{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T17:51:21Z","timestamp":1776275481966,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,8,30]],"date-time":"2022-08-30T00:00:00Z","timestamp":1661817600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,8,30]],"date-time":"2022-08-30T00:00:00Z","timestamp":1661817600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"published-print":{"date-parts":[[2023,4]]},"DOI":"10.1007\/s10796-022-10332-y","type":"journal-article","created":{"date-parts":[[2022,8,30]],"date-time":"2022-08-30T09:04:50Z","timestamp":1661850290000},"page":"431-450","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["RQ Labs: A Cybersecurity Workforce Skills Development Framework"],"prefix":"10.1007","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9178-2391","authenticated-orcid":false,"given":"Clinton","family":"Daniel","sequence":"first","affiliation":[]},{"given":"Matthew","family":"Mullarkey","sequence":"additional","affiliation":[]},{"given":"Manish","family":"Agrawal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,30]]},"reference":[{"key":"10332_CR1","unstructured":"(ISC)2. (2021). A Resilient Cybersecurity Profession Charts the Path Forward, (ISC)2 Cybersecurity Workforce Study, 2021. (ISC)2."},{"key":"10332_CR2","unstructured":"Addiscott, R., & Olyaei, S. (2021). Emerging Cybersecurity Leaders Are Needed Now to Sustain Security Program Effectiveness. Gartner, Inc."},{"key":"10332_CR3","unstructured":"Baker, M. (2016). Striving for effective cyber workforce development. Software Engineering Institute, 1\u201326."},{"key":"10332_CR4","unstructured":"Beuran, R., Chinen, K.-i., Tan, Y., & Shinoda, Y. (2016). Towards Effective Cybersecurity Education and Training. School of Information Science, Graduate School of Advanced Science and Technology. Japan Advanced Institute of Science and Technology."},{"key":"10332_CR5","unstructured":"Bureau of Labor Statistics. (2021). Occupational Outlook Handbook. (U.S. Department of Labor) Retrieved December 2021, from Information Security Analysts: https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm"},{"key":"10332_CR6","unstructured":"Burg, D., Maddison, M., & Watson, R. (2021). Cybersecurity: How do you rise above the waves of a perfect storm? Retrieved December 2021, from EY Building a better working World: https:\/\/www.ey.com\/en_us\/cybersecurity\/cybersecurity-how-do-you-rise-above-the-waves-of-a-perfect-storm"},{"key":"10332_CR7","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.cose.2018.01.015","volume":"75","author":"K Cabaj","year":"2018","unstructured":"Cabaj, K., Domingos, D., & Respicio, A. (2018). Cybersecurity education: Evolution of the discipline and analysis of masters programs. Computers & Security, 75, 24\u201335.","journal-title":"Computers & Security"},{"key":"10332_CR8","doi-asserted-by":"crossref","unstructured":"Caulkins, B. D., Badillo-Urquiola, K., Bockelman, P., & Leis, R. (2016). Cyber Workforce Development Using a Behavioral Cybersecurity Paradigm. 2016 International Conference on Cyber Conflict (CyCon U.S.) (pp. 21\u201323). Washington, DC: IEEE.","DOI":"10.1109\/CYCONUS.2016.7836614"},{"key":"10332_CR9","doi-asserted-by":"crossref","unstructured":"Conklin, W., Cline, R. E., & Roosa, T. (2014a). Re-engineering Cybersecurity Education in the US: An Analysis of the Critical Factors. 2014a Hawaii International Conference on System Science (pp. 2006\u20132014a). IEEE Computer Society.","DOI":"10.1109\/HICSS.2014.254"},{"key":"10332_CR10","doi-asserted-by":"crossref","unstructured":"Conklin, W., Cline, R., & Roosa, T. (2014b). Re-engineering Cybersecurity Education in the US: An Analysis of the Critical Factors. 47th Hawaii International Conference on System Science, 2006\u20132014b.","DOI":"10.1109\/HICSS.2014.254"},{"key":"10332_CR11","doi-asserted-by":"crossref","unstructured":"Daniel, C., Mullarkey, M., Agrawal, M. (2022). RQ Labs: A Cybersecurity Workforce Talent Program Design. In: Krishnan, R., Rao, H.R., Sahay, S.K., Samtani, S., Zhao, Z. (eds) Secure Knowledge Management In The Artificial Intelligence Era. SKM 2021. Communications in Computer and Information Science, vol 1549. Springer, Cham.","DOI":"10.1007\/978-3-030-97532-6_10"},{"issue":"1","key":"10332_CR12","first-page":"57","volume":"5","author":"BE Endicott-Popovsky","year":"2014","unstructured":"Endicott-Popovsky, B. E., & Popovsky, V. M. (2014). Application of Pedagogical Fundamentals for the Holistic Development of Cybersecurity Professionals. Cybersecurity Education, 5(1), 57\u201368.","journal-title":"Cybersecurity Education"},{"key":"10332_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2020.102080","volume":"100","author":"S Furnell","year":"2021","unstructured":"Furnell, S. (2021). The cybersecurity workforce and skills. Computers & Security, 100, 1\u20137.","journal-title":"Computers & Security"},{"key":"10332_CR14","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/j.cose.2018.09.009","volume":"80","author":"L Gonzalez-Manzano","year":"2019","unstructured":"Gonzalez-Manzano, L., & de Fuentes, J. M. (2019). Design recommendations for online cybersecurity courses. Computers & Security, 80, 238\u2013256.","journal-title":"Computers & Security"},{"key":"10332_CR15","doi-asserted-by":"crossref","unstructured":"Hevner, A. R., March, S. T., Park, J., & Ram, S. (2004). Design Science in Information Systems Research. MIS Quarterly, 28(1), 75\u2013105.","DOI":"10.2307\/25148625"},{"key":"10332_CR16","unstructured":"ISACA. (2019). State of Cybersecurity 2019, Part 1: Current Trends in Workforce Development. ISACA."},{"key":"10332_CR17","unstructured":"ISACA. (2020). State of Cybersecurity 2020, Part 1: Global Update on Workforce Efforts and Resources. ISACA."},{"key":"10332_CR18","unstructured":"ISACA. (2021). State of Cybersecurity 2021, Part 1: Global Update on Workforce Efforts, Resources and Budgets. ISACA."},{"key":"10332_CR19","unstructured":"Katz, F. H. (2018). Breadth vs. Depth: Best Practices Teaching Cybersecurity in a Small Public University Sharing Models. The Cyber Defense Review, 3(2), 65\u201372."},{"issue":"2","key":"10332_CR20","first-page":"101","volume":"28","author":"KJ Knapp","year":"2017","unstructured":"Knapp, K. J., Maurer, C., & Plachkinova, M. (2017). Maintaining a Cybersecurity Curriculum: Professional Certifications as Valuable Guidance. Journal of Information Systems Education, 28(2), 101\u2013114.","journal-title":"Journal of Information Systems Education"},{"key":"10332_CR21","unstructured":"Morelli, K. (2018, October). USF\/Reliaquest Partnership Aims to Fill the Talent Gap in the Emerging Cybersecurity Field. Retrieved December 2021, from USF Muma College of Business Newsroom Articles: https:\/\/www.usf.edu\/business\/news\/articles\/181002-reliaquest-partnership.aspx"},{"issue":"1","key":"10332_CR22","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1080\/0960085X.2018.1451811","volume":"28","author":"MT Mullarkey","year":"2019","unstructured":"Mullarkey, M. T., & Hevner, A. R. (2019). An elaborated action design research process model. European Journal of Information Systems, 28(1), 6\u201320.","journal-title":"European Journal of Information Systems"},{"key":"10332_CR23","doi-asserted-by":"crossref","unstructured":"Murphy, D. R., & Murphy, R. H. (2013). Teaching Cybersecurity: Protecting the Business Environment. Curriculum Development Conference 2013 (pp. 88\u201393). Kennesaw: ACM.","DOI":"10.1145\/2528908.2528913"},{"key":"10332_CR24","doi-asserted-by":"crossref","unstructured":"Newhouse, W., Keith, S., Scribner, B., & Witte, G. (2017). National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework. U.S. Department of Commerce. National Institute of Standards and Technology.","DOI":"10.6028\/NIST.SP.800-181"},{"key":"10332_CR25","doi-asserted-by":"crossref","unstructured":"Peterson, R., Santos, D., Smith, M. C., Wetzel, K. A., & Witte, G. (2020). Workforce Framework for Cybersecurity (NICE Framework). U.S. Department of Commerce. National Institute of Standards and Technology.","DOI":"10.6028\/NIST.SP.800-181r1"},{"key":"10332_CR26","doi-asserted-by":"publisher","first-page":"807","DOI":"10.1007\/s10796-021-10179-9","volume":"23","author":"SK Sahay","year":"2021","unstructured":"Sahay, S. K., Goel, N., Jadliwala, M., & Upadhyaya, S. (2021). Advances in Secure Knowledge Management in the Artificial Intelligence Era. Information Systems Frontiers, 23, 807\u2013810.","journal-title":"Information Systems Frontiers"},{"issue":"1","key":"10332_CR27","doi-asserted-by":"publisher","first-page":"37","DOI":"10.2307\/23043488","volume":"35","author":"MK Sein","year":"2011","unstructured":"Sein, M. K., Henfridsson, O., Purao, S., Rossi, M., & Lindgren, R. (2011). Action Design Research. MIS Quarterly, 35(1), 37\u201356.","journal-title":"MIS Quarterly"},{"key":"10332_CR28","unstructured":"Spidalieri, F., & McArdle, J. (2016). Transforming the Next Generation of Military Leaders into Cyber-Strategic Leaders: The role of cybersecurity education in US service academies. The Cyber Defense Review"},{"key":"10332_CR29","doi-asserted-by":"crossref","unstructured":"Susman, G. I., & Evered, R. D. (1978). An assessment of the scientific merits of action research. Administrative science quarterly, 582-603","DOI":"10.2307\/2392581"},{"key":"10332_CR30","doi-asserted-by":"crossref","unstructured":"Tang, D., Pham, C., Ken-ichi, C., & Razvan, B. (2017). Interactive Cybersecurity Defense Training Inspired by Web-based Learning Theory. 2017 IEEE 9th International Conference on Engineering Education (ICEED) (pp. 90\u201395). IEEE.","DOI":"10.1109\/ICEED.2017.8251171"},{"key":"10332_CR31","doi-asserted-by":"crossref","unstructured":"Tang, C., Tucker, C., Servin, C., Geissler, M., Stange, M., Jones, N., \u2026, Schmelz, P. (2020). Cybersecurity Curricular Guidance for Associate-Degree Programs. Association for Computing Machinery (ACM), Committee for Computing Education in Community Colleges (CCECC).","DOI":"10.1145\/3328778.3372622"},{"key":"10332_CR32","doi-asserted-by":"crossref","unstructured":"Ward, P. (2021). Constructing a Methodology for Developing a Cybersecurity Program. Proceedings of the 54th Hawaii International Conference on System Sciences (pp. 44\u201353). Honolulu, HI: University of Hawaii at Manoa, Hamilton Library.","DOI":"10.24251\/HICSS.2021.006"},{"key":"10332_CR33","volume-title":"The Security Profession, 2020\u20132021","author":"P Wilson","year":"2021","unstructured":"Wilson, P. (2021). The Security Profession, 2020\u20132021. Chartered Institute of Information Security."}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-022-10332-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10796-022-10332-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-022-10332-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T13:54:25Z","timestamp":1744206865000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10796-022-10332-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,30]]},"references-count":33,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,4]]}},"alternative-id":["10332"],"URL":"https:\/\/doi.org\/10.1007\/s10796-022-10332-y","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"value":"1387-3326","type":"print"},{"value":"1572-9419","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,8,30]]},"assertion":[{"value":"12 August 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 August 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The University of South Florida\u2019s (USF) Foundation has received funding up to $1 million over a 5-year period from ReliaQuest starting in 2018 for the purposes of research and management of the RQ Labs program. The lead author, Dr. Clinton Daniel, has received USF salary stipends from this funding for his efforts in managing the RQ Labs program at the University of South Florida. Dr. Matthew Mullarkey has participated in a USF Funded Externship with ReliaQuest within the past five years. Dr. Manish Agrawal is currently participating in funded research in partnership between the University of South Florida and ReliaQuest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}]}}