Skip to main content

RQ Labs: A Cybersecurity Workforce Talent Program Design

  • Conference paper
  • First Online:
Secure Knowledge Management In The Artificial Intelligence Era (SKM 2021)

Abstract

This research contributes to the knowledge of how Information Systems (IS) researchers can iteratively intervene with practitioners to co-create instructional programs for fast-paced, rapidly changing IS fields such as cybersecurity. We demonstrate how complex fields such as cybersecurity have the need for a talented workforce which continues to rapidly outpace supply from Universities. IS researchers partnering with practitioners can use this research as an exemplar of a method to design, build and evaluate these innovative co-curricular IS programs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Reliaquest: https://www.reliaquest.com/, website accessed on 8/19/2021.

References

  1. Baker, M.: Striving for Effective Cyber Workforce Development, pp. 1–26. Carnegie Mellon University, Software Engineering Institute (2016)

    Google Scholar 

  2. Beuran, R., Ken-ichi, C., Yasuo, T., Yoichi, S.: Towards effective cybersecurity education and training. Japan Advanced Institute of Science and Technology, School of Information Science. Japan Advanced Institute of Science and Technology (2016)

    Google Scholar 

  3. Cabaj, K., Domingos, D., Kotulski, Z., Respicio, A.: Cybersecurity education: evolution of the discipline and analysis of masters programs. Comput. Secur. 75, 24–35 (2018)

    Article  Google Scholar 

  4. Caulkins, B.D., Bockelman, P., Badillo-UXXuiola, K., Leis, R.: Cyber workforce development using a behavioral cybersecurity paradigm. In: 2016 International Conference on Cyber Conflict (CyCon U.S), pp. 21–23. IEEE, Washington, DC (2016),

    Google Scholar 

  5. Conklin, W.A., Cline, R.E., Roosa, T.: Re-engineering cybersecurity education in the US: an analysis of the critical factors. In: 47th Hawaii International Conference on System Science, pp. 2006–2014. IEEE Computer Society (2014)

    Google Scholar 

  6. Dill, K.J.: Cybersecurity for the nation: workforce development. Cyber Def. Rev. 3(2), 55–64 (2018)

    Google Scholar 

  7. Endicott-Popovsky, B.E., Popovsky, V.M.: Application of pedagogical fundamentals for the holistic development of cybersecurity professionals. Cybersecur. Educ. 5(1), 56–68 (2014)

    Google Scholar 

  8. Furnell, S.: The cybersecurity workforce and skills. Computers and Security, TC 11 Briefing Papers, vol. 100, pp. 1–7 (2021)

    Google Scholar 

  9. Gonzalez-Manzano, L., de Fuentes, J.M.: Design recommendations for online cybersecurity courses. Comput. Secur. 80, 238–256 (2019)

    Article  Google Scholar 

  10. Hevner, A.R.: Design science research. In: Tucker, A., Topi, H. (eds.) Computing Handbook, pp. 22-1–22-23, 3rd edn. Chapman and Hall/CRC, New York (2014)

    Google Scholar 

  11. Hevner, A.R., March, S.T., Park, J., Ram, S.: Design science in information systems. MIS Q. 28, 75–105 (2004)

    Google Scholar 

  12. Hevner, A., Chatterjee, S.: Design research in information systems. In: Sharda, R., Vob, S. (eds.) Springer, New York (2010). https://doi.org/10.1007/978-1-4419-5653-8

  13. Katz, F.H.: Breadth and depth: best practices teaching cybersecurity in a small public university sharing models. Cyber Def. Rev. 3(2), 65–72 (2018)

    Google Scholar 

  14. Knapp, K.J., Maurer, C., Plachkinova, M.: Maintaining a cybersecurity curriculum: professional certifications as valuable guidance. J. Inf. Syst. Educ. 28(2), 101–114 (2017)

    Google Scholar 

  15. Manson, D., Pike, R.: The case for depth in cybersecurity education. Cyber. Educ. 5(1), 46–52 (2014)

    Google Scholar 

  16. McDuffie, E.L., Piotrowski, V.P.: The future of cybersecurity education. Comput. Educ. 47(8), 67–69 (2014)

    Google Scholar 

  17. Morelli, K.: USF/Reliaquest partnership aims to fill the talent gap in the emerging cybersecurity field. USF Muma College of Business Newsroom Articles (2018). https://www.usf.edu/business/news/articles/181002-reliaquest-partnership.aspx

  18. Mullarkey, M., Hevner, A.: An elaborated action design research process model. Eur. J. Inf. Syst. 28(1), 6–20 (2019)

    Google Scholar 

  19. Murphy, D.R., Murphy, R.H.: teaching cybersecurity: protecting the business environment. In: Information Security Curriculum Development Conference 2013, pp. 88–93. ACM, Kennesaw, GA (2013)

    Google Scholar 

  20. Sein, M.K., Henfridsson, O., Purao, S., Rossi, M., Lindgren, R.: Action design research. MIS Q. 35(1), 37–56 (2011)

    Google Scholar 

  21. Spidalieri, F., McArdle, J.: Transforming the next generation of military leaders into cyber-strategic leaders: the role of cybersecurity education in US service academies. Cyber Def. Rev. 1(1), 141–164 (2016)

    Google Scholar 

  22. Tang, C., et al.: (Cyber2yr2020 Task Group). Cybersecurity Curricular Guidance for Associate-Degree Programs, Cyber2yr2020. ACM, Committee for Computing Education in Community Colleges (CCECC) (2020). https://doi.org/10.1145/3381686

  23. Tang, D., Pham, C., Chinen, K.-I., Beuran, R.: Interactive cybersecurity defense training inspired by web-based learning theory. In: IEEE 9th International Conference on Engineering Education (ICEED), pp. 90–95. IEEE, Kanazawa, Japan (2017)

    Google Scholar 

  24. Ward, P.: Constructing a methodology for developing a cybersecurity program. In: Proceedings of the 54th Hawaii International Conference on System Sciences 2021 (2021). https://doi.org/10.24251/HICSS.2021.006

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Clinton Daniel .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Daniel, C., Mullarkey, M., Agrawal, M. (2022). RQ Labs: A Cybersecurity Workforce Talent Program Design. In: Krishnan, R., Rao, H.R., Sahay, S.K., Samtani, S., Zhao, Z. (eds) Secure Knowledge Management In The Artificial Intelligence Era. SKM 2021. Communications in Computer and Information Science, vol 1549. Springer, Cham. https://doi.org/10.1007/978-3-030-97532-6_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-97532-6_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-97531-9

  • Online ISBN: 978-3-030-97532-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics