<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">The Variety of University Cyber Security Programs - Is it Useful and Justified?</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">bachelor program</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">higher education</style></keyword><keyword><style  face="normal" font="default" size="100%">master program</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">December 2020</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">41</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Cybersecurity capabilities have long been not a luxury but a real necessity stemming from the development of technology and the associated threats, vulnerabilities and risks. A key component of these capabilities are the cybersecurity experts, who contribute their knowledge, skills and experience. In this regard, universities&amp;#39; efforts to launch cybersecurity programs seem justified and understandable. Is it possible that competition between universities and oversaturation with the university programs in the field of cybersecurity will lead to an unjustified expansion of the portfolio of taught knowledge and a shift in the focus from building the required capabilities? This report seeks answer to this and related questions on the academic contribution to cybersecurity.&lt;/p&gt;</style></abstract></record></records></xml>