[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Engaging learners in cybersecurity careers: lessons from the launch of the national cyber league

Published: 01 March 2014 Publication History

Abstract

Educators and sponsors endorse competitions as a strong, positive influence on career choice. However, empirical studies of cybersecurity competitions are lacking, and evidence from computer science and mathematics competitions has been mixed. Here we report initial results from an ongoing study of the National Cyber League to provide a glimpse of the role of competitions in fostering cybersecurity career engagement. Preliminary results suggest that cyber competitions attract experienced individuals who will remain in the profession for the long-term, but future research is needed to understand how cyber competitions may engage women and those new to the field.

References

[1]
Beede, D. et al., Women in STEM: A Gender Gap to Innovation, U.S. Department of Commerce, Economics and Statistics Administration, (August, 2011).
[2]
Betz, N. "Self-efficacy theory as a basis for career assessment." Journal of Career Assessment 8, 3 (July 2000): 205--222.
[3]
Cone, B. et al. "A video game for cyber security training and awareness." Computers & Security 26, 1 (February 2007): 63--72.
[4]
Cooper, K. "Go with the flow: Engagement and learning in Second Life," presented at The Interservice/Industry Training, Simulation & Education Conference (I/ITSEC), (Orlando: Florida, 2009).
[5]
Dede, C. "Immersive interfaces for engagement and learning." Science 323, 5910 (January 2009): 66--69.
[6]
Hong, E., Milgram, R., and Whiston, S. "Leisure activities in adolescents as a predictor of occupational choice in young adults: A longitudinal study," Journal of Career Development 19, 3 (Spring, 1993): 221--229.
[7]
Lubinski, D. and Benbow, C. "Study of mathematically precocious youth after 35 years: Uncovering antecedents for the development of math-science expertise." Perspectives on Psychological Science 1, 4 (December, 2006): 316--345.
[8]
Mountain, J. "The use of applied process control systems design to attract engineering students," Frontiers in Education 2004, (GA: IEEE, 2004), F4D 6--11.
[9]
Paulsen, C. et al. "NICE: Creating a cybersecurity workforce and aware public," IEEE Security & Privacy, 10, 3 (June, 2012): 76--79.
[10]
Prenzel, M. "The selective persistence of interest," in The Role of Interest in Learning and Development, edited by K. Ann Renninger, Suzzanne Hidi, & Andreas Krapp, (New Jersey: Lawrence Erlbaum Associates, 1992): 71--98.
[11]
Rursch, J., Luse, A., and Jacobson, D. "IT-Adventures: A program to spark IT interest in high school students using inquiry-based learning with cyber defense, game design, and robotics," IEEE Transactions on Education 53, 1(February 2010): 71--79.
[12]
Saunders, J. "Simulation approaches in information security education," presented at the 6th Annual National Colloquium for Information Systems Security Education, (Redmond, WA, 2002).
[13]
Schaufeli, W., and Bakker, A. UWES - Utrecht Work Engagement Scale: Prelinary manual. (November, 2003). http://www.beanmanaged.com/doc/pdf/arnoldbakker/articles/articles_arnold_bakker_87.pdf. Accessed 11 January 2014.
[14]
Schaufeli, W., Bakker, A., and Salanova, M. "The measurement of work engagement with a short questionnaire: A cross-national study," Educational and Psychological Measurement. 66, 4 (August, 2006): 701--716.
[15]
Tobey, D., Reiter-Palmon, R. and Callens, A. Predictive Performance Modeling: An innovative approach to defining critical competencies that distinguish levels of performance. OST Working Group Report. National Board of Information Security Examiners, Idaho Falls, ID, 2012.

Cited By

View all
  • (2024)A Mixed-Method Study Exploring Student Motivation Participating in Cybersecurity CTF CompetitionsCybersecurity Pedagogy and Practice Journal10.62273/QOGS6742(4-26)Online publication date: Apr-2024
  • (2024)A Critical Review of Cybersecurity Education in the United StatesProceedings of the 55th ACM Technical Symposium on Computer Science Education V. 110.1145/3626252.3630757(241-247)Online publication date: 7-Mar-2024
  • (2024)Mining Reddit users’ perspectives on cybersecurity competitions: a mixed method approachInformation & Computer Security10.1108/ICS-02-2023-001732:5(636-655)Online publication date: 23-Apr-2024
  • Show More Cited By

Index Terms

  1. Engaging learners in cybersecurity careers: lessons from the launch of the national cyber league

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Inroads
      ACM Inroads  Volume 5, Issue 1
      March 2014
      74 pages
      ISSN:2153-2184
      EISSN:2153-2192
      DOI:10.1145/2568195
      Issue’s Table of Contents
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 01 March 2014
      Published in INROADS Volume 5, Issue 1

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. competitions
      2. cybersecurity
      3. education and workforce development

      Qualifiers

      • Research-article
      • Popular
      • Refereed

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)40
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 02 Mar 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)A Mixed-Method Study Exploring Student Motivation Participating in Cybersecurity CTF CompetitionsCybersecurity Pedagogy and Practice Journal10.62273/QOGS6742(4-26)Online publication date: Apr-2024
      • (2024)A Critical Review of Cybersecurity Education in the United StatesProceedings of the 55th ACM Technical Symposium on Computer Science Education V. 110.1145/3626252.3630757(241-247)Online publication date: 7-Mar-2024
      • (2024)Mining Reddit users’ perspectives on cybersecurity competitions: a mixed method approachInformation & Computer Security10.1108/ICS-02-2023-001732:5(636-655)Online publication date: 23-Apr-2024
      • (2024)Evaluation of an Internet of Things Device-Based Educational Approach to Engage a More Diverse Cybersecurity WorkforceInternational Journal of Human–Computer Interaction10.1080/10447318.2024.231434941:2(1364-1380)Online publication date: 20-Feb-2024
      • (2024)Complex yet attainable? An interdisciplinary approach to designing better cyber range exercisesComputers and Security10.1016/j.cose.2024.103965144:COnline publication date: 18-Oct-2024
      • (2023)Binary Reverse Engineering for AllProceedings of the 2023 Conference on Innovation and Technology in Computer Science Education V. 110.1145/3587102.3588790(243-249)Online publication date: 29-Jun-2023
      • (2023)Vulnerability Discovery for All: Experiences of Marginalization in Vulnerability Discovery2023 IEEE Symposium on Security and Privacy (SP)10.1109/SP46215.2023.10179478(1997-2014)Online publication date: May-2023
      • (2023)Cybercompetitions: A survey of competitions, tools, and systems to support cybersecurity educationEducation and Information Technologies10.1007/s10639-022-11451-428:9(11759-11791)Online publication date: 24-Feb-2023
      • (2023)Designing a Serious Game for Cybersecurity EducationSoftware Engineering for Games in Serious Contexts10.1007/978-3-031-33338-5_12(265-290)Online publication date: 6-May-2023
      • (2022)Learn ARP Spoofing Attack in a Game2022 IEEE Frontiers in Education Conference (FIE)10.1109/FIE56618.2022.9962649(1-5)Online publication date: 8-Oct-2022
      • Show More Cited By

      View Options

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Digital Edition

      View this article in digital edition.

      Digital Edition

      Magazine Site

      View this article on the magazine site (external)

      Magazine Site

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media