75
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Cybersecurity Students’ Interest in Government Careers: Impact of Demographic Characteristics and Job Dynamics

, &

References

  • Ting, Y. (1997). Determinants of job satisfaction of federal government employees. Public Personnel Management, 26(3), 313–334. https://doi.org/10.1177/009102609702600302
  • Alanazi, L. (2021). Does gender really matter? Testing the mediating role of public service motivation between gender and organizational citizenship behavior in Federal Agencies. International Journal of Public Administration, 44(6), 489–499. https://doi.org/10.1080/01900692.2020.1729187
  • Bagchi-Sen, S., Rao, H. R., Upadhyaya, S. J., & Chai, S. (2010). Women in cybersecurity: A study of career advancement. IT Professional, 12(1), 24–31. https://doi.org/10.1109/MITP.2010.39
  • Bate, L., & Montgomery, M. (2022, June). Workforce development agenda for the national cyber director. CSC.
  • Beggs, J. M., Bantham, J. H., & Taylor, S. (2008). Distinguishing the factors influencing college students’ choice of major. College Student Journal, 42(2), 381–395.
  • Bergal, J. (2017). Cybersecurity quest sends states to vets, student, and women. Pew Trusts. https://www.pewtrusts.org/en/research-and-analysis/blogs/stateline/2017/11/27/cybersecurity-quest-sends-states-to-vets-students-and-women (Accessed December 21, 2022).
  • Blais, A. R., Michaud, I., Simard, J. F., Mach, L., & Houle, S. (2021). Measuring workplace psychosocial factors in the federal government. Health Reports, 32(12), 1–12.
  • Bright, L. (2005). Public employees with high levels of public service motivation: Who are they, where are they, and what do they want? Review of Public Personnel Administration, 25(2), 138–154. https://doi.org/10.1177/0734371X04272360
  • Bronk, C., & Conklin, W. A. (2022). Who’s in charge and how does it work? US cybersecurity of critical infrastructure. Journal of Cyber Policy, 7(2), 155–174. https://doi.org/10.1080/23738871.2022.2116346
  • Buchmann, C., & DiPrete, T. A. (2006). The growing female advantage in college completion: The role of family background and academic achievement. American Sociological Review, 71(4), 515–541. https://doi.org/10.1177/000312240607100401
  • Burrell, D. N. (2020). An exploration of the cybersecurity workforce shortage. In M. Khosrow-Pour (Ed.), Cyber warfare and terrorism: Concepts, methodologies, tools, and applications (pp. 1072–1081). IGI Global.
  • Coulson, T., Mason, M., & Nestler, V. (2019). Cyber capability planning and the need for an expanded cybersecurity workforce. Communications of the IIMA, 16(2), 2. https://doi.org/10.58729/1941-6687.1401
  • Crumpler, W., & Lewis, J. A. (2019). The cybersecurity workforce gap (pp. 10). Center for Strategic and International Studies (CSIS).
  • Curtin, R., Presser, S., & Singer, E. (2000). The effects of response rate changes on the index of consumer sentiment. Public Opinion Quarterly, 64(4), 413–428. https://doi.org/10.1086/318638
  • Curtin, R., Singer, E., & Presser, S. (2007). Incentives in random digit dial telephone surveys: A replication and extension. Journal of Official Statistics, 23(1), 91.
  • Cyberseek. (2023). Cybersecurity supply/Demand heat map. https://www.cyberseek.org/heatmap.html (Accessed December 21, 2022).
  • Daikeler, J., Bošnjak, M., & Lozar Manfreda, K. (2020). Web versus other survey modes: An updated and extended meta-analysis comparing response rates. Journal of Survey Statistics and Methodology, 8(3), 513–539. https://doi.org/10.1093/jssam/smz008
  • Danforth, M., & Lam, C. (2017). February). Effects of a four-week cyber security summer program on the attitudes and college interests of high school students. Journal of the Colloquium for Information Systems Security Education, 4(2), 19–19.
  • Dickson, L. (2010). Race and gender differences in college major choice. The ANNALS of the American Academy of Political and Social Science, 627(1), 108–124. https://doi.org/10.1177/0002716209348747
  • Dill, K. J. (2018). Cybersecurity for the nation: workforce development. The Cyber Defense Review, 3(2), 55–64.
  • Donovan, S., Cobert, B., & Scott, T. (2016). Memo to agency heads: Federal cybersecurity workforce strategy. https://www.chcoc.gov/sites/default/files/m-16-15.pdf.
  • Eckley, J. (2020). Do empowerment, innovation, trust, and supervisory level predict satisfaction in federal employees? [Doctoral dissertation]. Capella University.
  • Eismann, L. (2016). First generation students and job success. NACE Journal (November 2106). https://www.naceweb.org/job-market/special-populations/first-generation-students-and-job-success/.
  • Emerick, G. J. (2020). Factors that influence students to choose cybersecurity careers: An exploratory study [Doctoral dissertation]. University of Illinois at Urbana-Champaign.
  • Fadia, A., Nayfeh, M., & Noble, J. (2020, September 16). Follow the leaders: How governments can combat intensifying cybersecurity risks. McKinsey & Company.
  • Falcon, L. (2015). Breaking down barriers: First-generation college students and college success. Innovation Showcase, 10(6). https://www.league.org/innovation-showcase/breaking-down-barriers-first-generation-college-students-and-college-success#SnippetTab
  • Felson, M., & Cohen, L. E. (1980). Human ecology and crime: A routine activity approach. Human Ecology, 8(4), 389–406. https://doi.org/10.1007/BF01561001
  • Francis, K. A., & Ginsberg, W. (2016). The federal cybersecurity workforce: Background and congressional oversight issues for the departments of defense and homeland security. Congressional Research Service.
  • Furnell, S., Fischer, P., & Finch, A. (2017). Can’t get the staff? The growing need for cyber-security skills. Computer Fraud & Security, 2017(2), 5–10. https://doi.org/10.1016/S1361-3723(17)30013-1
  • Furquim, F., Glasener, K. M., Oster, M., McCall, B. P., & DesJardins, S. L. (2017). Navigating the financial aid process: Borrowing outcomes among first-generation and non-first-generation students. The ANNALS of the American Academy of Political and Social Science, 671(1), 69–91. https://doi.org/10.1177/0002716217698119
  • Goodman, S. E. (2014). Building the nation’s cyber security workforce: Contributions from the CAE colleges and universities. ACM Transactions on Management Information Systems, 5(2), 1–9. https://doi.org/10.1145/2629636
  • Gootman, S. (2016). OPM hack: The most dangerous threat to the federal government today. Journal of Applied Security Research, 11(4), 517–525. https://doi.org/10.1080/19361610.2016.1211876
  • Higgins, K. (2018). Best practices for recruiting & retaining women in security. Dark Reading. Information Week. https://www.darkreading.com/careers-andpeople/best-practices-for-recruiting-andretaining-women-in-security/d/d-id/1331114.
  • Hoffman, L., Burley, D., & Toregas, C. (2012). Holistically building the cybersecurity workforce. IEEE Security & Privacy Magazine, 10(2), 33–39. https://doi.org/10.1109/MSP.2011.181
  • Ishmael, A., & Halawi, D. L. (2023). Retention of qualified cybersecurity professionals: A qualitative study. Journal of Computer Information Systems, 63(1), 204–215. https://doi.org/10.1080/08874417.2022.2049018
  • Jarvie-Eggart, M. E., Singer, A. M., & Mathews, J. (2020, June). Parent and family influence on first-year engineering major choice [Paper presentation]. 2020 ASEE Virtual Annual Conference Content Access.
  • Kuhn, A., & Wolter, S. C. (2022). Things versus people: Gender differences in vocational interests and in occupational preferences. Journal of Economic Behavior & Organization, 203, 210–234. https://doi.org/10.1016/j.jebo.2022.09.003
  • Lake, S. (2023). The 3 cybersecurity hiring trends experts predict for 2023. Fortune.com, January 11, 2023. https://fortune.com/education/articles/the-3-cybersecurity-hiring-trends-experts-predict-for-2023/,
  • Leppel, K., Williams, M. L., & Waldauer, C. (2001). The impact of parental occupation and socioeconomic status on choice of college major. Journal of Family and Economic Issues, 22(4), 373–394. https://doi.org/10.1023/A:1012716828901
  • Mason, E. S. (1995). Gender differences in job satisfaction. The Journal of Social Psychology, 135(2), 143–151. https://doi.org/10.1080/00224545.1995.9711417
  • McNair, T. B., Albertine, S., McDonald, N., Major, T., Jr, & Cooper, M. A. (2022). Becoming a student-ready college: A new culture of leadership for student success. John Wiley & Sons.
  • Mearian, L. (2023). How many jobs are available in technology in the U.S.? Computerworld, May 5, 2023. https://www.computerworld.com/article/3542681/how-many-jobs-are-available-in-technology.html
  • Moakler, M. W., Jr., & Kim, M. M. (2014). College major choice in STEM: Revisiting confidence and demographic factors. The Career Development Quarterly, 62(2), 128–142. https://doi.org/10.1002/j.2161-0045.2014.00075.x
  • Moynihan, D. P., & Pandey, S. K. (2007). The role of organizations in fostering public service motivation. Public Administration Review, 67(1), 40–53. https://doi.org/10.1111/j.1540-6210.2006.00695.x
  • National Center for Science and Engineering Statistics. (2019). Women, minorities, and persons with disabilities in science and engineering. https://ncses.nsf.gov/pubs/nsf23315
  • Niu, L. (2017). Family socioeconomic status and choice of STEM major in college: An analysis of a national sample. College Student Journal, 51(2), 298–312.
  • Norris, D. F., Mateczun, L., Joshi, A., & Finin, T. (2018). Cybersecurity at the grassroots: American local governments and the challenges of internet security. Journal of Homeland Security and Emergency Management, 15(3), 895–904. https://doi.org/10.1515/jhsem-2017-0048
  • Paoline, E. A., III, & Gau, J. M. (2020). An empirical assessment of the sources of police job satisfaction. Police Quarterly, 23(1), 55–81. https://doi.org/10.1177/1098611119875117
  • Parola, H. R., Harari, M. B., Herst, D. E., & Prysmakova, P. (2019). Demographic determinants of public service motivation: A meta-analysis of PSM-age and-gender relationships. Public Management Review, 21(10), 1397–1419. https://doi.org/10.1080/14719037.2018.1550108
  • Partida, D. (2023). Where do tech workers go after layoffs? Beta News. https://betanews.com/2023/06/15/where-do-tech-workers-go-after-layoffs/.
  • Perry, J. L., & Wise, L. R. (1990). The motivational bases of public service. Public Administration Review, 50(3), 367–373. https://doi.org/10.2307/976618
  • Piotrowski, V. (2023). State of the CyberCorps® SFS program. Presented at SFS Internship Fair. National Harbor Maryland.
  • Porter, C., & Serra, D. (2020). Gender differences in the choice of major: The importance of female role models. American Economic Journal: Applied Economics, 12(3), 226–254. https://doi.org/10.1257/app.20180426
  • Quadlin, N. (2020). From major preferences to major choices: Gender and logics of major choice. Sociology of Education, 93(2), 91–109. https://doi.org/10.1177/0038040719887971
  • Richter, F. (2019). The tech world is still a man’s world. Statista. https://www.statista.com/chart/4467/female -employees-at-tech-companies/.
  • Rodriguez, S. (2022, October 22). Talent remains in high demand amid cybersecurity workforce shortage. Health IT Security. https://healthitsecurity.com/news/talent-remains-in-high-demand-amid-cybersecurity-workforce-shortage.
  • Romanosky, S., Schwindt, K., & Johnson, R. (2023). Comparison of public and private sector cybersecurity and IT workforces. Santa Monica, CA: RAND Corporation. https://www.rand.org/pubs/research_reports/RRA660-7.html.
  • RTI International. (2021). First-generation college graduates’ employment and finances. Washington, DC: NASPA. https://firstgen.naspa.org/files/dmfile/FactSheet_04.pdf.
  • Sherman, A. T., Peterson, P. A., Golaszewski, E., LaFemina, E., Goldschen, E., Khan, M., Mundy, L., Rather, M., Solis, B., Tete, W., Valdez, E., Weber, B., Doyle, D., O'Brien, C., Oliva, L., Roundy, J., & Suess, J. (2019). Project-based learning inspires cybersecurity students: A scholarship-for-service research study. IEEE Security & Privacy, 17(3), 82–88. https://doi.org/10.1109/MSEC.2019.2900595
  • Shumba, R., Ferguson-Boucher, K., Sweedyk, E., Taylor, C., Franklin, G., Turner, C., Sande, C., Acholonu, G., Bace, R., & Hall, L. (2013, June). Cybersecurity, women and minorities: findings and recommendations from a preliminary investigation. Proceedings of the ITiCSE Working Group Reports Conference on Innovation and Technology in Computer Science Education-Working Group Reports (pp. 1–14). ITiCSE.
  • Simpson, J. C. (2003). Mom matters: Maternal influence on the choice of academic major. Sex Roles, 48(9/10), 447–460. https://doi.org/10.1023/A:1023530612699
  • Sinclair, M., O'Toole, J., Malawaraarachchi, M., & Leder, K. (2012). Comparison of response rates and cost-effectiveness for a community-based survey: postal, internet and telephone modes with generic or personalised recruitment approaches. BMC Medical Research Methodology, 12(1), 132. https://doi.org/10.1186/1471-2288-12-132
  • Tate, K. A., Caperton, W., Kaiser, D., Pruitt, N. T., White, H., & Hall, E. (2015). An exploration of first-generation college students’ career development beliefs and experiences. Journal of Career Development, 42(4), 294–310. https://doi.org/10.1177/0894845314565025
  • Trenor, J. M. (2009). A phenomenological inquiry of the major choice processes of an overlooked demographic: First generation college students in engineering. In Proceedings of the 2009 Research in Engineering Education Symposium, Queensland.
  • Vogel, R. (2016). Closing the cybersecurity skills gap. Salus Journal, 4(2), 32–46.
  • Wang, M. T., & Degol, J. L. (2017). Gender gap in science, technology, engineering, and mathematics (STEM): Current knowledge, implications for practice, policy, and future directions. Educational Psychology Review, 29(1), 119–140. https://doi.org/10.1007/s10648-015-9355-x
  • Warrick, T., & Durkovich, C. (2020). Future of DHS project: Key findings and recommendations. Atlantic Council, Scowcroft Center for Strategy and Security.
  • Weeks, K. P., & Schaffert, C. (2019). Generational differences in definitions of meaningful work: A mixed methods study. Journal of Business Ethics, 156(4), 1045–1061. https://doi.org/10.1007/s10551-017-3621-4
  • Wilshusen, G. C., & Melvin, V. C. (2011). Cybersecurity human capital: Initiatives need better planning and coordination. United States Government Accountability Office.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.