Ethical Hacking: Addressing the Critical Shortage of Cybersecurity Talent

Foreign nations have increased their efforts in testing the strength and exposing system vulnerabilities of the cybersecurity critical infrastructure of the countries’ with western principles and alliances. Even more alarming is the shortage of cybersecurity talent in both private and public sectors to combat these efforts. To ensure the nation has an adequate talent pool for defending its critical information assets, cybersecurity skills should be cultivated among citizens by encouraging them to pursue cybersecurity education in universities and colleges. However, a substantial hurdle is the challenging, complex, and technical nature of cybersecurity, which requires a lot of diligence. This study draws on Flow Theory and Self-Determination Theory to propose a solution/framework to attract individuals to the field of cybersecurity to bolster the talent pool of available cybersecurity experts.

[1]  D. Hoang FLOW: The Psychology of Optimal Experience , 2018 .

[2]  S. Donovan,et al.  Federal Cybersecurity Workforce Strategy , 2016 .

[3]  Marylène Gagné,et al.  Understanding e-learning continuance intention in the workplace: A self-determination theory perspective , 2008, Comput. Hum. Behav..

[4]  H. Bless,et al.  Bulletin Personality and Social Psychology Flow and Regulatory Compatibility: an Experimental Approach to the Flow Model of Intrinsic Motivation on Behalf Of: Society for Personality and Social Psychology , 2022 .

[5]  Ping Zhang,et al.  Toward a positive design theory: Principles for designing motivating information and communication technology , 2008 .

[6]  Malcolm Shore,et al.  An Advanced Model of Hacking , 2007 .

[7]  Judy A. Siguaw,et al.  Formative versus Reflective Indicators in Organizational Measure Development: A Comparison and Empirical Illustration , 2006 .

[8]  L. Liao A Flow Theory Perspective on Learner Motivation and Behavior in Distance Education , 2006 .

[9]  Heshan Sun,et al.  Affective Quality and Cognitive Absorption: Extending Technology Acceptance Research , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).

[10]  E. Deci,et al.  Self‐determination theory and work motivation , 2005 .

[11]  Yujong Hwang,et al.  Investigating enterprise systems adoption: uncertainty avoidance, intrinsic motivation, and the technology acceptance model , 2005, Eur. J. Inf. Syst..

[12]  Deborah A. Frincke,et al.  Who Watches the Security Educators? , 2003, IEEE Secur. Priv..

[13]  Olga V. Smyslova,et al.  Flow-Based Model of Computer Hackers' Motivation , 2003, Cyberpsychology Behav. Soc. Netw..

[14]  GefenDavid,et al.  Implementation Team Responsiveness and User Evaluation of Customer Relationship Management , 2002 .

[15]  David Gefen,et al.  Implementation Team Responsiveness and User Evaluation of Customer Relationship Management: A Quasi-Experimental Design Study of Social Exchange Theory , 2002, J. Manag. Inf. Syst..

[16]  J. Eccles,et al.  Motivational beliefs, values, and goals. , 2002, Annual review of psychology.

[17]  Robert J. Vallerand,et al.  Associations Among Perceived Autonomy Support, Forms of Self-Regulation, and Persistence: A Prospective Study , 2001 .

[18]  H. Winklhofer,et al.  Index Construction with Formative Indicators: An Alternative to Scale Development , 2001 .

[19]  Elena Karahanna,et al.  Time Flies When You're Having Fun: Cognitive Absorption and Beliefs About Information Technology Usage , 2000, MIS Q..

[20]  E. Deci,et al.  Intrinsic and Extrinsic Motivations: Classic Definitions and New Directions. , 2000, Contemporary educational psychology.

[21]  Wynne W. Chin The partial least squares approach for structural equation modeling. , 1998 .

[22]  Marylène Gagné,et al.  Proximal Job Characteristics, Feelings of Empowerment, and Intrinsic Motivation: A Multidimensional Model , 1997 .

[23]  R. Vallerand Toward A Hierarchical Model of Intrinsic and Extrinsic Motivation , 1997 .

[24]  S. Deshpande,et al.  Task Characteristics and the Experience of Optimal Flow in Human—Computer Interaction , 1994 .

[25]  Philip H. Mirvis Flow: The Psychology of Optimal Experience , 1991 .

[26]  M. Csíkszentmihályi The flow experience and its significance for human psychology. , 1988 .

[27]  Edward L. Deci,et al.  An Instrument to Assess Adults' Orientations toward Control versus Autonomy with Children: Reflections on Intrinsic Motivation and Perceived Competence. , 1981 .

[28]  C. Fornell,et al.  Evaluating structural equation models with unobservable variables and measurement error. , 1981 .

[29]  Edward L. Deci,et al.  The Empirical Exploration of Intrinsic Motivational Processes1 , 1980 .

[30]  R. Smith,et al.  Department of Defense. , 2020, Military medicine.

[31]  Richard,et al.  Motivation through the Design of Work: Test of a Theory. , 1976 .