[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Building the Nation’s Cyber Security Workforce: Contributions from the CAE Colleges and Universities

Published: 01 July 2014 Publication History

Abstract

This article presents a view of the necessary size and composition of the US national cyber security workforce, and considers some of the contributions that the government-designated Centers of Academic Excellence (CAE) might make to it. Over the last dozen years about 200 million taxpayer dollars have gone into funding many of these CAEs, with millions explicitly targeted to help them build capacity. The most visible intended output has been in the form of around 125 Scholarship for Service (SFS) students per year going mostly into the workforce of the federal government. Surely the output capacity of these 181 colleges and universities is greater than that, and should be helping to protect the rest of US citizens and taxpayers. We take a need-based look at what the nation’s workforce should look like, and then consider some possibilities of what the CAE schools could be doing to help to close the gaps between that perceived need and the supply and demand.

References

[1]
Ross Anderson and Tyler Moore. 2009. Information security: Where computer science, economics and psychology meet. Philosoph. Trans. Royal Society A: Math. Phys. Eng. Sci. 367, 1898, 2717--2727.
[2]
DHS Tiger Team. 2013. National Centers of Academic Excellence (CAE) baseline survey analysis. Tiger Team 7, Group C, PowerPoint Briefing.
[3]
Stephen J. Lukasik. 2011. Protecting users of the cyber commons. Commun. ACM 54, 9, 54--61.
[4]
NICE. 2012. Information technology workforce assessment for cybersecurity summary report. Department of Homeland Security and Federal CIO Council, National Initiative for Cybersecurity Education. http://niccs.us-cert.gov/footer/about-nice.
[5]
NRC. 2007. Toward a safer and more secure cyberspace. National Research Council, Computer Science and Telecommunications Board, The National Academies Press, Washington, D.C.
[6]
NRC. 2013. Professionalizing the nation’s cybersecurity workforce? Criteria for decision-making. National Research Council, Computer Science and Telecommunications Board, The National Academies Press, Washington, D.C.
[7]
Eugene Spafford. 2013. https://www.cerias.purdue.edu/site/blog/post/happy_anniversary_-_bang_my_head_against_a_wall/.
[8]
Francesca Spidalieri. 2013. One leader at a time: The failure to educate future leaders for an age of persistent cyber threat. Pell Center for International Relations and Public Policy, Salve Regina, Newport, RI.

Cited By

View all
  • (2023)Cybersecurity Students’ Interest in Government Careers: Impact of Demographic Characteristics and Job DynamicsJournal of Applied Security Research10.1080/19361610.2023.2277513(1-23)Online publication date: 20-Nov-2023
  • (2020)A meta-model of cybersecurity curriculums: Assessing cybersecurity curricular frameworks for business schoolsJournal of Education for Business10.1080/08832323.2020.175759496:2(99-110)Online publication date: 4-May-2020
  • (2018)The Knowledge, Skills, and Abilities Used by Penetration Testers: Results of Interviews with Cybersecurity Professionals in Vulnerability Assessment and ManagementProceedings of the Human Factors and Ergonomics Society Annual Meeting10.1177/154193121862116162:1(709-713)Online publication date: 27-Sep-2018
  • Show More Cited By

Index Terms

  1. Building the Nation’s Cyber Security Workforce: Contributions from the CAE Colleges and Universities

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image ACM Transactions on Management Information Systems
        ACM Transactions on Management Information Systems  Volume 5, Issue 2
        July 2014
        82 pages
        ISSN:2158-656X
        EISSN:2158-6578
        DOI:10.1145/2659230
        Issue’s Table of Contents
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 01 July 2014
        Accepted: 01 April 2014
        Received: 01 February 2014
        Published in TMIS Volume 5, Issue 2

        Permissions

        Request permissions for this article.

        Check for updates

        Qualifiers

        • Research-article
        • Research
        • Refereed

        Funding Sources

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)16
        • Downloads (Last 6 weeks)2
        Reflects downloads up to 06 Jan 2025

        Other Metrics

        Citations

        Cited By

        View all
        • (2023)Cybersecurity Students’ Interest in Government Careers: Impact of Demographic Characteristics and Job DynamicsJournal of Applied Security Research10.1080/19361610.2023.2277513(1-23)Online publication date: 20-Nov-2023
        • (2020)A meta-model of cybersecurity curriculums: Assessing cybersecurity curricular frameworks for business schoolsJournal of Education for Business10.1080/08832323.2020.175759496:2(99-110)Online publication date: 4-May-2020
        • (2018)The Knowledge, Skills, and Abilities Used by Penetration Testers: Results of Interviews with Cybersecurity Professionals in Vulnerability Assessment and ManagementProceedings of the Human Factors and Ergonomics Society Annual Meeting10.1177/154193121862116162:1(709-713)Online publication date: 27-Sep-2018
        • (2018)Errors and Complications in SQL Query FormulationACM Transactions on Computing Education10.1145/323171218:3(1-29)Online publication date: 9-Aug-2018
        • (2018)A Controlled Experiment on Python vs C for an Introductory Programming CourseACM Transactions on Computing Education10.1145/315289418:3(1-16)Online publication date: 9-Aug-2018
        • (2018)The Core Cyber-Defense Knowledge, Skills, and Abilities That Cybersecurity Students Should Learn in SchoolACM Transactions on Computing Education10.1145/315289318:3(1-12)Online publication date: 9-Aug-2018
        • (2017)Designing smartglasses applications for people with low visionACM SIGACCESS Accessibility and Computing10.1145/3167902.3167905(19-24)Online publication date: 27-Nov-2017
        • (2017)An inclusive educational game usable via screen reader on a touch-screenACM SIGACCESS Accessibility and Computing10.1145/3167902.3167903(3-9)Online publication date: 27-Nov-2017
        • (2013)Higher-order functional reactive programming without spacetime leaksACM SIGPLAN Notices10.1145/2544174.250058848:9(221-232)Online publication date: 25-Sep-2013
        • (2013)A short cut to parallelization theoremsACM SIGPLAN Notices10.1145/2544174.250058048:9(245-256)Online publication date: 25-Sep-2013
        • Show More Cited By

        View Options

        Login options

        Full Access

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media