Innovative Legitimate Non-Traditional Doctorate Programs in Cybersecurity, Engineering, and Technology

Innovative Legitimate Non-Traditional Doctorate Programs in Cybersecurity, Engineering, and Technology

Darrell Norman Burrell, Calvin Nobles, Maurice Dawson, Eugene J. M. Lewis, S. Raschid Muller, Kevin Richardson, Amalisha S. Aridi
DOI: 10.4018/978-1-7998-9430-8.ch009
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

According to the US Federal Bureau of Investigations (FBI) the number of complaints about cyberattacks to their cyber division is up to as many as 4,000 a day. Every year in the U.S., 40,000 jobs for information security analysts go unfilled, and employers are struggling to fill 200,000 other cybersecurity-related roles. Colleges and universities have created certificate, undergraduate, and graduate programs to train professionals in these job roles. The challenge to meeting the cybersecurity workforce shortage through degree programs is intensified by the reality of the limited number of cybersecurity and engineering faculty at colleges and universities. This chapter explores the essential need to develop more doctorate faculty in technology-related areas and explains some unique and non-traditional paths to doctoral completion that allow professionals with significant real-world work experience to complete a doctorate without career interruption and relocation from highly respected and established universities in the US and the UK.
Chapter Preview
Top

Introduction

According to the US Federal Bureau of Investigations ([FBI] 2021) the number of complaints about cyberattacks to their Cyber Division is up to as many as 4,000 a day. That represents 400% increase (FBI, 2021). The hack that took down the largest fuel pipeline in the U.S. and led to shortages across the East Coast was the result of a single compromised password, according to a cybersecurity consultant who responded to the attack (FBI, 2021). According to Newman (2016), the cybersecurity threat landscape is continually evolving as malicious cyber actors pursue new vectors to target and capitalize on newly discovered or known vulnerabilities. In 2017 a hacking group known as the Shadow Brokers, claiming to have breached the NSA-linked operation known as the Equation Group. The Shadow Brokers provided samples of the stolen data and attempted to auction off other stolen data (Newman, 2017).

In May of 2017, a strain ransomware virus call WannaCry attacked a series of public and private organizations including temporarily crippling technology-driven operations of several hospitals and medical facilities in the United Kingdom (Newman, 2017). In 2017 there where new revelations about hacking vulnerabilities cell phones, Windows, and the ability to turn some smart TVs into listening devices (Newman, 2017). The top industries targeted by cybercriminals are (1) healthcare, (2) manufacturing, (3) financial services, (4) government, and (5) transportation (Morgan, 2016). These industries are targeted for sensitive information primarily in the healthcare and financial services sectors. Researchers are forecasting the global cost of cybercrime in 2019 to reach over 2 trillion dollars (Morgan, 2016).

The global cybersecurity workforce will have more than 1.5 million unfilled positions by 2020 (Van- Zadelhoff, 2016). Every year in the U.S., 40,000 jobs for information security analysts go unfilled, and employers are struggling to fill 200,000 other cyber-security related roles (Kauflin, 2017). Threats of cyber-attacks have spurred global interest in protecting digital property from external intrusions. The identified risks to American private and public entities were part of an ongoing scenario that placed specific importance on secure, internal, cyber information (Pierce, 2016; Stevenson, 2017). This importance came about because many in the business market had echoed the need for a skilled workforce within cybersecurity, and numerous efforts were made to address those concerns (Pierce, 2016; Stevenson, 2017).

The need for cybersecurity was spearheaded by the rise in cybercrime (Pierce, 2016; Stevenson, 2017). Newman (2017) described cybercrime as the use of communication and information technologies to carry on illegal activity. Cybercrime activity was conducted with the utilization of devices including television, cellular phones, radios, computers, networks, or communication application (Newman, 2017). Newman (2017) noted that cybercrime was widespread and was not limited to petty and small crimes. Morgan (2016) and Newman (2017) indicated that cyber-attacks and malicious hackers have increased with multiple large corporations becoming victims of data breaches. Morgan (2016) noted firms were growing more dependent on cyber connectivity to remain relevant in an increasingly global market, and this has left many of them vulnerable. American organizations made changes to their IT infrastructure to deflect the onset of external threats from cybercriminals as they continued to grow (Van- Zadelhoff, 2016). Newman (2017) identified the cyber-attacks came from multiple sources with a variety of agendas. Newman (2017) noted the cyber threats were distinguished by intent and motivation of the attacker.

Key Terms in this Chapter

All but Dissertation (ABD): High-quality doctorate programs require the completion of a dissertation to earn your doctoral degree. ABD means you have completed all the necessary doctorate coursework but have not written and defended your dissertation. ABD doesn’t hold academic weight, and you can’t be called a doctor until you finish your dissertation. According to the Council of Graduate Schools, almost 50% of students who start a Ph.D. program don’t complete their degree. However, Ph.D. programs only represent one type of doctoral degree. Completion stats vary widely between universities and doctoral degree programs. The most significant difference in completing a doctoral degree is often the university and program a student chooses. If you’re ABD, you need to find a student-centered program designed to meet the needs of ABD students.

Dissertation Chair: A dissertation chair is a judge, an assessor of your work who ensures that a student meets personal, departmental, university, and even universal standards. The chair provides feedback on the research approach and dissertation chapters as the study are developed.

Time to Completion: European Ph.D. programs are shorter than those in the US. For example, it takes three years to complete a Ph.D. in France, Norway, the UK, and Germany. Across Europe, a three-to-four-year Ph.D. is standard. To be successful in a European style Ph.D., you must have a firm understanding of various research methods and how to execute them in a study. In comparison, six years is the average time to degree in the US because US doctoral programs often require 12 to 16 courses with classmates that include teaching students research methods and then dissertation research. In contrast, European doctorates require a research proposal course and then independent research on the dissertation as the doctoral experience.

Complete Chapter List

Search this Book:
Reset