skip to main content
research-article

Engaging learners in cybersecurity careers: lessons from the launch of the national cyber league

Published:01 March 2014Publication History
Skip Abstract Section

Abstract

Educators and sponsors endorse competitions as a strong, positive influence on career choice. However, empirical studies of cybersecurity competitions are lacking, and evidence from computer science and mathematics competitions has been mixed. Here we report initial results from an ongoing study of the National Cyber League to provide a glimpse of the role of competitions in fostering cybersecurity career engagement. Preliminary results suggest that cyber competitions attract experienced individuals who will remain in the profession for the long-term, but future research is needed to understand how cyber competitions may engage women and those new to the field.

References

  1. Beede, D. et al., Women in STEM: A Gender Gap to Innovation, U.S. Department of Commerce, Economics and Statistics Administration, (August, 2011).Google ScholarGoogle Scholar
  2. Betz, N. "Self-efficacy theory as a basis for career assessment." Journal of Career Assessment 8, 3 (July 2000): 205--222.Google ScholarGoogle ScholarCross RefCross Ref
  3. Cone, B. et al. "A video game for cyber security training and awareness." Computers & Security 26, 1 (February 2007): 63--72.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Cooper, K. "Go with the flow: Engagement and learning in Second Life," presented at The Interservice/Industry Training, Simulation & Education Conference (I/ITSEC), (Orlando: Florida, 2009).Google ScholarGoogle Scholar
  5. Dede, C. "Immersive interfaces for engagement and learning." Science 323, 5910 (January 2009): 66--69.Google ScholarGoogle Scholar
  6. Hong, E., Milgram, R., and Whiston, S. "Leisure activities in adolescents as a predictor of occupational choice in young adults: A longitudinal study," Journal of Career Development 19, 3 (Spring, 1993): 221--229.Google ScholarGoogle ScholarCross RefCross Ref
  7. Lubinski, D. and Benbow, C. "Study of mathematically precocious youth after 35 years: Uncovering antecedents for the development of math-science expertise." Perspectives on Psychological Science 1, 4 (December, 2006): 316--345.Google ScholarGoogle ScholarCross RefCross Ref
  8. Mountain, J. "The use of applied process control systems design to attract engineering students," Frontiers in Education 2004, (GA: IEEE, 2004), F4D 6--11.Google ScholarGoogle Scholar
  9. Paulsen, C. et al. "NICE: Creating a cybersecurity workforce and aware public," IEEE Security & Privacy, 10, 3 (June, 2012): 76--79. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Prenzel, M. "The selective persistence of interest," in The Role of Interest in Learning and Development, edited by K. Ann Renninger, Suzzanne Hidi, & Andreas Krapp, (New Jersey: Lawrence Erlbaum Associates, 1992): 71--98.Google ScholarGoogle Scholar
  11. Rursch, J., Luse, A., and Jacobson, D. "IT-Adventures: A program to spark IT interest in high school students using inquiry-based learning with cyber defense, game design, and robotics," IEEE Transactions on Education 53, 1(February 2010): 71--79. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Saunders, J. "Simulation approaches in information security education," presented at the 6th Annual National Colloquium for Information Systems Security Education, (Redmond, WA, 2002).Google ScholarGoogle Scholar
  13. Schaufeli, W., and Bakker, A. UWES - Utrecht Work Engagement Scale: Prelinary manual. (November, 2003). http://www.beanmanaged.com/doc/pdf/arnoldbakker/articles/articles_arnold_bakker_87.pdf. Accessed 11 January 2014.Google ScholarGoogle Scholar
  14. Schaufeli, W., Bakker, A., and Salanova, M. "The measurement of work engagement with a short questionnaire: A cross-national study," Educational and Psychological Measurement. 66, 4 (August, 2006): 701--716.Google ScholarGoogle ScholarCross RefCross Ref
  15. Tobey, D., Reiter-Palmon, R. and Callens, A. Predictive Performance Modeling: An innovative approach to defining critical competencies that distinguish levels of performance. OST Working Group Report. National Board of Information Security Examiners, Idaho Falls, ID, 2012.Google ScholarGoogle Scholar

Index Terms

  1. Engaging learners in cybersecurity careers: lessons from the launch of the national cyber league

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Inroads
        ACM Inroads  Volume 5, Issue 1
        March 2014
        74 pages
        ISSN:2153-2184
        EISSN:2153-2192
        DOI:10.1145/2568195
        Issue’s Table of Contents

        Copyright © 2014 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 March 2014

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Popular
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format