{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T11:31:07Z","timestamp":1769513467165,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","funder":[{"name":"NSF CyberCorps Scholarship","award":["DGE#1663184"],"award-info":[{"award-number":["DGE#1663184"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,6]]},"DOI":"10.1145\/3769694.3771142","type":"proceedings-article","created":{"date-parts":[[2025,12,27]],"date-time":"2025-12-27T10:03:58Z","timestamp":1766829838000},"page":"24-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["CyberAI: Knowledge Area Frameworks for Cybersecurity Programs in the Age of Artificial Intelligence"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9561-6128","authenticated-orcid":false,"given":"Siddharth","family":"Kaza","sequence":"first","affiliation":[{"name":"Towson University, Towson, MD, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4708-5852","authenticated-orcid":false,"given":"Blair","family":"Taylor","sequence":"additional","affiliation":[{"name":"Towson University, Towson, MD, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5914-0479","authenticated-orcid":false,"given":"Paul","family":"Wagner","sequence":"additional","affiliation":[{"name":"University of Arizona, Tucson, AZ, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6866-3896","authenticated-orcid":false,"given":"Shankar","family":"Banik","sequence":"additional","affiliation":[{"name":"The Citadel, Charleston, SC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-9525-0545","authenticated-orcid":false,"given":"Eman","family":"El-Sheikh","sequence":"additional","affiliation":[{"name":"University of West Florida, Pensacola, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-6120-3787","authenticated-orcid":false,"given":"Paige","family":"Zaleppa","sequence":"additional","affiliation":[{"name":"Computer and Information Sciences, Towson University, Towson, MD, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6729-3325","authenticated-orcid":false,"given":"Seth","family":"Hamman","sequence":"additional","affiliation":[{"name":"Cedarville University, Cedarville, OH, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7269-3748","authenticated-orcid":false,"given":"Md Sajidul Islam","family":"Sajid","sequence":"additional","affiliation":[{"name":"Towson University, Towson, MD, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8994-6497","authenticated-orcid":false,"given":"Yair","family":"Levy","sequence":"additional","affiliation":[{"name":"Nova Southeastern University, Fort Lauderdale, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8961-0133","authenticated-orcid":false,"given":"Vincent","family":"Nestler","sequence":"additional","affiliation":[{"name":"California State University San Bernardino, San Bernardino, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4513-805X","authenticated-orcid":false,"given":"Sagar","family":"Samtani","sequence":"additional","affiliation":[{"name":"Indiana University, Bloomington, IN, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7561-6112","authenticated-orcid":false,"given":"Patrick","family":"Tague","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburg, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,12,27]]},"reference":[{"key":"e_1_3_3_1_1_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10639-022-11261-8"},{"key":"e_1_3_3_1_2_2","volume-title":"Jobs Report","author":"Zahidi Saadia","year":"2023","unstructured":"Saadia Zahidi. 2023. Future of Jobs Report 2023. World Economic Forum. https:\/\/www.weforum.org\/publications\/the-future-of-jobs-report-2023\/."},{"key":"e_1_3_3_1_3_2","unstructured":"U.S. Bureau of Labor and Statistics. 2025. Information Security Analysts. Occupational Outlook Handbook. https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm."},{"key":"e_1_3_3_1_4_2","unstructured":"ISC2. 2024. Global Cybersecurity Workforce Prepares for an AI-Driven World. ISC2 Cybersecurity Workforce Study. https:\/\/www.isc2.org\/Insights\/2024\/10\/ISC2-2024-Cybersecurity-Workforce-Study."},{"key":"e_1_3_3_1_5_2","unstructured":"Cyberseek. 2025. Cybersecurity Supply\/Demand Heat Map. Cyberseek. https:\/\/www.cyberseek.org\/heatmap.html."},{"key":"e_1_3_3_1_6_2","unstructured":"ISACA. 2024. State of Cybersecurity 2024 Global Update on Workforce Efforts Resources and Cyberoperations. ISACA. https:\/\/www.isaca.org\/resources\/reports\/state-of-cybersecurity-2024."},{"key":"e_1_3_3_1_7_2","unstructured":"ISACA. 2025. 89% of Digital Trust Pros Say Increased AI Skills and Knowledge Needed to Retain Job or Advance Their Career Over Next Two Years. ISACA. https:\/\/www.isaca.org\/about-us\/newsroom\/press-releases\/2025\/digital-trust-pros-say-increased-ai-skills-and-knowledge-needed-to-advance-their-career."},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.AI.100-1"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1108\/ICS"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-181r1"},{"key":"e_1_3_3_1_11_2","unstructured":"NICE Workforce Framework for Cybersecurity. National Initiative for Cybersecurity Careers and Study (NICCS). https:\/\/niccs.cisa.gov\/tools\/nice-framework."},{"key":"e_1_3_3_1_12_2","unstructured":"Awais Rashid Howard Chivers Emil Lupu Andrew Martin and Steve Schneider. 2021. The Cybersecurity Body of Knowledge. The national Cyber Security Centre. https:\/\/www.cybok.org\/media\/downloads\/CyBOK_v1.1.0.pdf."},{"key":"e_1_3_3_1_13_2","volume-title":"Curriculum Guidelines for Post-Secondary Degree Programs in Cybersecurity","author":"Burley Diana","year":"2018","unstructured":"Diana Burley, Matt Bishop, Scott Buck, Joseph Ekstrom, Lynn Futcher, David Gibson, Elizabeth Hawthorne, Siddharth Kaza, Yair Levy, Herbert Mattrod, and Allen Parrish. 2017. Curriculum Guidelines for Post-Secondary Degree Programs in Cybersecurity. Association for Computing Machinery. https:\/\/cybered.hosting.acm.org\/wp-content\/uploads\/2018\/02\/newcover_csec2017.pdf."},{"key":"e_1_3_3_1_14_2","unstructured":"Paresh Rathod. 2022. European Cybersecurity Education and Professional Training: Minimum Reference Curriculum. European Cyber Security Organisation. https:\/\/ecs-org.eu\/ecso-uploads\/2022\/12\/2022_SWG5.2_Minimum_Reference_Curriculum_final_v3.0.pdf."},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2024.3428892"},{"key":"e_1_3_3_1_16_2","first-page":"70","article-title":"Aligning Cybersecurity in Higher Education with Industry Needs","author":"Towhidi Gelareh","year":"2023","unstructured":"Gelareh Towhidi and Jeannie Pridmore. 2023. Aligning Cybersecurity in Higher Education with Industry Needs. Journal of Information Systems Education. 70-83. https:\/\/jise.org\/Volume34\/n1\/JISE2023v34n1pp70-83.html.","journal-title":"Journal of Information Systems Education."},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.3390\/info15020117"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","unstructured":"Muhusina Ismail Nisha Madathil Meera Alalawi Saed Alrabaee Mohammad Bataineh Suhib Melhem and Djedjiga Mouheb. 2024. Cybersecurity activities for education and curriculum design: A survey. Computers in Human Behavior. DOI: 10.1016\/j.chbr.2024.100501.","DOI":"10.1016\/j.chbr.2024.100501"},{"key":"e_1_3_3_1_19_2","unstructured":"Izzat Alsmadi. 2018. Cybersecurity Education Based on the NICE Framework: Issues and Challenges. ISACA. https:\/\/www.isaca.org\/resources\/isaca-journal\/issues\/2018\/volume-4\/cybersecurity-education-based-on-the-nice-framework-issues-and-challenges."},{"key":"e_1_3_3_1_20_2","unstructured":"Milla Surjadi. 2024. Colleges Race to Ready Students for the AI Workplace. The Wall Street Journal. https:\/\/www.wsj.com\/us-news\/education\/colleges-race-to-ready-students-for-the-ai-workplace-cc936e5b?reflink=desktopwebshare_permalink."},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"publisher","unstructured":"Jane Southworth Kati Migliaccio Joe Glover Ja'Net Glover David Reed Christopher McCarty Joel Brendemuhl and Aaron Thomas. 2023. Developing a model for AI Across the Curriculum: Transforming the higher education landscape via innovation in AI literacy. Computer and Education: Artificial Intelligence. DOI: 10.1016\/j.caeai.2023.100127.","DOI":"10.1016\/j.caeai.2023.100127"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1186\/s41239-024-00448-3"},{"key":"e_1_3_3_1_23_2","unstructured":"Miguel Cardona and Roberto Rodriguez. 2025. Navigating Artificial Intelligence in Postsecondary Education: Building Capacity for the Road Ahead. Office of Educational Technology. https:\/\/files.eric.ed.gov\/fulltext\/ED670768.pdf."},{"key":"e_1_3_3_1_24_2","unstructured":"2025. Certificate Program in Applied Generative AI. Johns Hopkins Whiting School of Engineering. https:\/\/online.lifelonglearning.jhu.edu\/jhu-certificate-program-applied-generative-ai."},{"key":"e_1_3_3_1_25_2","unstructured":"2025. Applied AI and Data Science Program. MIT Professional Education. https:\/\/professional-education-gl.mit.edu\/mit-applied-data-science-course."},{"key":"e_1_3_3_1_26_2","unstructured":"2025. DoD Cyber Workforce Framework. DoD Cyber Exchange Public. https:\/\/public.cyber.mil\/wf-element-sub\/ai-data\/."},{"key":"e_1_3_3_1_27_2","first-page":"2025","year":"2025","unstructured":"2025. Criteria for Accrediting Computing Programs, 2025-2026. ABET. https:\/\/www.abet.org\/accreditation\/accreditation-criteria\/criteria-for-accrediting-computing-programs-2025-2026\/.","journal-title":"Criteria for Accrediting Computing Programs"},{"key":"e_1_3_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/CSCI51800.2020.00023"},{"key":"e_1_3_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.53735\/cisse.v12i1"},{"key":"e_1_3_3_1_30_2","unstructured":"Shankar Banik Eman El-Sheikh Paige Flores Seth Hamman Siddharth Kaza Yair Levy Vincent Nestler Md Sajid Sagar Samtani Patrick Tague Blair Taylor Paul Wagner. 2024. Cyber AI Programs Stoneman v1. Department of Defense Cyber Exchange. https:\/\/dl.dod.cyber.mil\/wp-content\/uploads\/cae\/pdf\/unclass-cyber_ai_kus_stoneman.pdf."},{"key":"e_1_3_3_1_31_2","volume-title":"Program Validation Requirements and Application Process for CyberAI Programs of Study (CyberAI)","author":"CyberAI Working Group","unstructured":"CyberAI Working Group. 2024. Program Validation Requirements and Application Process for CyberAI Programs of Study (CyberAI). National Centers of Academic Excellence in Cybersecurity. https:\/\/public.cyber.mil\/wp-content\/uploads\/cae\/pdf\/unclass-cae_pos-cyberai.pdf."}],"event":{"name":"ACM SIGCITE 2025: 26th Annual ACM Conference on Cybersecurity and Information Technology Education","location":"Sacramento , California , USA","acronym":"ACM SIGCITE 2025","sponsor":["SIGCITE ACM Special Interest Group on Cybersecurity & Information Technology Education"]},"container-title":["Proceedings of the 26th ACM Annual Conference on Cybersecurity &amp; Information Technology Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3769694.3771142","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T00:00:09Z","timestamp":1769472009000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3769694.3771142"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,6]]},"references-count":31,"alternative-id":["10.1145\/3769694.3771142","10.1145\/3769694"],"URL":"https:\/\/doi.org\/10.1145\/3769694.3771142","relation":{},"subject":[],"published":{"date-parts":[[2025,11,6]]},"assertion":[{"value":"2025-12-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}