Advertisement

Education in Cyber Security

  • Greg Austin
Chapter
Part of the SpringerBriefs in Cybersecurity book series (BRIEFSCYBER)

Abstract

This chapter sketches the terrain of China’s university-level education in the cybersecurity sector. The chapter also looks briefly at the impact of an internationally mobile work force on China’s talent development.

Keywords

Education policy University curricula Engineering Repression in universities Education reform Discipline dominance Cyber skills arms race University rankings Professional associations Skills deficit 

References

  1. ATIP (2015) ATIP: cybersecurity research in China. Alberquerque NM. Sponsored by the United States government. www.dtic.mil/get-tr-doc/pdf?AD=ADA619229
  2. Austin G (2014) Cyber policy in China. Polity, Cambridge UKGoogle Scholar
  3. Austin G (2017) Human capital for cyber security: the Australian case. Briefing Paper #2. Australian Centre for Cyber Security. University of New South Wales Canberra. https://unsw.adfa.edu.au/australian-centre-for-cyber-security/sites/accs/files/uploads/Briefing%20Paper%232.pdf
  4. Austin G, Zu H (2018) Cyber security education in China: An overview of selected universities. Discussion Brief #4. Australian Centre for Cyber Security. University of New South WalesGoogle Scholar
  5. CAC (2016) Suggestions on strengthening the construction of cyber security discipline and personnel training. Cyberspace Administration of China. In Chinese. 8 July 2016. http://www.most.gov.cn/tztg/201607/t20160708_126464.htm
  6. CAC and MoE (2017) Management method of construction and demonstration project of first-class cyber security institutions. In Chinese. Issued by the Secretariat of Office of the Central Leading Group for Cyberspace affairs and the Ministry of Education 8 Aug 2017. http://www.moe.gov.cn/srcsite/A16/s3342/201708/t20170815_311176.html
  7. Chen H, Maynard SB, Ahmad A (2013) A comparison of information security curricula in China and the USA. Edith Cowan University Research Online. http://ro.ecu.edu.au/cgi/viewcontent.cgi?article-1152&context+ism
  8. ComputerworldHK (2009) ISACA expands into China. Computerworld.com. 24 Nov 2009. https://www.cw.com.hk/it-leadership/isaca-expands-into-china
  9. Conklin W, Cline R, Roosa T (2014) Re-engineering cybersecurity education in the US: an analysis of the critical factors. 2014 47th Hawaii International Conference on System Sciences. http://ieeexplore.ieee.org/stamp/stamp.jsp?reload=true&arnumber=6758852
  10. CUAA (2017) Alumni Association 2017 China University new discipline rankings. Chinese University Alumni Association. 18 Aug 2017. www.cuaa.net/paihang/news/news.jsp?information_id=133226
  11. Feng D, Ling D, Yung M (eds) (2005) Information security and cryptology: first SKLOIS conference, CISC 2005, Beijing, China, 15–17 Dec 2005. Proceedings. Springer Science & Business Media, BerlinGoogle Scholar
  12. Hartson HR (1983) Teaching protection in computing: a research-oriented graduate course. Comput Secur 2(3):248–255CrossRefGoogle Scholar
  13. Hong Yu (2017) Reading the 13th five-year plan: reflections on China’s ICT policy. Int J Commun 11(2017):1755–1774Google Scholar
  14. Hui Z, Tan Q (2016) Cyberspace security in the era of data economy: global and chinese contexts. In: Hui Z, Tan Q (eds) Annual report on development of cyberspace security in China. Social Sciences Academy Press. Blue Book, Beijing. pp 1–16 (In Chinese)Google Scholar
  15. Kim D, Song Q, Liu J, Liu Q, Grimm A (2017) Building world class universities in China: exploring faculty’s perceptions, interpretations of and struggles with global forces in higher education. Compare: J Comp Int Educ 1–18Google Scholar
  16. Lü W (2017) Data on China’s PhD completions related to cyber security. Briefing paper #3. Australian Centre for Cyber Security. University of New South Wales Canberra. https://unsw.adfa.edu.au/australian-centre-for-cyber-security/sites/accs/files/uploads/Briefing%20Paper%233%20Final%2023%20NOV.pdf
  17. Luo Y (2013) Building world-class universities in China. Institutionalization of world-class university in global competition, pp 165–183. Springer, NetherlandsGoogle Scholar
  18. Luo Y (2011) Study on the current situation of information security and countermeasures in China. Energy Procedia 5:392–396. http://www.sciencedirect.com/science/article/pii/S1876610211010034CrossRefGoogle Scholar
  19. MoE (2016a) Number of students in higher education institutions 2015. http://en.moe.gov.cn/Resources/Statistics/edu_stat_2015/2015_en01/201610/t20161011_284371.html
  20. MoE (2016b) The academic degrees committee of the state council agrees to add cyberspace security. Notice of doctoral degree authorization at level 1. Decree [2016] No. 1. In Chinese. 28 Jan 2016. http://www.moe.gov.cn/s78/A22/A22_gggs/A22_sjhj/201603/t20160304_231944.html
  21. NSF (2015) Doctorate recipients from U.S. Universities: 2014. National Science Foundation, National Center for Science and Engineering Statistics. https://www.nsf.gov/statistics/2016/nsf16300/digest/nsf16300.pdf
  22. NSF (2017) Doctorate recipients from U.S. Universities: 2015. National Science Foundation, National Center for Science and Engineering Statistics. https://www.nsf.gov/statistics/2017/nsf17306/data/tab26.pdf
  23. OECD (2016) Education in China. A snapshot. organization for economic cooperation and development. https://www.oecd.org/china/Education-in-China-a-snapshot.pdf
  24. Olijnyk NV (2014) Information security: a scientometric study of the profile, structure, and dynamics of an emerging scholarly specialty. Dissertation. Long Island University, CW Post CenterGoogle Scholar
  25. Popkin K (2017) China’s quantum satellite achieves ‘spooky action’ at record distance. Sci Mag. 15 June 2017. http://www.sciencemag.org/news/2017/06/china-s-quantum-satellite-achieves-spooky-action-record-distance
  26. Ren J, et al (2017) Ground-to-satellite quantum teleportation. arXiv. https://arxiv.org/ftp/arxiv/papers/1707/1707.00934.pdf
  27. Schneider FB (2013) Cybersecurity education in universities. IEEE Secur Priv 11(4)CrossRefGoogle Scholar
  28. Shuang Y, Gao W, Pang M (2016) A comparative study on the highly cited papers of the top eight engineering universities. COLLNET J Scientometrics Inf Manage 10(2):311–320CrossRefGoogle Scholar
  29. Sun Q (2017) Research on the curriculum system of information security and management specialty in higher vocational education based on post competency model. DEStech Transac Social Sci, Educ Human SciGoogle Scholar
  30. Tech Review (2017) First object teleported from earth to orbit. MIT Technol Rev. 10 July 2017. https://www.technologyreview.com/s/608252/first-object-teleported-from-earth-to-orbit/
  31. Wang X, Lu W, Zhou X, Guo W (2017) Analysis and thoughts on the development of the information security profession in advanced education. In: Humanity and social science: proceedings of the international conference on humanity and social science (ICHSS2016), pp 84–95Google Scholar
  32. White House (2017) Presidential executive order on strengthening the cybersecurity of federal networks and critical infrastructure. Office of the Press Secretary. 11 May 2017. https://www.whitehouse.gov/the-press-office/2017/05/11/presidential-executive-order-strengthening-cybersecurity-federal
  33. Xinhua (2014) Network and information security development, personnel construction is the key. In Chinese. 27 Nov 2014. http://news.xinhuanet.com/politics/2014-11/29/c_1113456181.htm
  34. Xinhua (2017) China starts building internet security institute. 23 Aug 2017. http://news.xinhuanet.com/english/2017-08/23/c_136549729.htm
  35. Zhang H, Han W, Lai X, Lin D, Ma J, Li J (2015) Survey on cyberspace security. Sci China Inf Sci 58(11):1–43MathSciNetGoogle Scholar
  36. Zhang H, Yu H, Zhai J, Yu X (2016) Suggestions on cyber security talents cultivation. Chin J Netw Inf Secur 2(3):1–9. (In Chinese)Google Scholar
  37. Zhang L, Wu Y, Yang G (2017) M&S as a profession and discipline in China. In: Tolk A, Ören T (eds) The profession of modeling and simulation: discipline, ethics, education, vocation, societies, and economics. Wiley, New York, pp 167–182Google Scholar
  38. Zhang W (2017) The path of China higher education governance reform based on comparative study on the governance pattern of higher education in the United States and Japan. In: Humanity and social science: proceedings of the international conference on humanity and social science (ICHSS2016), pp 150–155Google Scholar
  39. Zhaopin.com and 360 Cybersecurity Center (2017) Research report on cybersecurity talent market in China. In Chinese. Beijing. Available at: http://zt.360.cn/1101061855.php?dtid=1101062370&did=490711371

Copyright information

© The Author(s) 2018

Authors and Affiliations

  1. 1.Australian Centre for Cyber SecurityUniversity of New South WalesCanberraAustralia

Personalised recommendations