RES804-2305C-02_Unit9_IP

docx

School

Colorado Technical University *

*We aren’t endorsed by this school

Course

804

Subject

Sociology

Date

Feb 20, 2024

Type

docx

Pages

7

Uploaded by BarristerLobster4027

Report
1 Kwabena Awuah Colorado Technical University RES804-2305-02: Principles of Research Methods and Design Dr. Kathleen Hargiss January 28, 2024
2 Title: Evaluating the Impact of Cybersecurity Training on the Work Readiness of Transitioning Veterans: A Comprehensive Analysis Dissertation Prospectus Problem Statement Transitioning from military to civilian life is a critical and frequently tricky time for veterans. This transition becomes incredibly complicated when veterans begin searching for cybersecurity employment or other specialized and swiftly developing fields. Although several training programs are designed to prepare veterans for the civilian workforce, there needs to be more knowledge regarding the comprehensive evaluation and assessment of their efficacy. By assessing how cybersecurity training affects the work readiness of transitioning veterans, this research aims to close the gap. The research will examine how these programs equip veterans for cybersecurity positions as civilians and pinpoint possible avenues for enhancement to prepare them for the workforce better. The underutilization of veterans, who possess valuable skills that could be refined for this industry, contrasts with the increasing demand for cybersecurity professionals in the civilian workforce, further exacerbating this issue. Therefore, the research will be of the utmost importance in comprehending and resolving the disparity between veteran training programs and the practical demands of the cybersecurity labor market. Significance This research is noteworthy for several reasons. Initially, this study makes a scholarly contribution by addressing a research void about the transition of veterans, specifically as it
3 relates to cybersecurity training. The discoveries will enhance scholarly dialogue regarding the customization of specialized training programs to address the distinct requirements of veterans undergoing transition more effectively. Furthermore, the research findings have pragmatic ramifications for many stakeholders, encompassing policymakers, academic establishments, and veterans' affairs-oriented organizations. The research findings possess the potential to provide valuable guidance for improving current training programs and influencing the creation of novel initiatives. As a result, they may have a direct effect on the employment opportunities and preparedness of the veteran workforce. It tackles a significant deficiency within the cybersecurity sector. The research has the potential to alleviate the skills deficit in the industry by identifying efficacious strategies for training veterans. This would be advantageous for both the veterans and the industry. Conceptual/Theoretical Framework The research will be anchored in two primary theoretical frameworks: Transition Theory and Skill Gap Theory. Transition Theory, notably Schlossberg's Transition Model, offers a comprehensive lens to examine the multifaceted process veterans undergo when shifting from military to civilian life. This model's focus on transition types, contexts, individual perceptions, and coping strategies will be instrumental in understanding the psychological and social dynamics of veterans' transition to cybersecurity training. Concurrently, the Skill Gap Theory provides a critical framework for analyzing the alignment (or misalignment) between the skills imparted by training programs and those demanded by the civilian job market. This theory will be pivotal in assessing the efficacy of
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4 cybersecurity training programs in equipping veterans with the necessary skills to fill existing gaps in the cybersecurity workforce. By integrating these two theories, the research will offer a holistic view of the transition process and skill development's role in enhancing veterans' work readiness. Statement of Research Purpose The main goal of this qualitative research is to perform an exhaustive assessment of cybersecurity training has influence on veterans' readiness to transition to the workforce. This requires an in-depth evaluation of the efficacy of existing training initiatives, emphasizing identifying the programs' assets and shortcomings. This study aims to investigate the obstacles encountered by veterans participating in these programs and identify potential avenues for improving their progress as they transition into the civilian cybersecurity workforce. The research aims to contribute valuable insights that can inform the development and enhancement of cybersecurity training programs for veterans by providing a comprehensive understanding of these aspects. Proposed General Approach to the Research The research will make use of qualitative methodology, which is well-suited for investigating the complex and nuanced experiences of veterans transitioning into cybersecurity training programs. This methodology facilitates a comprehensive examination of personal viewpoints and experiences, yielding contextually nuanced understandings frequently unattainable when employing quantitative techniques in isolation. By employing a qualitative methodology, this research will capture the veterans' subjective realities, thereby providing a
5 more comprehensive comprehension of their transition experiences, the obstacles they encounter, and the overall effects of the cybersecurity training they undergo. Summary of Proposed Methods Detailed Sources of Data The primary data for this study will be gathered through in-depth, semi-structured interviews with transitioning veterans who have attended cybersecurity training programs. These interviews aim to extract comprehensive and in-depth accounts of the subjects' training, the transition process, and their readiness for civilian cybersecurity roles. By conducting interviews with key stakeholders who were engaged in the development and execution of these training programs, such as program instructors, administrators, and policymakers, a thorough understanding of the program's goals, structure, and perceived results will be obtained. An examination of pertinent policy documents, program curricula, and training materials will constitute secondary data sources. In addition, a comprehensive examination of extant literature concerning veteran transition, cybersecurity training, and workforce readiness will be conducted, furnishing a robust contextual framework for the primary data. Detailed Data Collection Strategies A purposive sample of participants will be selected to participate in the semi-structured interviews, guaranteeing a broad spectrum of experiences and viewpoints. The interview guide will comprise open-ended inquiries that request participants to elaborate on their experiences comprehensively while also allowing the researcher to delve more deeply into particular areas of
6 interest. For data analysis to be conducted accurately, the interviews will be transcribed verbatim from audio recordings. A thematic approach will be utilized to analyze the data, in which emerging themes and patterns will be recognized and examined in connection with the theoretical framework. This process will encompass deductive coding (derived from the theoretical framework) and inductive coding (derived from the data), guaranteeing a thorough examination of the data. Conclusion This qualitative study is well-positioned to provide substantial insights into the effects of cybersecurity training on transitioning veterans' readiness for the workforce. The research endeavors to conduct an in-depth analysis of the efficacy of existing training initiatives by centering on the viewpoints and experiences of veterans and other significant stakeholders. Prior to a successful transition of veterans into the civilian cybersecurity workforce, it is anticipated that the results of this research will contribute to the formulation of policies and training programs that are more efficient.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
7 References CyberSeek. (n.d.). Cybersecurity supply/demand heat map. Retrieved from https://www.cyberseek.org/heatmap.html Cooker, S. (2014). Fighting veteran unemployment by closing the skills translation gap. Monster.com. Retrieved from http://www.military.com/veteran-jobs/career- advice/2014/11/18/fighting-veteran-unemployed.html Golumbeck, M. M. (2021). Understanding the Experience of Military Service Members Transitioning into Civilian Jobs: A Generic Qualitative Study. Capella University. Hicks, K. (2017). Bad idea: Arguing over capabilities- vs. threat-based planning. Defense 360. Retrieved from https://defense360.csis.org/bad-idea-arguing-capabilities-vs-threat-based- planning Marquardson, J., & Elnoshokaty, A. (2020). Skills, Certifications, or Degrees: What Companies Demand for Entry-Level Cybersecurity Jobs. Information Systems Education Journal, 22- 28. Strohschen, G., & Elazier, K. (2019). The Metagogy theorem: A framework for educating adults. International Forum of Teaching and Studies, 15(1), 3-15. American Scholars Press, Inc. The National Career Clusters® Framework. (n.d.). Retrieved from https://www.cteresource.org/career-clusters/