker Publishing Company, Inc. Boston, Massachusetts: 2004Google Scholar
- Big Data Initiative. Retrieved on May 29 2014 from http://www.whitehouse.gov/blog/2013/04/18/unleashing-power-big-data.Google Scholar
- National Centers of Academic Excellence, Retrieved On May 25 2014 from http://niccs.us- cert.gov/education/national-centers-academic-excellence-caeGoogle Scholar
Index Terms
- Designing a graduate program in information security and analytics: masters program in information security and analytics (MISA)
Recommendations
Designing a masters program in cybersecurity and leadership
SIGITE '12: Proceedings of the 13th annual conference on Information technology educationThe Master of Cybersecurity and Leadership (MCL) taught at the University of Washington Tacoma is a partnership between the Institute of Technology and the Milgard School of Business. The 10-course graduate level program was initially benchmarked ...
Preparing the new information technology professional in Virginia
CITC4 '03: Proceedings of the 4th conference on Information technology curriculumCurrent demands for graduates of Information Technology (IT) programs require that they possess deep technical skills, multidisciplinary awareness, and the ability to deliver the value of technical skills to customers and clients. In order to produce ...
Designing a graduate Capstone course for an online information assurance program
InfoSecCD '10: 2010 Information Security Curriculum Development ConferenceMany of the Information Assurance programs are looking for ways to improve their programs and incorporate assessment into the program. One way to do this is to add a capstone course at the end of the program. A well designed capstone course can allow ...
Comments