https://doi.org/10.1093/cybsec/tyae002

Introduction

         As the technological spectrum continues to grow and flourish it also opens a pandora’s box of uncharted territory of threats against the U.S. The article attempts to explore the tip of the iceberg of technological challenges by examining preventative measures and educational and training programs. This article review will dive into how the article relates to the principles of the social sciences, the research methods including data, and analysis, lastly, how the article addresses challenges and concerns of diminished groups and the contributions to society.

Review of Literature

         A principle of social science that can be intertwined with the article is the principle of relativism. Relativism being defined as simply that all things are related. The article examines this principle by discussing the technological competency deficiency within the Department of Homeland Security (DHS) stating, “The education and training programs that are existing within the DHS do not hold technology as a prioritized element or little to no integration of this specific core competency” (Black, et. al, 2024). This creates an intellectual gap between the workforce of the intelligence community and upcoming and emerging technological advancements.

            The basis of the articles research is founded upon the knowledge of deficiencies around the cyberspace. Formulating and constructing the study’s research question, “How can the DHS obtain proper, updated, and consistent training for the professionals in their field” (Black, et. al, 2024). Seeking out the answer to this in the form of simply challenges that face the DHS such as: the difference in standards, the privatization of the cyber realm, etc.

            The next two points the research methods utilized and how the data and analysis done from the research methods loop into the fold of the research. The research method used for this study was a survey. The researchers issued this survey to government contacts associated with the DHS as well as the private sector. Analyzing the data afterwards showed that most of the survey responses were completed from the private sector. However, a point to note from the researchers is “government employees might find such surveys untrustworthy, have concerns about the confidentiality of the information provided” (Black, et. al, 2024). The gray area that surrounds surveys, from the PowerPoint on Strategies of Cybersecurity that the study considers is concepts like sample selection or misrepresentation, led to closely examining the context of the answers in comparison to the number of respondents.

            The article consistently discussed the challenges and concerns of the marginalized group of ill-equipped and under trained cybersecurity analysts. Not only are the current analysts not receiving proper education and training by their agencies but there is also a rapidly growing need for extra hands to help in the field. The article dives into the mass vacancies in the cybersecurity workforce with 600,000 vacancies (Black, et. al, 2024). This study contributes to society by adding fuel to the conversation of evident technological deficiencies in specific in the DHS, where the workforce is not only unprepared but simultaneously being overran by an evolving threat.

Conclusion

            In conclusion, this article accurately paints the picture that the DHS must begin developing consistent and advanced training programs for their intelligence analysts. Furthermore, the continuation of education for employed analysts to never become content in a growing field. Finally, this article reviewed touched on the basis of this study’s research including the relation to the principles of social sciences, analysis, and the impact on society.

References

Michelle Black, Lana Obradovic, Deanna House, Behind the curve: technology challenges facing the homeland intelligence and counterterrorism workforce, Journal of Cybersecurity, Volume 10, Issue 1, 2024, tyae002, https://doi.org/10.1093/cybsec/tyae002