Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
The workforce demand for skilled cybersecurity talent has exceeded its supply for years. Historically, the pedagogical approach was to identify and create curricula for the most in-demand technical knowledge, skills, and abilities (KSAs). Unfortunately, the field has tended to neglect nontechnical counterparts. However, recent literature suggests a core set of nontechnical KSAs that employers seek after. This study explored the codification of a nontechnical curriculum for a cybersecurity internship program at the University of Southern Maine (USM). The USM faculty created the Cybersecurity Ambassador Program that can serve students and the community. The service to students is to make them more attractive to employers. The benefit to the community is to provide cybersecurity awareness training to vulnerable populations. This discussion about the USM CAP serves as a case study for other programs considering this type of enrichment using an internship model. CAP started as an informal program, but this research used objective data to create repeatable blueprints. The researchers designed these lesson plans to help students progress from novices to competent in crucial nontechnical skills delineated in the National Initiative for Cybersecurity Education (NICE) Workforce framework. The team used a mixed methods approach to baseline Tier 1/novice students’ skill levels, place them in a cybersecurity enrichment program, track their progress, and determine program efficacy in helping them achieve beginner status. The information shared can serve as a point of departure for a case study that might guide other programs interested in doing similar work.
Słowa kluczowe
Czasopismo
Rocznik
Tom
Strony
292--316
Opis fizyczny
Bibliogr. 13 poz., rys., tab., wykr.
Twórcy
autor
- Department of Technology, University of Southern Maine, USA
autor
- Department of Technology, University of Southern Maine, USA
Bibliografia
- [1] V. Marshall, L. Mills, J. Weingard, J. Young, The UK cyber-security strategy: Landscape review, National Audit Office, United Kingdom, 2013. [Online]. Available: https://www.nao.org.uk/reports/the-uk-cyber-security-strategy-land-scape-review/. [Accessed: Sep. 19, 2022].
- [2] M.E. Armstrong, K.S. Jones, A.S. Namin, D.C. Newton, “Knowledge, skills, and abilities for specialized curricula in cyber defense: Results from interviews with cyber professionals,” Association for Computing Machinery (ACM) Transactions on Computing Education, vol. 20, no. 4, pp. 1 – 25, 2020, doi: 10.1145/3421254.
- [3] K. Cabaj, D. Domingos, Z. Kotulski, A. Respício, “Cybersecurity education: Evolution of the discipline and analysis of master programs,” Computers & Security, vol. 75, pp. 24 – 35, 2018, doi: 10.1016/j.cose.2018.01.015.
- [4] J. Peeler, “( I SC)² Study: Workforce Shortfall Due to Hiring Difficulties Despite Rising Salaries, Increased Budgets and High Job Satisfaction Rate,” (ISC)², 2015. [Online]. Available: https://blog.isc2.org/isc2_blog/2015/04/isc-study-workforce-shortfall-due-to-hiring-difficulties-despite-rising-sala-ries-increased-budgets-a.html. [Accessed: Nov. 1, 2022].
- [5] D.N. Burrell, “An exploration of the cybersecurity workforce shortage,” in Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and Applications, Management Association, Information Resources Ed. Hershey, PA: IGI Global, 2020, pp. 1072 – 1081, doi: 10.4018/978-1-7998-2466-4.
- [6] R.T. Palmer, R.J. Davis, T. Thompson, “Theory meets practice: HBCU initiatives that promote academics success among African Americans in STEM,” Journal of College Student Development, vol. 51, no. 4, pp. 440 – 443, 2010, doi: 10.1353/csd.0.0146.
- [7] WR Poster, “Cybersecurity needs women,” Nature, vol. 555, no. 7698, pp. 577 – 580, 2018, doi: 10.1038/d41586-018-03327-w.
- [8] Federal Trade Commission Report to Congress, Combating Fraud in African American and Latino Communities, 2016. [Online]. Available: https://www.ftc.gov/system/files/documents/reports/combating-fraud-african-american-latino-communities-ftcs-comprehensive-strategic-plan-federal-trade/160615fraudreport.pdf. [Accessed: May 22, 2023].
- [9] C.M. Cook, J.J. Howard, Y.B. Sirotin, J.L.Tipton, A.R. Vemury, “Demographic Effects in Facial Recognition and Their Dependence on Image Acquisition: An Evaluation of Eleven Commercial Systems,” IEEE Transactions on Biometrics, Behavior, and Identity Science, vol. 1, no. 1, pp. 32 – 41, 2019, doi: 10.1109/TBIOM.2019.2897801.
- [10] L.L. Sussman, “Exploring Nontechnical Knowledge, Skills, and Abilities ( KSA) that May Expand the Expectations of the Cyber Workforce,” Cybersecurity Skills Journal, pp. 19 – 39, 2020, [Online]. Available: https://nationalcyberwatchcenter.wildapricot.org/event-4057720. [Accessed: Sept. 30, 2022].
- [11] H. Jang, “Identifying 21st century STEM competencies using workplace data,” Journal of Science Education and Technology, vol. 25, no. 2, pp. 284 – 301, 2016, doi: 10.1007/s10956-015-9593-1.
- [12] S.E. Dreyfus, “The Five-Stage Model of Adult Skill Acquisition,” Bulletin of Science, Technology & Society, vol. 24, no. 3, pp. 177 – 181, 2004, doi: 10.1177/0270467604264992.
- [13] US Bureau of Labour Statistics. (2022). Customer Service Representatives: Occupational Outlook Handbook. [Online]. Available: https://www.bls.gov/ooh/office-and-administrative-support/customer-service-representatives.htm#tab-4 [Accessed: Oct. 27, 2022].
Uwagi
Opracowanie rekordu ze środków MNiSW, umowa nr SONP/SP/546092/2022 w ramach programu "Społeczna odpowiedzialność nauki" - moduł: Popularyzacja nauki i promocja sportu (2024).
Dwóch autorów ma ten sam ORCID
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-cfe8fb9f-3edb-40d6-b7f2-b7f7e538c623