To Örebro University

oru.seÖrebro University Publications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Using the Delphi Method to Elicit Requirements for an International Master’s Program in Information Security Management
Örebro University, Örebro University School of Business. (Informatik)ORCID iD: 0000-0002-3265-7627
Örebro University, Örebro University School of Business. (Informatik)ORCID iD: 0000-0003-2304-7170
Örebro University, Örebro University School of Business. (Informatik)
2023 (English)In: Cybersecruity Teaching in Higher Education / [ed] Leslie F. Sikos; Paul Haskell-Dowland, Cham: Springer , 2023, p. 37-57Chapter in book (Refereed)
Abstract [en]

In today's complex environments, safeguarding organizations’ information assets is difficult and requires more than solely technical skills. In order to meet the need for future information security specialists, in 2018 the Informatics department at Örebro University launched an International Master’s Program in Information Security Management. The program content was developed in collaboration with industry and governmental partners. One of the challenges with this co-design effort was to elicit the requirements of the courses in the program from a diverse set of actors. Also, an educational program has a finite number of teaching hours, which means that a limited number of requirements, or topics on information security, can be covered. Consequently, there was a need to prioritize between the elicited requirements and make the partners prioritize. To both these ends, we employed the Delphi method. In this chapter, we give an account of the process of eliciting and prioritizing course requirements using an adapted Delphi method. The adopted process included three iterations, for which workshops and surveys were used to collect the necessary data. The implementation has been far from instrumental, and in this chapter we discuss the details related to design choices made and the rationale behind these choices.

Place, publisher, year, edition, pages
Cham: Springer , 2023. p. 37-57
National Category
Information Systems, Social aspects
Research subject
Informatics
Identifiers
URN: urn:nbn:se:oru:diva-109018DOI: 10.1007/978-3-031-24216-8_2ISBN: 9783031242151 (print)ISBN: 9783031242168 (electronic)OAI: oai:DiVA.org:oru-109018DiVA, id: diva2:1805389
Funder
Knowledge FoundationAvailable from: 2023-10-17 Created: 2023-10-17 Last updated: 2023-10-17Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full text

Authority records

Karlsson, FredrikHedström, KarinKolkowska, Ella

Search in DiVA

By author/editor
Karlsson, FredrikHedström, KarinKolkowska, Ella
By organisation
Örebro University School of Business
Information Systems, Social aspects

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 65 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf