2014
DOI: 10.1080/08993408.2014.890792
|View full text |Cite
|
Sign up to set email alerts
|

Assessment of examinations in computer science doctoral education

Abstract: This article surveys the examination requirements for attaining degree candidate (candidacy) status in computer science doctoral programs at all of the computer science doctoral granting institutions in the United States. It presents a framework for program examination requirement categorization, and categorizes these programs by the type or types of candidacy examinations that are required. The performance of computer science departments, estimated via two common surrogate metrics, in these different categori… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 14 publications
0
7
0
Order By: Relevance
“…Cybersecurity can also be described as the process, state, or activity in which communication systems and information are protected from modification, unauthorized access, or exploitation. Therefore, cybersecurity knowledge can help prevent people from cyber threats such as ransomware [14]. Children are often exposed to numerous threats such as adult content that they may encounter in games and videos; this content may negatively affect their mental health.…”
Section: Cybersecuritymentioning
confidence: 99%
See 4 more Smart Citations
“…Cybersecurity can also be described as the process, state, or activity in which communication systems and information are protected from modification, unauthorized access, or exploitation. Therefore, cybersecurity knowledge can help prevent people from cyber threats such as ransomware [14]. Children are often exposed to numerous threats such as adult content that they may encounter in games and videos; this content may negatively affect their mental health.…”
Section: Cybersecuritymentioning
confidence: 99%
“…The G3 is also vital as it helps in the integrity, availability, and confidentiality of applications, data, and various systems. Additionally, the G4 is also vital as it manages the cybersecurity processes embedded in different frameworks [14]. The G5 code is also critical as it helps document, manage, and identifies the applications and systems authorized for use [3].…”
Section: Principles Of Cybersecuritymentioning
confidence: 99%
See 3 more Smart Citations