skip to main content
research-article
Free access

The ephemeral legion: producing an expert cyber-security work force from thin air

Published: 01 January 2011 Publication History

Abstract

Seeking to improve the educational mechanisms for efficiently training large numbers of information security workers.

References

[1]
Bellovin, S. The role of a cybersecurity czar; http://www.cs.columbia.edu/~smb/blog/2009-11/2009-11-03.html.
[2]
Conti, G. Hacking and innovation. Commun. ACM 49, 6 (June 2006).
[3]
Cyber Help Wanted. Washington Post, (Aug. 1, 2009).
[4]
House Resolution 558. National Computer Science Education Week; http://www.opencongress.org/bill/111-hr558/show; House Resolution 5929. Computer Science Education Act of 2010; http://www.opencongress.org/bill/111-hr5929/show.
[5]
Krebs, B. Security fix: DHS seeking 1,000 cyber security experts. Washington Post, (Oct. 1, 2009); http://voices.washingtonpost.com/securityfix/2009/10/dhs_seeking_1000_cyber_securit.html?hpid=sec-tech.
[6]
The State of Information Assurance Education 2009: Prof. Eugene Spafford, Purdue University, (Oct. 20, 2009); http://www.govinfosecurity.com/articles.php?art_id=1789&opg=1.

Cited By

View all
  • (2022)Cyber Security Competency Model Based on Learning Theories and Learning Continuum HierarchyResearch Anthology on Business Aspects of Cybersecurity10.4018/978-1-6684-3698-1.ch012(262-279)Online publication date: 2022
  • (2022)Cyber Security Competency Model Based on Learning Theories and Learning Continuum HierarchyResearch Anthology on Advancements in Cybersecurity Education10.4018/978-1-6684-3554-0.ch007(139-156)Online publication date: 2022
  • (2020)Evaluating a Cybersecurity Training Program for Non-Computing Major Undergraduate ROTC Students2020 Research on Equity and Sustained Participation in Engineering, Computing, and Technology (RESPECT)10.1109/RESPECT49803.2020.9272508(1-2)Online publication date: 10-Mar-2020
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 54, Issue 1
January 2011
128 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/1866739
Issue’s Table of Contents
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 January 2011
Published in CACM Volume 54, Issue 1

Check for updates

Qualifiers

  • Research-article
  • Popular
  • Un-reviewed

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)331
  • Downloads (Last 6 weeks)108
Reflects downloads up to 16 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Cyber Security Competency Model Based on Learning Theories and Learning Continuum HierarchyResearch Anthology on Business Aspects of Cybersecurity10.4018/978-1-6684-3698-1.ch012(262-279)Online publication date: 2022
  • (2022)Cyber Security Competency Model Based on Learning Theories and Learning Continuum HierarchyResearch Anthology on Advancements in Cybersecurity Education10.4018/978-1-6684-3554-0.ch007(139-156)Online publication date: 2022
  • (2020)Evaluating a Cybersecurity Training Program for Non-Computing Major Undergraduate ROTC Students2020 Research on Equity and Sustained Participation in Engineering, Computing, and Technology (RESPECT)10.1109/RESPECT49803.2020.9272508(1-2)Online publication date: 10-Mar-2020
  • (2019)Cyber Security Competency Model Based on Learning Theories and Learning Continuum HierarchyGlobal Cyber Security Labor Shortage and International Business Risk10.4018/978-1-5225-5927-6.ch006(94-110)Online publication date: 2019
  • (2018)사이버 전문가 양성을 위한 사관학교 교과과정Korean Journal of Military Art and Science10.31066/kjmas.2018.74.1.00274:1(33-54)Online publication date: Feb-2018
  • (2018)The Knowledge, Skills, and Abilities Used by Penetration Testers: Results of Interviews with Cybersecurity Professionals in Vulnerability Assessment and ManagementProceedings of the Human Factors and Ergonomics Society Annual Meeting10.1177/154193121862116162:1(709-713)Online publication date: 27-Sep-2018
  • (2018)On designing a cybersecurity educational program for higher educationProceedings of the 10th International Conference on Education Technology and Computers10.1145/3290511.3290524(195-200)Online publication date: 26-Oct-2018
  • (2018)Co-Op LightProceedings of the 19th Annual SIG Conference on Information Technology Education10.1145/3241815.3241880(156-156)Online publication date: 14-Sep-2018
  • (2018)An Exploratory Analysis on Cybersecurity Ecosystem Utilizing the NICE Framework2018 National Cyber Summit (NCS)10.1109/NCS.2018.00006(1-7)Online publication date: Jun-2018
  • (2017)Framework for Developing a Brief Interview to Understand Cyber Defense Work: An Experience ReportProceedings of the Human Factors and Ergonomics Society Annual Meeting10.1177/154193121360181261:1(1318-1322)Online publication date: 20-Oct-2017
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Magazine Site

View this article on the magazine site (external)

Magazine Site

Login options

Full Access

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media