<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.3 20210610//EN" "JATS-journalpublishing1-3-mathml3.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:ali="http://www.niso.org/schemas/ali/1.0/" article-type="research-article" dtd-version="1.3" xml:lang="EN">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Educ.</journal-id>
<journal-title-group>
<journal-title>Frontiers in Education</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Educ.</abbrev-journal-title>
</journal-title-group>
<issn pub-type="epub">2504-284X</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="doi">10.3389/feduc.2026.1769241</article-id>
<article-version article-version-type="Version of Record" vocab="NISO-RP-8-2008"/>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Original Research</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>Aligning cybersecurity higher education with European skills frameworks: insights from master&#x2019;s programs in Sweden</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname>Behzadi</surname>
<given-names>Bahareh</given-names>
</name>
<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
<uri xlink:href="https://loop.frontiersin.org/people/3373829"/>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="investigation" vocab-term-identifier="https://credit.niso.org/contributor-roles/investigation/">Investigation</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="conceptualization" vocab-term-identifier="https://credit.niso.org/contributor-roles/conceptualization/">Conceptualization</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="resources" vocab-term-identifier="https://credit.niso.org/contributor-roles/resources/">Resources</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="validation" vocab-term-identifier="https://credit.niso.org/contributor-roles/validation/">Validation</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; review &#x0026; editing" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-review-editing/">Writing &#x2013; review &#x0026; editing</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="visualization" vocab-term-identifier="https://credit.niso.org/contributor-roles/visualization/">Visualization</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; original draft" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-original-draft/">Writing &#x2013; original draft</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="methodology" vocab-term-identifier="https://credit.niso.org/contributor-roles/methodology/">Methodology</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="software" vocab-term-identifier="https://credit.niso.org/contributor-roles/software/">Software</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Data curation" vocab-term-identifier="https://credit.niso.org/contributor-roles/data-curation/">Data curation</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Formal analysis" vocab-term-identifier="https://credit.niso.org/contributor-roles/formal-analysis/">Formal analysis</role>
</contrib>
<contrib contrib-type="author" corresp="yes">
<name>
<surname>Habibipour</surname>
<given-names>Abdolrasoul</given-names>
</name>
<xref ref-type="aff" rid="aff2"><sup>2</sup></xref>
<xref ref-type="corresp" rid="c001"><sup>&#x002A;</sup></xref>
<uri xlink:href="https://loop.frontiersin.org/people/2241404"/>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="conceptualization" vocab-term-identifier="https://credit.niso.org/contributor-roles/conceptualization/">Conceptualization</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Project administration" vocab-term-identifier="https://credit.niso.org/contributor-roles/project-administration/">Project administration</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="supervision" vocab-term-identifier="https://credit.niso.org/contributor-roles/supervision/">Supervision</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; original draft" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-original-draft/">Writing &#x2013; original draft</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="investigation" vocab-term-identifier="https://credit.niso.org/contributor-roles/investigation/">Investigation</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Funding acquisition" vocab-term-identifier="https://credit.niso.org/contributor-roles/funding-acquisition/">Funding acquisition</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; review &#x0026; editing" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-review-editing/">Writing &#x2013; review &#x0026; editing</role>
</contrib>
</contrib-group>
<aff id="aff1"><label>1</label><institution>Hogskolan i Skovde</institution>, <city>Sk&#x00F6;vde</city>, <country country="se">Sweden</country></aff>
<aff id="aff2"><label>2</label><institution>Lule&#x00E5; University of Technology</institution>, <city>Lule&#x00E5;</city>, <country country="se">Sweden</country></aff>
<author-notes>
<corresp id="c001"><label>&#x002A;</label>Correspondence: Abdolrasoul Habibipour, <email xlink:href="mailto:abdolrasoul.habibipour@ltu.se">abdolrasoul.habibipour@ltu.se</email></corresp>
</author-notes>
<pub-date publication-format="electronic" date-type="pub" iso-8601-date="2026-02-18">
<day>18</day>
<month>02</month>
<year>2026</year>
</pub-date>
<pub-date publication-format="electronic" date-type="collection">
<year>2026</year>
</pub-date>
<volume>11</volume>
<elocation-id>1769241</elocation-id>
<history>
<date date-type="received">
<day>16</day>
<month>12</month>
<year>2025</year>
</date>
<date date-type="rev-recd">
<day>03</day>
<month>02</month>
<year>2026</year>
</date>
<date date-type="accepted">
<day>06</day>
<month>02</month>
<year>2026</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#x00A9; 2026 Behzadi and Habibipour.</copyright-statement>
<copyright-year>2026</copyright-year>
<copyright-holder>Behzadi and Habibipour</copyright-holder>
<license>
<ali:license_ref start_date="2026-02-18">https://creativecommons.org/licenses/by/4.0/</ali:license_ref>
<license-p>This is an open-access article distributed under the terms of the <ext-link ext-link-type="uri" xlink:href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution License (CC BY)</ext-link>. The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</license-p>
</license>
</permissions>
<abstract>
<sec id="sec50">
<title>Introduction</title>
<p>Cybersecurity education is expanding rapidly, yet universities face challenges in aligning curricula with evolving labour market needs and emerging domains such as artificial intelligence security and cloud security. This study examines how Swedish master&#x2019;s programmes align with the European Cybersecurity Skills Framework and how European skills frameworks are translated into curriculum practice.</p>
</sec>
<sec id="sec51">
<title>Methods</title>
<p>A mixed-methods design combined document analysis of 91 compulsory courses across 12 master&#x2019;s programmes at 11 Swedish universities (Autumn 2024 intake) with semi-structured interviews with seven programme coordinators. Courses were mapped to European Cybersecurity Skills Framework role profiles using course titles, learning outcomes and the European Cybersecurity Education and Professional Training Minimum Reference Curriculum, and findings were interpreted through the European Cybersecurity Skills Framework based Cybersecurity Curriculum Alignment framework.</p>
</sec>
<sec id="sec52">
<title>Results</title>
<p>Across the national set of programmes, all European Cybersecurity Skills Framework roles are covered, but depth and specialization vary substantially between programmes. Technical roles are strongly represented in some programmes, whereas others emphasise governance, risk and compliance roles. Emerging areas such as artificial intelligence security, machine learning security and cloud security are only marginally addressed in compulsory curricula, and programme coordinators report constraints related to staffing, time and slow institutional change processes.</p>
</sec>
<sec id="sec53">
<title>Discussion</title>
<p>The findings suggest that national alignment to a European skills framework cannot be assessed only by counting covered roles, but must also consider programme design logics, curriculum content depth and institutional conditions for change. Stronger use of the European Cybersecurity Skills Framework in curriculum planning, clearer role oriented learning outcomes, increased industry collaboration and more structured practice based elements could improve graduates&#x2019; readiness for cybersecurity careers.</p>
</sec>
</abstract>
<kwd-group>
<kwd>curriculum mapping</kwd>
<kwd>cybersecurity education</kwd>
<kwd>European Cybersecurity Skills Framework</kwd>
<kwd>higher education</kwd>
<kwd>skills frameworks</kwd>
</kwd-group>
<funding-group>
<funding-statement>The author(s) declared that financial support was not received for this work and/or its publication.</funding-statement>
</funding-group>
<counts>
<fig-count count="2"/>
<table-count count="1"/>
<equation-count count="0"/>
<ref-count count="45"/>
<page-count count="10"/>
<word-count count="7352"/>
</counts>
<custom-meta-group>
<custom-meta>
<meta-name>section-at-acceptance</meta-name>
<meta-value>Higher Education</meta-value>
</custom-meta>
</custom-meta-group>
</article-meta>
</front>
<body>
<sec sec-type="intro" id="sec1">
<title>Introduction</title>
<p>In today&#x2019;s digital landscape, information technologies (IT) have become a strategic asset, enabling organizations to adapt to situational changes and maintain competitiveness (<xref ref-type="bibr" rid="ref9">Chakravarty et al., 2013</xref>). Consequently, information is increasingly regarded not merely as data but as a critical organizational asset requiring robust protection. Cybersecurity practices aim to safeguard information systems from unauthorized access, data breaches, and cyber threats, preserving the confidentiality, integrity, and availability of sensitive information while maintaining competitive advantage.</p>
<p>The evolving threat landscape presents significant challenges. High-profile breaches, such as Yahoo!&#x2018;s 3-billion-account compromise (<xref ref-type="bibr" rid="ref12">Daswani and Elbayadi, 2021</xref>) and the Swedish Transport Agency incident in 2017 (<xref ref-type="bibr" rid="ref35">Newlove-Eriksson et al., 2018</xref>), illustrate the severe consequences of inadequate protection. Organizations invest substantial resources in IT systems and cybersecurity measures to mitigate these risks (<xref ref-type="bibr" rid="ref100">Parenty and Domet, 2020</xref>).</p>
<p>The growing complexity of technology ecosystems&#x2014;including BYOD practices, IoT integration, and the proliferation of connected devices&#x2014;expands potential vulnerabilities, demanding proactive management of cybersecurity risks (<xref ref-type="bibr" rid="ref22">Joiner and Tutty, 2018</xref>). To address these challenges, specialized cybersecurity roles are essential, ensuring effective oversight, risk communication, and program execution (<xref ref-type="bibr" rid="ref101">Auffret et al., 2017</xref>).</p>
<p>Education and training are fundamental to developing a skilled cybersecurity workforce. High-quality programs equip professionals with the knowledge and competencies required to navigate complex digital environments. Aligning curricula with evolving industry needs is critical to ensure that cybersecurity initiatives remain effective and graduates are prepared to meet the dynamic challenges of the field (<xref ref-type="bibr" rid="ref10">Conklin et al., 2014</xref>; <xref ref-type="bibr" rid="ref102">Triplett, 2022</xref>).</p>
<sec id="sec2">
<title>Problem definition</title>
<p>Educational institutions face a critical challenge in preparing students for the cybersecurity workforce, particularly those offering dedicated cybersecurity programs or aspiring to achieve recognition as centers of academic excellence (<xref ref-type="bibr" rid="ref30">Marquardson and Gomillion, 2018</xref>). The growing demand for qualified professionals in this dynamic field has prompted institutions to continually adapt curricula to equip students with relevant technical and professional skills.</p>
<p>A notable trend in cybersecurity education is the interdisciplinary integration of cybersecurity competencies across multiple academic and professional domains. This approach reflects the pervasive nature of cybersecurity challenges and emphasizes the need for individuals from diverse backgrounds to acquire foundational knowledge in cybersecurity. As <xref ref-type="bibr" rid="ref31">McDuffie and Piotrowski (2014)</xref> note, essential cybersecurity skills span information technology, risk management, criminal justice, computer science, ethics, and policy development. <xref ref-type="bibr" rid="ref45">Zorz (2018)</xref> further highlights the importance of technical expertise in programming languages, system architecture, administration, and certifications, while <xref ref-type="bibr" rid="ref32">McGettrick (2013)</xref> underscores the relevance of soft skills, including effective communication.</p>
<p>The diversity of students&#x2019; prior knowledge and professional experience presents additional challenges for curriculum design. Students entering cybersecurity programs often have varied IT and professional backgrounds, necessitating curriculum structures that provide foundational knowledge while supporting advanced learning and development. Evaluating the alignment between program content and industry needs is therefore essential to ensure graduates are prepared for the evolving demands of the workforce. Consequently, the study does not only describe current practice but also structures it analytically through the ECSF-based Cybersecurity Curriculum Alignment (ECCA). Framework and a taxonomy of program types.</p>
<p>Existing frameworks, such as the European Cybersecurity Skills Framework (ECSF) and the NICE Framework, provide structured approaches to identifying skills required for specific cybersecurity roles (<xref ref-type="bibr" rid="ref103">Petersen et al., 2020</xref>; <xref ref-type="bibr" rid="ref104">ENISA, 2024</xref>). This study adopts the ECSF due to its relevance in the European context, using it to analyze Swedish cybersecurity programs and assess their effectiveness in fostering essential competencies. Additionally, perspectives from program coordinators were collected to identify challenges, opportunities, and evaluation practices, offering insights into the alignment between educational programs and workforce requirements. This research contributes to understanding and enhancing cybersecurity education in Swedish universities, ensuring graduates are equipped for diverse roles in a rapidly evolving field.</p>
</sec>
<sec id="sec3">
<title>Research question</title>
<p>This study investigates how curriculum content prepares students for effective roles in cybersecurity. By examining what is taught in Swedish cybersecurity programs, it aims to identify the key knowledge, skills, and competencies essential for success in the field. The central research question is:</p>
<list list-type="bullet">
<list-item>
<p>How do Swedish universities ensure their cybersecurity course content aligns with the skills needed for a cybersecurity career, and to what extent?</p>
</list-item>
</list>
<p>The research evaluates the effectiveness of current curricula in addressing the evolving demands of the cybersecurity landscape, providing insights to guide future improvements in education.</p>
</sec>
<sec id="sec4">
<title>Delimitations</title>
<p>The study focuses only on Swedish universities offering cybersecurity master&#x2019;s programs. Vocational schools, corporate training programs, and bachelor-level programs were excluded. Only compulsory courses were included because elective courses differ between students and cannot guarantee consistent role preparation. The analysis is also limited by the availability of publicly accessible information.</p>
</sec>
</sec>
<sec id="sec5">
<title>Background</title>
<p>Literature on cybersecurity education encompasses curriculum design, implementation, and assessment, reflecting the field&#x2019;s dynamic and evolving nature. Several studies explore strategies for integrating cybersecurity concepts into existing academic programs, such as those by <xref ref-type="bibr" rid="ref105">Belle et al. (2013)</xref> and <xref ref-type="bibr" rid="ref6">Bogolea and Wijekumar (2004)</xref>, while others, including <xref ref-type="bibr" rid="ref15">Endicott-Popovsky and Popovsky (2014)</xref>, emphasize hands-on, experiential learning approaches. <xref ref-type="bibr" rid="ref18">Hentea et al. (2006)</xref> investigate the effectiveness of pedagogical techniques in fostering cybersecurity knowledge, and <xref ref-type="bibr" rid="ref43">Whitman and Mattord (2004)</xref> examine the alignment of various teaching methods with the roles required in the cybersecurity workforce.</p>
<p>Efforts to enhance student learning often focus on adopting multidisciplinary approaches. <xref ref-type="bibr" rid="ref106">Cheung et al. (2011)</xref> advocate integrating diverse fields to strengthen cybersecurity education, while <xref ref-type="bibr" rid="ref4">Beuran et al. (2016)</xref> analyze prominent Japanese training programs to identify best practices and methodologies. The development of frameworks such as Cybersecurity Training and Operation Network Environment (CyTrONE) further supports practical training by automating content creation and environment setup for cybersecurity exercises (<xref ref-type="bibr" rid="ref5">Beuran et al., 2018</xref>). Tailoring curricula to core knowledge, skills, and abilities (KSAs) has also been suggested to improve student preparedness for professional roles (<xref ref-type="bibr" rid="ref23">Jones et al., 2018</xref>).</p>
<p>Research additionally examines alignment with established frameworks to ensure educational relevance. <xref ref-type="bibr" rid="ref107">Cabaj et al. (2018)</xref> evaluated 21 master&#x2019;s programs in cybersecurity against ACM/IEEE curricular guidelines, assessing topic coverage and distribution across courses. Other studies have utilized frameworks such as NICE to define essential workforce competencies and guide learning outcomes (<xref ref-type="bibr" rid="ref2">AlDaajeh et al., 2022</xref>). In Sweden, the Knowit Institute mapped courses to cybersecurity job roles across private and governmental institutions, highlighting potential gaps and ensuring alignment with industry requirements (<xref ref-type="bibr" rid="ref1">Abdullahi and Olivia, 2024</xref>).</p>
<p>Overall, research demonstrates that universities are actively innovating in course design, pedagogy, and assessment to meet workforce needs. Despite these advancements, further research and collaboration are essential to continuously enhance cybersecurity education and prepare graduates for the demands of a rapidly evolving professional landscape. Most of the studies reviewed above were published between 2004 and 2023 and only a few explicitly address the Swedish higher-education context. Apart from the recent national mapping by <xref ref-type="bibr" rid="ref1">Abdullahi and Olivia (2024)</xref>, which does not use ECSF as an analytical lens, we found no systematic analysis of Swedish master&#x2019;s programs based on European skills frameworks. This temporal and geographical gap motivates the present study, which provides an updated picture for the 2024 admissions round and examines how Swedish programs relate to ECSF.</p>
<sec id="sec6">
<title>Cybersecurity skill frameworks</title>
<p>In cybersecurity, frameworks provide foundational structures that guide education, training, and workforce development. They establish a shared understanding of professional role profiles, including relevant skills and competencies. Competencies combine knowledge, technical skills, and human dispositions, representing an individual&#x2019;s ability to perform tasks at varying proficiency levels (<xref ref-type="bibr" rid="ref37">Parrish et al., 2018</xref>). Within educational contexts, frameworks are used to define learning outcomes, providing a common language that facilitates communication of tasks, expectations, and qualifications across academic and professional environments.</p>
</sec>
<sec id="sec7">
<title>National Initiative for Cybersecurity Education (NICE)</title>
<p>The NICE framework provides detailed structures for defining cybersecurity work roles, including the associated knowledge, skills, and abilities (KSAs) required to perform them. Knowledge refers to information applied directly to tasks, skills denote observable competence, and abilities indicate the capacity to apply knowledge and skills effectively to produce tangible outcomes (<xref ref-type="bibr" rid="ref34">Newhouse et al., 2017</xref>). Tasks are defined as specific activities that, combined with other tasks, fulfill responsibilities within a specialized role. The framework is widely used in education to design curricula that align with professional requirements, with particular emphasis on knowledge areas essential for each role.</p>
</sec>
<sec id="sec8">
<title>CSEC2017 Joint Task Force</title>
<p>The CSEC2017 Joint Task Force (JTF) resulted from collaborative efforts by ACM, IEEE, AIS SIGSEC, and IFIP WG 11.8. It provides guidance for cybersecurity programs to integrate theoretical knowledge with practical skill development. The framework organizes content into Knowledge Areas (KAs) and Knowledge Units (KUs), representing thematic groupings of topics necessary for each area. This structure enables educators to ensure that curricula comprehensively cover both foundational and applied cybersecurity knowledge (<xref ref-type="bibr" rid="ref11">CSEC2017 Joint Task Force, 2017</xref>).</p>
</sec>
<sec id="sec9">
<title>European commission report</title>
<p>The European commission report aims to harmonize cybersecurity terminology and definitions across the EU. While it does not specify required knowledge or skills, it provides a coherent taxonomy of cybersecurity domains and subdomains, supporting consistent communication and categorization of competencies across educational and professional contexts (<xref ref-type="bibr" rid="ref108">Fovino et al., 2019</xref>).</p>
</sec>
<sec id="sec10">
<title>Cyber security body of knowledge (CyBOK)</title>
<p>CyBOK consolidates widely acknowledged cybersecurity knowledge from textbooks, research, and standards into a unified framework. It defines knowledge areas to provide a shared vocabulary, goals, and approaches to cybersecurity education. By mapping curriculum topics and learning outcomes to these knowledge areas, CyBOK enables comparisons across programs and serves as a foundational guide for designing comprehensive curricula (<xref ref-type="bibr" rid="ref38">Rashid et al., 2021</xref>; <xref ref-type="bibr" rid="ref17">Hallett et al., 2018</xref>).</p>
</sec>
<sec id="sec11">
<title>European cybersecurity skills framework (ECSF)</title>
<p>The ECSF defines twelve role profiles for cybersecurity professionals commonly employed in European organizations. Each profile includes key skills, knowledge, and competencies, offering a standardized language for curriculum development and program alignment. The framework supports higher education, vocational training, and other educational initiatives by guiding course learning outcomes, enabling joint programs, and promoting student mobility. ECSF emphasizes knowledge requirements for each role, assisting universities in designing programs that prepare graduates for specific professional responsibilities while aligning education with labor market needs (<xref ref-type="bibr" rid="ref14">Di Franco and Grammatopoulcs, 2022</xref>). In the Swedish context, European skills frameworks are relevant because universities operate within the European Higher Education Area and are expected to support mobility and comparability of qualifications. Coordinators in our study described using ECSF and related European documents as informal reference points when discussing program revisions, even when they are not formally mandated. ECSF is therefore treated not as a rigid template, but as a flexible guide that can be interpreted and adapted to local institutional regulations, degree structures and pedagogical traditions.</p>
</sec>
</sec>
<sec sec-type="methods" id="sec12">
<title>Methodology</title>
<p>This study employed a mixed-methods approach to explore the content of cybersecurity programs at Swedish universities, combining document analysis and semi-structured interviews. Document analysis is a systematic procedure for reviewing and evaluating both printed and electronic materials (<xref ref-type="bibr" rid="ref7">Bowen, 2009</xref>). In this research, document analysis facilitated convergence and corroboration by integrating multiple data sources, primarily focusing on course content available on university websites. Using a framework-based approach, courses were mapped to the roles defined in the European Cybersecurity Skills Framework (ECSF), allowing a detailed assessment of how programs align with industry-relevant competencies and knowledge areas. This approach also enabled demographic analysis, providing insights into the distribution and characteristics of cybersecurity programs across Swedish universities. In practical terms, this meant using ECSF roles and knowledge items as a checklist when reviewing course syllabi and assessment tasks, identifying which roles each program primarily supports and where important competencies are weakly represented. These document and interview data were interpreted through a four-level analytical structure, comprising policy frameworks, program design, curriculum content and institutional conditions, which we refer to as the ECCA Framework.</p>
<sec id="sec13">
<title>Course&#x2013;role mapping procedure</title>
<p>For each program, only compulsory courses were included in the mapping, because elective courses, project courses and theses differ between students and cannot guarantee consistent role preparation. Course titles and detailed learning outcomes in the official syllabi were compared with the knowledge units in the European Cybersecurity Education and Professional Training Minimum Reference Curriculum. When a course title exactly matched a curriculum item (for example &#x201C;Network and Applications Security&#x201D;), it was assigned to the corresponding role or roles in the European Cybersecurity Skills Framework. For courses that were not explicitly listed, the first author read the course description and learning outcomes and coded the course to the role whose knowledge units best reflected the main focus of the course. For instance, a course emphasizing network architecture, secure configuration and administration was mapped to the Cybersecurity Architect and Cybersecurity Implementer roles.</p>
</sec>
<sec id="sec14">
<title>Sample selection for universities</title>
<p>The study focused exclusively on academic programs offered by Swedish universities, excluding vocational or private institutions. Emphasis was placed on Master&#x2019;s degree programs (60&#x2013;120 credits) explicitly addressing cybersecurity, information security, or network security. Programs were identified using the official Swedish university admissions portals (<xref ref-type="bibr" rid="ref42">Universityadmissions.se, 2025</xref>; <xref ref-type="bibr" rid="ref3">Antagning.se, 2024</xref>) for the Autumn 2024 semester. To ensure relevance, search terms included &#x201C;Cybersecurity,&#x201D; &#x201C;Information Security,&#x201D; and &#x201C;Network Security,&#x201D; alongside their Swedish equivalents. Systematic exclusion of duplicate programs, non-relevant offerings, and programs with both Swedish and English versions resulted in a refined sample of twelve Master&#x2019;s programs offered at 11 Swedish universities, comprising 91 compulsory courses.</p>
</sec>
<sec id="sec15">
<title>Semi-structured interviews</title>
<p>To complement document analysis, semi-structured interviews were conducted with program coordinators responsible for the selected cybersecurity programs. This qualitative method was chosen for its ability to capture nuanced perspectives and in-depth insights into curriculum design, course content, and graduate preparedness (<xref ref-type="bibr" rid="ref109">Barriball and While, 1994</xref>). Interviews were conducted via Zoom, allowing flexibility for participants across different locations while maintaining the benefits of face-to-face interaction. Participants received a summary of the ECSF prior to interviews to provide context, but were not informed of the specific interview questions to ensure unbiased responses. Seven coordinators participated, representing a mix of cybersecurity and information security programs, providing rich, context-specific data. The interviewees included program directors and course coordinators with backgrounds in computer science, information systems and information security, and with several years of experience in curriculum development. To reduce the risk of social desirability bias, interviews were conducted by a researcher who was not directly involved in the programs under study, and participants were assured that their institutions and programs would not be identifiable in the reporting. During analysis, contrasting views were noted and retained rather than forced into a single consensus narrative, and interpretations were discussed among the author team to check for alternative readings of the data.</p>
<p>The interviews were structured following a five-step guide, encompassing preparation, leveraging existing knowledge, developing and piloting the interview guide, and finalizing questions (<xref ref-type="bibr" rid="ref25">Kallio et al., 2016</xref>). Questions focused on four main areas: program design and frameworks, role relevance and essential skills, assessment and evaluation, and success factors and challenges. This structure allowed participants to reflect on curriculum alignment with ECSF roles, industry needs, and the effectiveness of their programs in developing key professional competencies.</p>
</sec>
<sec id="sec16">
<title>Data analysis</title>
<p>Interview recordings were transcribed verbatim to facilitate in-depth qualitative analysis (<xref ref-type="bibr" rid="ref27">Kvale, 2007</xref>). Data analysis employed descriptive and pattern coding techniques, identifying recurring themes and patterns across interviews. Attribute coding was also used to contextualize responses based on participant roles and institutional characteristics (<xref ref-type="bibr" rid="ref44">Wholey et al., 2010</xref>). This iterative approach ensured that emerging insights were continuously refined and integrated, enhancing the reliability and validity of the findings.</p>
<p>All interview transcripts were imported into qualitative analysis software (NVivo) and coded by the first author. An initial codebook was developed deductively from the interview guide (program design and frameworks, role relevance and skills, assessment and evaluation, success factors and challenges) and was then refined inductively as new themes emerged in the data. To enhance consistency, previously coded transcripts were revisited whenever new codes were added or definitions were adjusted. Descriptive codes captured what coordinators reported, while pattern codes grouped related statements into higher-level themes on, for example, curriculum change processes or collaboration with industry.</p>
</sec>
<sec id="sec17">
<title>Validity and reliability</title>
<p>The combination of document analysis and semi-structured interviews strengthened the study&#x2019;s validity by triangulating multiple data sources (<xref ref-type="bibr" rid="ref13">Denzin and Lincoln, 2005</xref>). Framework-based mapping provided a structured and consistent evaluation of curricula, while interviews allowed for exploration of participant perceptions and experiences. Reflexivity, neutral descriptors, and pattern matching were applied to minimize bias and ensure credible interpretations (<xref ref-type="bibr" rid="ref21">Johnson, 1997</xref>).</p>
</sec>
</sec>
<sec sec-type="results" id="sec18">
<title>Results</title>
<p>This section presents the results data derived from the study, beginning with the findings from the mapping of university courses against the ECSF framework. Following this, insights obtained from semi-structured interviews with program coordinators are detailed. By presenting the results sequentially, this chapter aims to provide a comprehensive overview of the research findings obtained through both methodologies. The integration of these results contributes to a deeper understanding of the current state of cybersecurity education in Sweden, highlighting the alignment of curricula with professional requirements and identifying potential gaps in preparing graduates for roles in the cybersecurity workforce. In total, the dataset included 12 master&#x2019;s programs at 11 universities and 91 compulsory courses.</p>
<sec id="sec19">
<title>Mapping course contents to roles</title>
<p>As introduced previously, the European Cybersecurity Skills Framework (ECSF) defines twelve roles in the cybersecurity domain, each requiring a distinct set of knowledge and competencies. These roles are designed to cover the diverse range of responsibilities and challenges encountered by cybersecurity professionals in contemporary organizations. The twelve roles are:</p>
<list list-type="bullet">
<list-item>
<p>Chief Information Security Officer (CISO): Oversees the organization&#x2019;s overall cybersecurity strategy, ensuring alignment with business goals and regulatory requirements (<xref ref-type="bibr" rid="ref104">ENISA, 2024</xref>).</p>
</list-item>
<list-item>
<p>Cyber Incident Responder: Responds swiftly to cyber incidents, implementing mitigation strategies to reduce potential damage (<xref ref-type="bibr" rid="ref104">ENISA, 2024</xref>).</p>
</list-item>
<list-item>
<p>Cyber Legal, Policy and Compliance Officer: Ensures compliance with relevant laws and regulations governing cybersecurity practices (<xref ref-type="bibr" rid="ref104">ENISA, 2024</xref>).</p>
</list-item>
<list-item>
<p>Cyber Threat Intelligence Specialist: Analyzes threat intelligence to anticipate and mitigate emerging cyber risks (<xref ref-type="bibr" rid="ref104">ENISA, 2024</xref>).</p>
</list-item>
<list-item>
<p>Cybersecurity Architect: Designs and implements secure systems and networks, integrating security principles at all stages of development (<xref ref-type="bibr" rid="ref104">ENISA, 2024</xref>).</p>
</list-item>
<list-item>
<p>Cybersecurity Auditor: Conducts evaluations to ensure the effectiveness of security measures and identifies areas for improvement (<xref ref-type="bibr" rid="ref104">ENISA, 2024</xref>).</p>
</list-item>
<list-item>
<p>Cybersecurity Educator: Develops and delivers training programs to improve cybersecurity awareness and skills among individuals and organizations (<xref ref-type="bibr" rid="ref104">ENISA, 2024</xref>).</p>
</list-item>
<list-item>
<p>Cybersecurity Implementer: Designs, implements, and manages cybersecurity solutions across systems, networks, and software applications (<xref ref-type="bibr" rid="ref104">ENISA, 2024</xref>).</p>
</list-item>
<list-item>
<p>Cybersecurity Researcher: Engages in research to discover vulnerabilities and threats while developing innovative cybersecurity solutions (<xref ref-type="bibr" rid="ref104">ENISA, 2024</xref>).</p>
</list-item>
<list-item>
<p>Cybersecurity Risk Manager: Evaluates and mitigates risks associated with cybersecurity threats, ensuring preparedness for potential impacts (<xref ref-type="bibr" rid="ref104">ENISA, 2024</xref>).</p>
</list-item>
<list-item>
<p>Digital Forensics Investigator: Investigates and analyzes digital evidence related to cybercrimes and security incidents (<xref ref-type="bibr" rid="ref104">ENISA, 2024</xref>).</p>
</list-item>
<list-item>
<p>Penetration Tester: Conducts authorized simulated attacks to identify vulnerabilities and strengthen organizational security (<xref ref-type="bibr" rid="ref104">ENISA, 2024</xref>).</p>
</list-item>
</list>
<p>These roles reflect the increasing complexity and interconnectedness of modern digital systems. The ECSF framework serves as a benchmark for defining the competencies needed to fill these roles and provides a reference point for evaluating cybersecurity education programs.</p>
<p>CyberSec4Europe has conducted a comprehensive review of cybersecurity educational and training initiatives across Europe (<xref ref-type="bibr" rid="ref16">European Cyber Security Organization, 2023</xref>). This initiative curates a wide range of programs and contributes to the development of the European Cybersecurity Education and Professional Training Minimum Reference Curriculum. By leveraging this framework, the study aimed to assess the alignment of Swedish university programs with the knowledge requirements associated with each ECSF role.</p>
</sec>
<sec id="sec20">
<title>Mapping courses to roles</title>
<p>To align university courses with ECSF-defined knowledge areas, the study employed a mapping approach based on the European Cybersecurity Education and Professional Training Minimum Reference Curriculum (<xref ref-type="bibr" rid="ref16">European Cyber Security Organization, 2023</xref>). <xref ref-type="table" rid="tab1">Table 1</xref> summarizes how each course corresponds to the ECSF roles. It is important to note that the Minimum Reference Curriculum emphasizes foundational knowledge and skills required for each role. These courses provide essential preparation but do not guarantee mastery or readiness for independent professional practice. For instance, a course in &#x201C;Cybersecurity Principles&#x201D; may contribute to the competencies needed for a CISO but is not sufficient on its own to fully prepare a graduate for this role.</p>
<table-wrap position="float" id="tab1">
<label>Table 1</label>
<caption>
<p>Mapping of courses to ECSF roles.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="left" valign="top">Subject name</th>
<th align="left" valign="top">Mapping with ENISA ECSF roles</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="top">ICT Infrastructure and Security</td>
<td align="left" valign="top">Cybersecurity Architect, Cybersecurity Implementer</td>
</tr>
<tr>
<td align="left" valign="top">Cybersecurity Principles</td>
<td align="left" valign="top">Chief Information Security Officer (CISO), Cybersecurity Auditor, Cybersecurity Implementer</td>
</tr>
<tr>
<td align="left" valign="top">Information and Cybersecurity Management</td>
<td align="left" valign="top">Cyber Legal, Policy and Compliance Officer, CISO, Cybersecurity Risk Manager</td>
</tr>
<tr>
<td align="left" valign="top">Cybersecurity Project Management</td>
<td align="left" valign="top">CISO, Cybersecurity Researcher, Cybersecurity Implementer</td>
</tr>
<tr>
<td align="left" valign="top">Information Systems Security</td>
<td align="left" valign="top">CISO, Cybersecurity Architect, Cybersecurity Implementer</td>
</tr>
<tr>
<td align="left" valign="top">Enterprise Cybersecurity Practice</td>
<td align="left" valign="top">CISO, Cybersecurity Risk Manager, Cybersecurity Implementer, Cyber Incident Responder</td>
</tr>
<tr>
<td align="left" valign="top">Network and Applications Security</td>
<td align="left" valign="top">Cyber Threat Intelligence Specialist, Cybersecurity Implementer, Penetration Tester</td>
</tr>
<tr>
<td align="left" valign="top">Vulnerability Assessment and Threat Management</td>
<td align="left" valign="top">Penetration Tester, Cyber Threat Intelligence Specialist, Digital Forensics Investigator, Cyber Incident Responder</td>
</tr>
<tr>
<td align="left" valign="top">Cybersecurity for AI</td>
<td align="left" valign="top">Cyber Threat Intelligence Specialist, Cybersecurity Researcher</td>
</tr>
<tr>
<td align="left" valign="top">Machine Learning Security</td>
<td align="left" valign="top">Cyber Threat Intelligence Specialist, Cybersecurity Architect, Cybersecurity Researcher</td>
</tr>
<tr>
<td align="left" valign="top">Cybersecurity for Cloud Technologies</td>
<td align="left" valign="top">Cyber Legal, Policy and Compliance Officer, Cyber Threat Intelligence Specialist, Cybersecurity Implementer, Cybersecurity Risk Manager</td>
</tr>
<tr>
<td align="left" valign="top">Cybersecurity for the Digital Transformation</td>
<td align="left" valign="top">CISO, Cybersecurity Educator, Cybersecurity Researcher</td>
</tr>
<tr>
<td align="left" valign="top">Cybersecurity and Digital Era Leadership</td>
<td align="left" valign="top">CISO, Cybersecurity Educator</td>
</tr>
<tr>
<td align="left" valign="top">Ethical Hacking and Technical Validation</td>
<td align="left" valign="top">Penetration Tester, Cyber Threat Intelligence Specialist, Digital Forensics Investigator</td>
</tr>
<tr>
<td align="left" valign="top">Cybersecurity and Cyber Ranges in Practice</td>
<td align="left" valign="top">Cybersecurity Educator, Penetration Tester</td>
</tr>
<tr>
<td align="left" valign="top">Cybersecurity Forensics/Threat Intelligence</td>
<td align="left" valign="top">Cyber Threat Intelligence Specialist, Digital Forensics Investigator</td>
</tr>
<tr>
<td align="left" valign="top">IoT Cybersecurity Practitioner</td>
<td align="left" valign="top">Cyber Legal, Policy and Compliance Officer, Cybersecurity Educator, Cybersecurity Researcher</td>
</tr>
</tbody>
</table>
</table-wrap>
<p><xref ref-type="table" rid="tab1">Table 1</xref> illustrates these alignments with several concrete examples. Courses such as &#x201C;Network and Applications Security&#x201D; and &#x201C;Vulnerability Assessment and Threat Management&#x201D; address technical content on secure network configuration, attack techniques and incident handling, and are therefore mapped mainly to the Penetration Tester, Cyber Threat Intelligence Specialist, Digital Forensics Investigator and Cyber Incident Responder roles. In contrast, courses like &#x201C;Information and Cybersecurity Management&#x201D; and &#x201C;Cybersecurity and Digital Era Leadership&#x201D; focus on governance, risk management, regulatory compliance and strategic decision-making, which align more closely with roles such as Chief Information Security Officer, Cyber Legal, Policy and Compliance Officer and Cybersecurity Risk Manager. This combination shows how different types of curriculum content support distinct clusters of ECSF roles.</p>
<p>Graduates are assumed to be ready for junior-level roles, such as trainee positions, where practical experience complements theoretical knowledge (<xref ref-type="bibr" rid="ref16">European Cyber Security Organization, 2023</xref>). Elective courses, project-based learning, and thesis work were excluded from the mapping due to their variability across students, focusing the assessment solely on core program components.</p>
<p>The mapping demonstrates that while foundational courses are covered across multiple universities, specialized topics such as AI security, cloud security, and machine learning security appear less frequently. This disparity highlights potential gaps in preparing students for emerging cybersecurity challenges, and suggests that curricula could be strengthened by expanding dedicated content on AI security, machine learning security and cloud security beyond the small number of courses currently identified. This course to role mapping forms the curriculum level of the ECCA Framework and provides the empirical basis for distinguishing different types of Swedish cybersecurity related master&#x2019;s programs in the taxonomy presented later in the article.</p>
</sec>
<sec id="sec21">
<title>University-specific analysis</title>
<p><xref ref-type="fig" rid="fig1">Figure 1</xref> illustrates the frequency of courses offered by universities, while <xref ref-type="fig" rid="fig2">Figure 2</xref> summarizes the number of roles each university addresses. The data indicate that certain emerging topics, including AI, machine learning, and cloud cybersecurity, are underrepresented, suggesting areas for curriculum development.</p>
<fig position="float" id="fig1">
<label>Figure 1</label>
<caption>
<p>Selection process and sample overview of Swedish master&#x2019;s programmes included in the study (Autumn 2024 intake), showing the inclusion and exclusion steps and the final set of programmes and compulsory courses analysed.</p>
</caption>
<graphic xlink:href="feduc-11-1769241-g001.tif" mimetype="image" mime-subtype="tiff">
<alt-text content-type="machine-generated">Bar chart comparing the number of roles based on the ECS framework across eleven universities, with Link&#x00F6;ping University having the highest number at twelve and Karlstad University the lowest at five.</alt-text>
</graphic>
</fig>
<fig position="float" id="fig2">
<label>Figure 2</label>
<caption>
<p>Coverage of European Cybersecurity Skills Framework role profiles across the analysed Swedish master&#x2019;s programmes based on mapping of compulsory courses to role-related knowledge units.</p>
</caption>
<graphic xlink:href="feduc-11-1769241-g002.tif" mimetype="image" mime-subtype="tiff">
<alt-text content-type="machine-generated">Bar chart showing the number of universities offering various cybersecurity-related courses, with Cybersecurity Principles offered by nine universities as the most common, followed by Ethical Hacking and Technical Validation with six, and other courses offered by fewer institutions.</alt-text>
</graphic>
</fig>
</sec>
<sec id="sec22">
<title>Interview results</title>
<p>Interviews with program coordinators provide qualitative insights into the design, implementation, and evaluation of cybersecurity programs in Sweden. Respondents were divided into two categories: coordinators from cybersecurity-focused programs and those from information security programs. Findings are organized into four thematic areas: Program Design and Framework, Role Relevance and Essential Skills, Assessment and Evaluation, and Success Factors and Challenges.</p>
</sec>
<sec id="sec23">
<title>Program design and framework</title>
<p>Responses revealed variations in the adoption of frameworks such as ECSF, CSEC2017, and CyBok. Some coordinators integrate frameworks extensively, while others adapt existing courses or develop new ones to address identified gaps. Coordinators highlighted that ECSF serves as guidance for professional roles rather than academic program design. Many emphasized that universities should focus on foundational knowledge and research competencies, leaving role-specific vocational training for post-graduation or industry programs. Within the ECCA Framework these interview insights correspond to the program design and institutional conditions levels, showing how local choices and constraints shape ECSF alignment in practice.</p>
</sec>
<sec id="sec24">
<title>Role relevance and essential skills</title>
<p>Coordinators noted the importance of aligning programs with industry demands. Technical programs emphasize skills for Penetration Testers and Digital Forensics Investigators, while managerial or human-centric programs focus on CISOs and Risk Managers. Internship opportunities remain limited, and industry requests for trainees with broad skill sets underscore the value of versatile graduates.</p>
</sec>
<sec id="sec25">
<title>Assessment and evaluation</title>
<p>Universities employ metrics such as graduate employment rates, student feedback, and industry input to evaluate program effectiveness. Initiatives like Cybercampus Sweden aim to consolidate resources, promote cross-university collaboration, and enhance research and education in cybersecurity. While frequent minor updates occur, comprehensive curriculum redesigns are less common due to resource constraints and the complexity of implementation.</p>
</sec>
<sec id="sec26">
<title>Success factors and challenges</title>
<p>Key factors for program success include responsiveness to industry developments, balanced theoretical and practical training, and inclusive learning practices. Challenges include recruiting qualified faculty, rapidly evolving technologies, and the resource-intensive nature of implementing new courses. Coordinators stressed the importance of developing both technical and soft skills, including communication and management competencies, to prepare graduates for diverse professional roles.</p>
<p>The results indicate that Swedish universities provide foundational knowledge for all ECSF roles, but specialized courses are unevenly distributed. Interview findings highlight the tension between academic priorities and industry needs, with practical constraints affecting program design and update frequency. Emerging areas such as AI, machine learning, and cloud security are less represented, suggesting potential directions for curriculum enhancement. Overall, the integration of course mapping with interview insights provides a comprehensive view of Sweden&#x2019;s cybersecurity education landscape, highlighting strengths, gaps, and opportunities for continuous improvement.</p>
<p>In summary, the main empirical findings are: (1) all twelve ECSF roles are covered across the Swedish programs, but the depth and specialization of coverage vary substantially between institutions; (2) technical roles such as Penetration Tester, Digital Forensics Investigator and Cybersecurity Architect are strongly represented in some programs, while managerial and policy-oriented roles are more visible in others; (3) emerging domains such as artificial intelligence security, machine learning security and cloud security are only marginally addressed in compulsory courses; and (4) structural constraints on staffing, time and internal processes limit the pace at which programs can respond to new competence needs.</p>
</sec>
</sec>
<sec id="sec27">
<title>Taxonomy of Swedish cybersecurity-related master&#x2019;s programs</title>
<p>Based on the ECCA Framework and the combined course mapping and interview findings, the analysed programs can be grouped into four categories. Technical specialist programs focus on areas such as penetration testing, digital forensics and secure systems engineering and primarily prepare students for highly technical ECSF roles. Management-oriented information security programs emphasize governance, risk management, compliance and organizational security, aligning more closely with roles such as CISO, Cybersecurity Risk Manager and Cyber Legal, Policy and Compliance Officer. Hybrid socio-technical cybersecurity programs deliberately combine technical content with human, organizational and policy perspectives and aim to provide broad preparation across multiple ECSF roles. Finally, general IS / CS programs with limited cybersecurity anchoring include only a small number of compulsory security courses and therefore offer partial preparation for specific ECSF roles rather than a full cybersecurity profile.</p>
</sec>
<sec id="sec28">
<title>Discussion and conclusion</title>
<p>The discussion focuses on key findings from this study and highlights areas for further research within the Swedish cybersecurity education landscape. Analysis of over half of Sweden&#x2019;s universities offering cybersecurity programs indicates that no single framework is universally adopted across institutions. Various organizations, including ENISA, have developed frameworks to guide curriculum development, aiming to harmonize cybersecurity education and address skill shortages across Europe. However, Swedish universities have largely not adopted these frameworks, reflecting the autonomy inherent in higher education institutions and the need for academic flexibility.</p>
<p>As cybersecurity education becomes increasingly prevalent at the undergraduate level, there is a growing need for master&#x2019;s programs to focus on specialized content. Students often acquire foundational cybersecurity knowledge during their undergraduate studies, creating an expectation for master&#x2019;s programs to provide deeper technical and managerial expertise. Despite this, there is no standardized approach in Sweden for assessing program effectiveness, though prior research highlights the importance of practical instruction, laboratory exercises, and periodic self-assessment to ensure compliance with accreditation standards and learning outcomes. The dynamic nature of cybersecurity&#x2014;shaped by evolving digital technologies, emerging threats, and industry requirements&#x2014;further complicates curriculum design and evaluation.</p>
<p>The interview findings also show that structured internship opportunities in Swedish cybersecurity master&#x2019;s programs are limited, with only one university in the sample offering a systematic internship model. Most programs rely on individual arrangements or thesis projects for workplace exposure, which creates unequal access to practice-based learning. To strengthen the link between curricula and labor market needs, universities could make internships an integrated and credit-bearing component of the program, develop common guidelines with industry partners for supervision and assessment, and use ECSF roles as a reference when formulating learning outcomes for internship placements. Such measures would increase both the number and the quality of internships and better support students in applying their knowledge in real organizational settings.</p>
<p>Interviewees pointed to several reasons for this limited coverage of emerging areas such as artificial intelligence security, machine learning security and cloud security. Some coordinators described a lack of staff with specialized expertise in these domains, which makes it difficult to develop and sustain advanced courses. Others emphasized that program changes are slow and administratively demanding, so updating curricula to include new topics can take several years. In addition, many programs prioritize foundational security concepts and core infrastructure topics, which leaves little room for rapidly evolving specializations. Together, these factors help explain why emerging domains are often integrated as small topics within existing courses rather than offered as dedicated modules, despite being recognized as important for future graduates.</p>
<p>Two key strategies have been suggested to enhance cybersecurity education. First, closer collaboration between universities and professional organizations, such as ENISA, NIST, IEEE, and ACM, could help align curricula with industry needs and better prepare graduates for the workforce. Second, the incorporation of educational psychology principles, including instructional theories like cognitive load theory, can improve teaching effectiveness and optimize learning outcomes.</p>
</sec>
<sec id="sec29">
<title>Scientific contribution</title>
<p>The contribution of this article is threefold on cybersecurity education and competence development. First, it proposes the ECCA Framework (ECSF-based Cybersecurity Curriculum Alignment Framework), which integrates four levels of analysis: (1) external skills frameworks and policy expectations, (2) university-level program design logics, (3) curriculum-level ECSF role coverage based on mapping 91 compulsory courses, and (4) institutional conditions for curriculum change identified through interviews with seven program coordinators. The framework shows that national alignment to ECSF cannot be understood only by counting which roles are covered; it also depends on how programs are designed and governed, and on their capacity to adapt. Second, based on this framework, the article introduces a taxonomy of Swedish cybersecurity-related master&#x2019;s programs that distinguishes between technical specialist programs, management-oriented information security programs, hybrid socio-technical cybersecurity programs, and general IS / CS programs with limited cybersecurity anchoring. This taxonomy is empirically grounded in an ECSF-based mapping of 91 compulsory courses and seven in-depth interviews with program coordinators, and can be reused to classify curricula in other national contexts or in longitudinal studies. Third, the article contributes empirical evidence on the fragmented and <italic>ad hoc</italic> use of skills frameworks such as ECSF in Swedish higher education. It identifies systemic barriers to program adaptiveness, including staff shortages, slow and complex institutional change processes, and limited collaboration with industry, which collectively constrain universities&#x2019; ability to respond to emerging needs such as AI security, machine learning security, and cloud security. Together, these contributions deepen our understanding of how a European skills framework is translated into actual curricula in a specific national context and offer a structured basis for future comparative and longitudinal studies of cybersecurity education.</p>
<sec id="sec30">
<title>Research limitations and future research</title>
<p>This study include the small sample size of seven interviewees and the evolving nature of university programs, which may affect the generalizability of the findings. Time constraints and participants&#x2019; availability further limited the breadth of data collection. Future research could expand to survey all Swedish universities offering cybersecurity programs, employ longitudinal designs to track curriculum evolution, and investigate standardized methods for assessing program effectiveness. Future work should focus on comparative analyses of different educational frameworks, examining their strengths, limitations, and applicability within Sweden. Research into systematic evaluation methodologies for cybersecurity programs could support curriculum enhancement and ensure alignment with both industry demands and societal needs.</p>
<p>To sum up, the study demonstrates that while Swedish universities offer broad coverage of cybersecurity roles aligned with the European Cybersecurity Skills Framework (ECSF), gaps remain, particularly in specialized areas such as AI, cloud technologies, and machine learning security. Universities exhibit varied approaches to program design, reflecting both strengths in adaptability and challenges in ensuring consistency. Internship opportunities remain limited, potentially hindering students&#x2019; practical exposure. Success factors include staying abreast of industry trends, integrating practical skills, and fostering inclusivity, while challenges include rapid technological change, recruitment of qualified staff, and resource constraints. Initiatives like Cybercampus Sweden highlight opportunities for collaboration and innovation, emphasizing the need for continued dialog between academia, industry, and policymakers to ensure that cybersecurity education remains effective, relevant, and responsive to evolving challenges.</p>
</sec>
</sec>
</body>
<back>
<sec sec-type="data-availability" id="sec31">
<title>Data availability statement</title>
<p>The raw data supporting the conclusions of this article will be made available by the authors, without undue reservation.</p>
</sec>
<sec sec-type="ethics-statement" id="sec32">
<title>Ethics statement</title>
<p>Ethical principles were prioritized throughout the study, with particular attention to confidentiality, informed consent, and participant well-being (<xref ref-type="bibr" rid="ref8">Brinkmann and Kvale, 2005</xref>; <xref ref-type="bibr" rid="ref110">DiCicco-Bloom and Crabtree, 2006</xref>). Participants were informed of the study&#x2019;s objectives via email and provided consent for recording. Identifying information, including program and university names, was withheld to protect anonymity. These practices ensured the ethical integrity of the research and safeguarded participants while generating valuable insights into cybersecurity education in Sweden.</p>
</sec>
<sec sec-type="author-contributions" id="sec33">
<title>Author contributions</title>
<p>BB: Investigation, Conceptualization, Resources, Validation, Writing &#x2013; review &#x0026; editing, Visualization, Writing &#x2013; original draft, Methodology, Software, Data curation, Formal analysis. AH: Conceptualization, Project administration, Supervision, Writing &#x2013; original draft, Investigation, Funding acquisition, Writing &#x2013; review &#x0026; editing.</p>
</sec>
<sec sec-type="COI-statement" id="sec34">
<title>Conflict of interest</title>
<p>The author(s) declared that this work was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p>
</sec>
<sec sec-type="ai-statement" id="sec35">
<title>Generative AI statement</title>
<p>The author(s) declared that Generative AI was not used in the creation of this manuscript.</p>
<p>Any alternative text (alt text) provided alongside figures in this article has been generated by Frontiers with the support of artificial intelligence and reasonable efforts have been made to ensure accuracy, including review by the authors wherever possible. If you identify any issues, please contact us.</p>
</sec>
<sec sec-type="disclaimer" id="sec36">
<title>Publisher&#x2019;s note</title>
<p>All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.</p>
</sec>
<ref-list>
<title>References</title>
<ref id="ref1"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Abdullahi</surname><given-names>A.</given-names></name> <name><surname>Olivia</surname><given-names>M.</given-names></name></person-group> (<year>2024</year>). Nationell kompetensf&#x00F6;rs&#x00F6;rjning &#x2502; IT-, informationsoch cybers&#x00E4;kerhet. Available at: <ext-link xlink:href="https://info.knowit.se/rapport-nationell-kompetens-forsorjning" ext-link-type="uri">https://info.knowit.se/rapport-nationell-kompetens-forsorjning</ext-link> (Accessed January 25, 2024)</mixed-citation></ref>
<ref id="ref2"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>AlDaajeh</surname><given-names>S.</given-names></name> <name><surname>Saleous</surname><given-names>H.</given-names></name> <name><surname>Alrabaee</surname><given-names>S.</given-names></name> <name><surname>Barka</surname><given-names>E.</given-names></name> <name><surname>Breitinger</surname><given-names>F.</given-names></name> <name><surname>Choo</surname><given-names>K. K. R.</given-names></name></person-group> (<year>2022</year>). <article-title>The role of national cybersecurity strategies on the improvement of cybersecurity education</article-title>. <source>Comput. Secur.</source> <volume>119</volume>:<fpage>102754</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.cose.2022.102754</pub-id></mixed-citation></ref>
<ref id="ref3"><mixed-citation publication-type="other"><collab id="coll1">Antagning.se</collab> <source>Anm&#x00E4;lan till h&#x00F6;gskola och universitet</source>. <publisher-name>Antagning.se</publisher-name>, Stockholm (<year>2024</year>). Available at: <ext-link xlink:href="https://www.antagning.se/" ext-link-type="uri">https://www.antagning.se/</ext-link> (Accessed January 20, 2024)</mixed-citation></ref>
<ref id="ref101"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Auffret</surname><given-names>J.-P.</given-names></name> <name><surname>Snowdon</surname><given-names>J. L.</given-names></name> <name><surname>Stavrou</surname><given-names>A.</given-names></name> <name><surname>Katz</surname><given-names>J. S.</given-names></name> <name><surname>Kelley</surname><given-names>D.</given-names></name> <name><surname>Rahman</surname><given-names>R. S.</given-names></name> <etal/></person-group>. (<year>2017</year>). <article-title>Cybersecurity leadership: competencies, governance, and technologies for industrial control systems</article-title>. <source>Journal of Interconnection Networks</source> <volume>17</volume>:<fpage>1740001</fpage>.</mixed-citation></ref>
<ref id="ref109"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Barriball</surname><given-names>K. L.</given-names></name> <name><surname>While</surname><given-names>A.</given-names></name></person-group> (<year>1994</year>). <article-title>Collecting data using a semi-structured interview: a discussion paper</article-title>. <source>J. Adv. Nurs.</source> <volume>19</volume>, <fpage>328</fpage>&#x2013;<lpage>335</lpage>.</mixed-citation></ref>
<ref id="ref105"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Belle</surname><given-names>T.</given-names></name> <name><surname>Imboden</surname><given-names>T.</given-names></name> <name><surname>Martin</surname><given-names>N. L.</given-names></name></person-group> (<year>2013</year>). <article-title>An undergraduate information security program: more than a curriculum</article-title>. <source>J. Inf. Syst. Educ.</source> <volume>24</volume>, <fpage>11</fpage>&#x2013;<lpage>18</lpage>.</mixed-citation></ref>
<ref id="ref4"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Beuran</surname><given-names>R.</given-names></name> <name><surname>Chinen</surname><given-names>K. I.</given-names></name> <name><surname>Tan</surname><given-names>Y.</given-names></name> <name><surname>Shinoda</surname><given-names>Y.</given-names></name></person-group> (<year>2016</year>). <source>Towards effective cybersecurity education and training Cham, Springer</source>.</mixed-citation></ref>
<ref id="ref5"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Beuran</surname><given-names>R.</given-names></name> <name><surname>Tang</surname><given-names>D.</given-names></name> <name><surname>Pham</surname><given-names>C.</given-names></name> <name><surname>Chinen</surname><given-names>K. I.</given-names></name> <name><surname>Tan</surname><given-names>Y.</given-names></name> <name><surname>Shinoda</surname><given-names>Y.</given-names></name></person-group> (<year>2018</year>). <article-title>Integrated framework for hands-on cybersecurity training: CyTrONE</article-title>. <source>Comput. Secur.</source> <volume>78</volume>, <fpage>43</fpage>&#x2013;<lpage>59</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.cose.2018.06.001</pub-id></mixed-citation></ref>
<ref id="ref6"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Bogolea</surname><given-names>B.</given-names></name> <name><surname>Wijekumar</surname><given-names>K.</given-names></name></person-group> (<year>2004</year>). <source>Information security curriculum creation: A case study. In proceedings of the 1st annual conference on information security curriculum development</source>, Piscataway: IEEE, <fpage>59</fpage>&#x2013;<lpage>65</lpage>.</mixed-citation></ref>
<ref id="ref7"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Bowen</surname><given-names>G. A.</given-names></name></person-group> (<year>2009</year>). <article-title>Document analysis as a qualitative research method</article-title>. <source>Qual. Res. J.</source> <volume>9</volume>, <fpage>27</fpage>&#x2013;<lpage>40</lpage>. doi: <pub-id pub-id-type="doi">10.3316/qrj0902027</pub-id></mixed-citation></ref>
<ref id="ref8"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Brinkmann</surname><given-names>S.</given-names></name> <name><surname>Kvale</surname><given-names>S.</given-names></name></person-group> (<year>2005</year>). <article-title>Confronting the ethics of qualitative research</article-title>. <source>J. Constr. Psychol.</source> <volume>18</volume>, <fpage>157</fpage>&#x2013;<lpage>181</lpage>. doi: <pub-id pub-id-type="doi">10.1080/10720530590914789</pub-id></mixed-citation></ref>
<ref id="ref107"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Cabaj</surname><given-names>K.</given-names></name> <name><surname>Domingos</surname><given-names>D.</given-names></name> <name><surname>Kotulski</surname><given-names>Z.</given-names></name> <name><surname>Resp&#x00ED;cio</surname><given-names>A.</given-names></name></person-group> (<year>2018</year>). <article-title>Cybersecurity education: evolution of the discipline and analysis of master programs</article-title>. <source>Comput. Secur.</source> <volume>75</volume>, <fpage>24</fpage>&#x2013;<lpage>35</lpage>.</mixed-citation></ref>
<ref id="ref9"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Chakravarty</surname><given-names>A.</given-names></name> <name><surname>Grewal</surname><given-names>R.</given-names></name> <name><surname>Sambamurthy</surname><given-names>V.</given-names></name></person-group> (<year>2013</year>). <article-title>Information technology competencies, organizational agility, and firm performance: enabling and facilitating roles</article-title>. <source>Inf. Syst. Res.</source> <volume>24</volume>, <fpage>976</fpage>&#x2013;<lpage>997</lpage>. doi: <pub-id pub-id-type="doi">10.1287/isre.2013.0500</pub-id></mixed-citation></ref>
<ref id="ref106"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Cheung</surname><given-names>R. S.</given-names></name> <name><surname>Cohen</surname><given-names>J. P.</given-names></name> <name><surname>Lo</surname><given-names>H. Z.</given-names></name> <name><surname>Elia</surname><given-names>F.</given-names></name></person-group> (<year>2011</year>). <source>Challenge-based learning in cybersecurity education</source>. <publisher-loc>Computer Engineering and Applied Computing</publisher-loc>: <publisher-name>In Proceedings of the World Congress in Computer Science</publisher-name>.</mixed-citation></ref>
<ref id="ref10"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Conklin</surname><given-names>W. A.</given-names></name> <name><surname>Cline</surname><given-names>R. E.</given-names></name> <name><surname>Roosa</surname><given-names>T.</given-names></name></person-group> (<year>2014</year>). <source>Re-engineering cybersecurity education in the US: An analysis of the critical factors. In 2014 47th Hawaii international conference on system sciences</source>. <publisher-name>New York: IEEE</publisher-name>, <fpage>2006</fpage>&#x2013;<lpage>2014</lpage>.</mixed-citation></ref>
<ref id="ref11"><mixed-citation publication-type="book"><collab id="coll2">CSEC2017 Joint Task Force</collab> (<year>2017</year>). <source>Cybersecurity curricula 2017: Curriculum guidelines for postsecondary degree programs in cybersecurity</source>. <publisher-loc>New York</publisher-loc>: <publisher-name>ACM</publisher-name> Available at: <ext-link xlink:href="https://www.acm.org/binaries/content/assets/education/curricularecommendations/csec2017.pdf" ext-link-type="uri">https://www.acm.org/binaries/content/assets/education/curricularecommendations/csec2017.pdf</ext-link>. (Accessed February 10, 2026)</mixed-citation></ref>
<ref id="ref12"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Daswani</surname><given-names>N.</given-names></name> <name><surname>Elbayadi</surname><given-names>M.</given-names></name></person-group> (<year>2021</year>). &#x201C;<article-title>The yahoo breaches of 2013 and 2014</article-title>&#x201D; in <source>Big breaches. Sebastopol: O&#x2019;Reilly Media Cybersecurity lessons for everyone</source>, <fpage>155</fpage>&#x2013;<lpage>169</lpage>.</mixed-citation></ref>
<ref id="ref13"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Denzin</surname><given-names>N. K.</given-names></name> <name><surname>Lincoln</surname><given-names>Y. S.</given-names></name></person-group> (<year>2005</year>). <source>Handbook of qualitative research</source>. <publisher-loc>London, England</publisher-loc>: <publisher-name>SAGE</publisher-name>.</mixed-citation></ref>
<ref id="ref110"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>DiCicco-Bloom</surname><given-names>B.</given-names></name> <name><surname>Crabtree</surname><given-names>B. F.</given-names></name></person-group> (<year>2006</year>). <article-title>The qualitative research interview</article-title>. <source>Med. Educ.</source> <volume>40</volume>, <fpage>314</fpage>&#x2013;<lpage>321</lpage>.</mixed-citation></ref>
<ref id="ref14"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Di Franco</surname><given-names>F.</given-names></name> <name><surname>Grammatopoulcs</surname><given-names>A.</given-names></name></person-group> (<year>2022</year>). <source>European cybersecurity skills framework role profiles</source>. <publisher-name>Athens: ENISA</publisher-name>. Available online at: <ext-link xlink:href="https://www.enisa.europa.eu/publications/european-cybersecurity-skills-framework-role-profiles" ext-link-type="uri">https://www.enisa.europa.eu/publications/european-cybersecurity-skills-framework-role-profiles</ext-link> (Accessed January 15, 2024)</mixed-citation></ref>
<ref id="ref15"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Endicott-Popovsky</surname><given-names>B. E.</given-names></name> <name><surname>Popovsky</surname><given-names>V. M.</given-names></name></person-group> (<year>2014</year>). <article-title>Application of pedagogical fundamentals for the holistic development of cybersecurity professionals</article-title>. <source>ACM Inroads</source> <volume>5</volume>, <fpage>57</fpage>&#x2013;<lpage>68</lpage>. doi: <pub-id pub-id-type="doi">10.1145/2568195.2568214</pub-id></mixed-citation></ref>
<ref id="ref104"><mixed-citation publication-type="book"><collab id="coll5">ENISA</collab> (<year>2024</year>). <source>European cybersecurity skills framework (ECSF): The common language for cybersecurity professional workforce development</source>: <publisher-name>European Union Agency for Cybersecurity</publisher-name>.</mixed-citation></ref>
<ref id="ref16"><mixed-citation publication-type="other"><collab id="coll3">European Cyber Security Organization</collab>. (<year>2023</year>). <source>European cybersecurity education and professional training: Minimum reference curriculum</source>. <publisher-name>Brussels: ECSO</publisher-name>. Available at: <ext-link xlink:href="https://ecs-org.eu/?publications=european-cybersecurity-education-and-professional-training-minimum-reference-curriculum" ext-link-type="uri">https://ecs-org.eu/?publications=european-cybersecurity-education-and-professional-training-minimum-reference-curriculum</ext-link> (Accessed January 18, 2024)</mixed-citation></ref>
<ref id="ref108"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Fovino</surname><given-names>I. N.</given-names></name> <name><surname>Neisse</surname><given-names>R.</given-names></name> <name><surname>Hern&#x00E1;ndez-Ramos</surname><given-names>J. L.</given-names></name> <name><surname>Polemi</surname><given-names>N.</given-names></name> <name><surname>Ruzzante</surname><given-names>G.</given-names></name> <name><surname>Figwer</surname><given-names>M.</given-names></name> <etal/></person-group>. (<year>2019</year>). <source>A proposal for a European cybersecurity taxonomy</source>: <publisher-name>Publications Office of the European Union</publisher-name>.</mixed-citation></ref>
<ref id="ref17"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Hallett</surname><given-names>J.</given-names></name> <name><surname>Larson</surname><given-names>R.</given-names></name> <name><surname>Rashid</surname><given-names>A.</given-names></name></person-group>, (<year>2018</year>). <source>Mirror, mirror, on the wall: What are we teaching them all? Characterising the focus of cybersecurity curricular frameworks. 2018 USENIX workshop on advances in security education ASE 18</source>. Springer: Cham</mixed-citation></ref>
<ref id="ref18"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Hentea</surname><given-names>M.</given-names></name> <name><surname>Dhillon</surname><given-names>H. S.</given-names></name> <name><surname>Dhillon</surname><given-names>M.</given-names></name></person-group> (<year>2006</year>). <article-title>Towards changes in information security education</article-title>. <source>J. Inf. Technol. Educ. Res.</source> <volume>5</volume>, <fpage>221</fpage>&#x2013;<lpage>233</lpage>.</mixed-citation></ref>
<ref id="ref21"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Johnson</surname><given-names>R. B.</given-names></name></person-group> (<year>1997</year>). <article-title>Examining the validity structure of qualitative research</article-title>. <source>Education</source> <volume>118</volume>, <fpage>282</fpage>&#x2013;<lpage>292</lpage>.</mixed-citation></ref>
<ref id="ref22"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Joiner</surname><given-names>K. F.</given-names></name> <name><surname>Tutty</surname><given-names>M. G.</given-names></name></person-group> (<year>2018</year>). <article-title>A tale of two allied defence departments: new assurance initiatives for managing increasing system complexity, interconnectedness and vulnerability</article-title>. <source>Aust. J. Multi Discip. Eng.</source> <volume>14</volume>:<fpage>6407</fpage>. doi: <pub-id pub-id-type="doi">10.1080/14488388.2018.1426407</pub-id></mixed-citation></ref>
<ref id="ref23"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Jones</surname><given-names>K. S.</given-names></name> <name><surname>Namin</surname><given-names>A. S.</given-names></name> <name><surname>Armstrong</surname><given-names>M. E.</given-names></name></person-group> (<year>2018</year>). <article-title>The core cyber-defense knowledge, skills, and abilities that cybersecurity students should learn in school</article-title>. <source>ACM Trans. Comput. Educ.</source> <volume>18</volume>, <fpage>1</fpage>&#x2013;<lpage>12</lpage>. doi: <pub-id pub-id-type="doi">10.1145/3152893</pub-id></mixed-citation></ref>
<ref id="ref25"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Kallio</surname><given-names>H.</given-names></name> <name><surname>Pietil&#x00E4;</surname><given-names>A.</given-names></name> <name><surname>Johnson</surname><given-names>M.</given-names></name> <name><surname>Kangasniemi</surname><given-names>M.</given-names></name></person-group> (<year>2016</year>). <article-title>Systematic methodological review: developing a framework for a qualitative semi-structured interview guide</article-title>. <source>J. Adv. Nurs.</source> <volume>72</volume>, <fpage>2954</fpage>&#x2013;<lpage>2965</lpage>. doi: <pub-id pub-id-type="doi">10.1111/jan.13031</pub-id>, <pub-id pub-id-type="pmid">27221824</pub-id></mixed-citation></ref>
<ref id="ref27"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Kvale</surname><given-names>S.</given-names></name></person-group> (<year>2007</year>). <source>Doing interviews</source>.</mixed-citation></ref>
<ref id="ref30"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Marquardson</surname><given-names>J.</given-names></name> <name><surname>Gomillion</surname><given-names>D.</given-names></name></person-group> (<year>2018</year>). <article-title>Cyber security curriculum development: protecting students and institutions while providing hands-on experience</article-title>. <source>Inf. Syst. Educ. J.</source> <volume>16</volume>:<fpage>12</fpage>.</mixed-citation></ref>
<ref id="ref31"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>McDuffie</surname><given-names>E. L.</given-names></name> <name><surname>Piotrowski</surname><given-names>V. P.</given-names></name></person-group> (<year>2014</year>). <article-title>The future of cybersecurity education</article-title>. <source>Computer</source> <volume>47</volume>, <fpage>67</fpage>&#x2013;<lpage>69</lpage>. doi: <pub-id pub-id-type="doi">10.1109/mc.2014.224</pub-id></mixed-citation></ref>
<ref id="ref32"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>McGettrick</surname><given-names>A.</given-names></name></person-group> (<year>2013</year>). <article-title>Toward effective cybersecurity education</article-title>. <source>IEEE Secur. Priv.</source> <volume>11</volume>, <fpage>66</fpage>&#x2013;<lpage>68</lpage>. doi: <pub-id pub-id-type="doi">10.1109/msp.2013.155</pub-id></mixed-citation></ref>
<ref id="ref34"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Newhouse</surname><given-names>W.</given-names></name> <name><surname>Keith</surname><given-names>S.</given-names></name> <name><surname>Scribner</surname><given-names>B.</given-names></name> <name><surname>Witte</surname><given-names>G.</given-names></name></person-group> (<year>2017</year>). <source>National Initiative for Cybersecurity Education (NICE) cybersecurity workforce framework</source>. Gaithersburg: National Institute of Standards and Technology.</mixed-citation></ref>
<ref id="ref35"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Newlove-Eriksson</surname><given-names>L.</given-names></name> <name><surname>Giacomello</surname><given-names>G.</given-names></name> <name><surname>Eriksson</surname><given-names>J.</given-names></name></person-group> (<year>2018</year>). <article-title>The invisible hand? Critical information infrastructures, commercialisation and national security</article-title>. <source>Int. Spectator</source> <volume>53</volume>, <fpage>124</fpage>&#x2013;<lpage>140</lpage>. doi: <pub-id pub-id-type="doi">10.1080/03932729.2018.1458445</pub-id></mixed-citation></ref>
<ref id="ref100"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Parenty</surname><given-names>T. J.</given-names></name> <name><surname>Domet</surname><given-names>J. J.</given-names></name></person-group> (<year>2020</year>). <source>A leader&#x2019;s guide to cybersecurity: Why boards need to Lead and how to do it</source>: <publisher-name>Harvard Business Review Press</publisher-name>.</mixed-citation></ref>
<ref id="ref37"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Parrish</surname><given-names>A.</given-names></name> <name><surname>Impagliazzo</surname><given-names>J.</given-names></name> <name><surname>Raj</surname><given-names>R. K.</given-names></name> <name><surname>Santos</surname><given-names>H.</given-names></name> <name><surname>Asghar</surname><given-names>M. R.</given-names></name> <name><surname>J&#x00F8;sang</surname><given-names>A.</given-names></name> <etal/></person-group>. (<year>2018</year>). &#x201C;<article-title>Global perspectives on cybersecurity education for 2030: a case for a meta-discipline</article-title>&#x201D; in <source>Proceedings Companion of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education</source>.</mixed-citation></ref>
<ref id="ref103"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Petersen</surname><given-names>R.</given-names></name> <name><surname>Santos</surname><given-names>D.</given-names></name> <name><surname>Smith</surname><given-names>M.</given-names></name> <name><surname>Wetzel</surname><given-names>K.</given-names></name> <name><surname>Witte</surname><given-names>G.</given-names></name> <name><surname>Scarfone</surname><given-names>K.</given-names></name></person-group> (<year>2020</year>). <article-title>Workforce framework for cybersecurity (NICE framework)</article-title>. <source>NIST Special Publication</source>, <fpage>800</fpage>&#x2013;<lpage>181</lpage>.</mixed-citation></ref>
<ref id="ref38"><mixed-citation publication-type="other"><person-group person-group-type="editor"><name><surname>Rashid</surname><given-names>A.</given-names></name> <name><surname>Chivers</surname><given-names>H.</given-names></name> <name><surname>Lupu</surname><given-names>E.</given-names></name> <name><surname>Martin</surname><given-names>A.</given-names></name> <name><surname>Schneider</surname><given-names>S.</given-names></name></person-group> (Eds.). (<year>2021</year>). <source>Knowledgebase</source>. <publisher-name>CyBOK</publisher-name>. Available at: <ext-link xlink:href="https://www.cybok.org/knowledgebase1_1/" ext-link-type="uri">https://www.cybok.org/knowledgebase1_1/</ext-link> (Accessed January 20, 2024)</mixed-citation></ref>
<ref id="ref102"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Triplett</surname><given-names>W. J.</given-names></name></person-group> (<year>2022</year>). <article-title>Addressing cybersecurity challenges in education</article-title>. <source>International Journal of STEM Education for Sustainability</source> <volume>3</volume>, <fpage>47</fpage>&#x2013;<lpage>67</lpage>.</mixed-citation></ref>
<ref id="ref42"><mixed-citation publication-type="other"><collab id="coll15">Universityadmissions.se</collab>. <source>Apply to Swedish universities</source>. <publisher-name>Universityadmissions.se</publisher-name>. (<year>2025</year>). Available at: <ext-link xlink:href="https://www.universityadmissions.se/" ext-link-type="uri">https://www.universityadmissions.se/</ext-link> (Accessed January 20, 2025)</mixed-citation></ref>
<ref id="ref43"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Whitman</surname><given-names>M. E.</given-names></name> <name><surname>Mattord</surname><given-names>H. J.</given-names></name></person-group> (<year>2004</year>). &#x201C;<article-title>Designing and teaching information security curriculum</article-title>&#x201D; in <source>Proceedings of the 1st annual conference on information security curriculum development</source>, Boston: Thomson Course Technology. <fpage>1</fpage>&#x2013;<lpage>7</lpage>.</mixed-citation></ref>
<ref id="ref44"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Wholey</surname><given-names>J. S.</given-names></name> <name><surname>Hatry</surname><given-names>H. P.</given-names></name> <name><surname>Newcomer</surname><given-names>K. E.</given-names></name></person-group> (<year>2010</year>). <source>Handbook of practical program evaluation</source>. <publisher-name>San Francisco: John Wiley</publisher-name>.</mixed-citation></ref>
<ref id="ref45"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Zorz</surname><given-names>Z.</given-names></name></person-group> (<year>2018</year>). <source>Researchers hack BMW cars, discover 14 vulnerabilities</source>: <publisher-name>HelpNetSecurity</publisher-name>.</mixed-citation></ref>
</ref-list>
<fn-group>
<fn fn-type="custom" custom-type="edited-by" id="fn0001">
<p>Edited by: <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1550911/overview">Marta Moskal</ext-link>, University of Glasgow, United Kingdom</p>
</fn>
<fn fn-type="custom" custom-type="reviewed-by" id="fn0002">
<p>Reviewed by: <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/3204102/overview">Hassan Abood</ext-link>, Republic of Iraq Ministry of Oil, Iraq</p>
<p><ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/3278272/overview">Gede Saindra Santyadiputra</ext-link>, Ganesha University of Education, Indonesia</p>
</fn>
</fn-group>
</back>
</article>