skip to main content
10.1145/2656450.2656453acmconferencesArticle/Chapter ViewAbstractPublication PagesiteConference Proceedingsconference-collections
research-article

Designing a graduate program in information security and analytics: masters program in information security and analytics (MISA)

Published:14 October 2014Publication History

ABSTRACT

This paper introduces the concept of the Master of Information Security and Analytics (MISA) program for the graduate students with a background in CS, IS and IT. The 10-course graduate level program is benchmarked against existing masters programs in the areas of Information Security and Data Analytics, and an assessment was done on the estimated demand for MISA graduates in the nation. The program outcomes were then mapped against the course objectives to insure the correct mix of courses and topics. The program's admission requirement is also being discussed. This paper discusses the design process and possible ways to reduce risk in the start-up of a new degree program. How a program is marketed to prospective students and what program graduates will do after program completion is just as important as the initial design of the program. Planning for the administration of the program and the assessment process is an important phase of the initial design.

References

  1. University of Maryland Cybersecurity Program. Retrieved May 26, 2014 from http://cyber.umd.edu/education/meng-cybersecurityGoogle ScholarGoogle Scholar
  2. Virginia College Online Programs. Retrieved May 26, 2014 from htttp://www.vconline.edu/graduate-degrees-online/cyber-security-degree.cfmGoogle ScholarGoogle Scholar
  3. Washington Governor's University. Retrieved May 16 2014 from http://washington.wgu.edu/online_it_degrees/information_s ecurity_assurance_degreeGoogle ScholarGoogle Scholar
  4. Utica College Cyber Security -- Intelligence and Forensics. Retrieved May 26, 2014 from http://programs.online.utica.edu/programs/masters-cybersecurity.aspGoogle ScholarGoogle Scholar
  5. NJIT MS Cybersecruity Program. Retrieved May 26, 2014 from http://cs.njit.edu/academics/graduate/mscsp.phpGoogle ScholarGoogle Scholar
  6. Department of Computer Science, George Washington University. Retrieved May 16, 2014 from http://www.cs.gwu.edu/academics/graduate_programs/master/cybersecurityGoogle ScholarGoogle Scholar
  7. Master of Science in Cyber Security and Leadership Curriculum UWT. Retrieved May 31, 2014 from https://www.tacoma.uw.edu/institute-technology/master-cybersecurity-leadership-curriculuGoogle ScholarGoogle Scholar
  8. Master of Arts in Intelligence Studies, American Military University. Retrieved May 316, 2014 from http://www.amu.apus.edu/academic/programs/degree/1604/master-of-science-in-cybersecurity-studiesGoogle ScholarGoogle Scholar
  9. Bureau of Labor Statistics, Retrieved May 2014 from http://www.bls.gov/news.release/empsit.nr0.htmGoogle ScholarGoogle Scholar
  10. McKinsey Global Institute, Retrieved May 2014 from www.mckinsey.com/insights/americas/us_game_changersGoogle ScholarGoogle Scholar
  11. Dept. of Labor Cybersecurity jobs statistics Retrieved April 30, 2014 from http://www.umuc.edu/cybersecurity/careers/Google ScholarGoogle Scholar
  12. Wall street Journal Report retrieved May 2014 from http://blogs.wsj.com/cio/2013/03/04/demand-for-cyber-security-jobs-is-soaring/Google ScholarGoogle Scholar
  13. Petrova, K., Kaskenpalo, P., Philpott, A., Buchan, J., Enbedding Information Security Curricula in Existing Programmes. In InforSecCD Conference '04, pages 20--29 Kennesaw GA, USA, 2005. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Bacon, T., Tikekar, R., Experiences With Developing A Computer Security Information Assurance Curriculum, In Consortium for Computing in Small Colleges, 2003, 254--267. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Taylor, C., Ednicott-Popovsky, B., Phillips, A.,Forensics Education: Assessment and Measures of nd Workshop on Systematic Approaches to Digital Forensic Engineering, Seattle WA, USA April 10--12, 2007 IEEE Computer Society Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. R.H. L. Chiang, P. Goes, and E.A. Stohr, "Business Intelligence and Analytics Education, and Program Development: A Unique Opportunity for the Information Systems Discipline, ACM Transactions on Management Information Systems (TMIS), Volume 3 Issue 3, October 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. P.J. Piety, D.T. Hickey and M. J. Bishop, "Educational data sciences: framing emergent practices for analytics of learning, organizations, and systems", Proceedings of the Fourth International Conference on Learning Analytics And Knowledge, March 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. P. Anderson, J. Bowring, R. McCauley, G. Pothering and C. Starr, "An undergraduate degree in data science: curriculum and a decade of Implementation experience", Proceedings of the 45th ACM technical symposium on Computer science Education, March 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Survey of Analytics Programs. Retrieved on May 28 2014 from http://analytics.ncsu.edu/?page_id=4184Google ScholarGoogle Scholar
  20. Suskie, L. "Assessing student learning: A common sense guide". Anker Publishing Company, Inc. Boston, Massachusetts: 2004Google ScholarGoogle Scholar
  21. Big Data Initiative. Retrieved on May 29 2014 from http://www.whitehouse.gov/blog/2013/04/18/unleashing-power-big-data.Google ScholarGoogle Scholar
  22. National Centers of Academic Excellence, Retrieved On May 25 2014 from http://niccs.us- cert.gov/education/national-centers-academic-excellence-caeGoogle ScholarGoogle Scholar

Index Terms

  1. Designing a graduate program in information security and analytics: masters program in information security and analytics (MISA)

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          SIGITE '14: Proceedings of the 15th Annual Conference on Information technology education
          October 2014
          190 pages
          ISBN:9781450326865
          DOI:10.1145/2656450

          Copyright © 2014 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 14 October 2014

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          SIGITE '14 Paper Acceptance Rate28of60submissions,47%Overall Acceptance Rate176of429submissions,41%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader