{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T04:53:05Z","timestamp":1768884785653,"version":"3.49.0"},"reference-count":53,"publisher":"Oxford University Press (OUP)","issue":"1","license":[{"start":{"date-parts":[[2024,2,7]],"date-time":"2024-02-07T00:00:00Z","timestamp":1707264000000},"content-version":"vor","delay-in-days":37,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000180","name":"U.S. Department of Homeland Security","doi-asserted-by":"publisher","award":["20STTPC00001"],"award-info":[{"award-number":["20STTPC00001"]}],"id":[{"id":"10.13039\/100000180","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,1,2]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Those charged with protecting the homeland through intelligence analysis, particularly in counterterrorism, must be capable of rapidly adopting innovative technologies to detect and prevent exploitation and disruption of vulnerable critical infrastructures. However, implementing these responses requires a highly skilled technical workforce that is continually provided with timely educational and training programs. Yet, questions remain regarding the technical aptitude necessary to respond to today\u2019s terrorism threats and the Department of Homeland Security\u2019s ability to provide consistent and rigorous standards for technology training and education. By surveying analysts, we examine what, if any, educational and training programs have been provided to adapt and remain technologically competitive and effectively utilize emerging technologies. We find a distinct need to focus on improvements that involve clarifying terms, building a technology and cybersecurity roadmap for analysts, allocating additional training time for employees, and building partnerships with private industry.<\/jats:p>","DOI":"10.1093\/cybsec\/tyae002","type":"journal-article","created":{"date-parts":[[2024,2,7]],"date-time":"2024-02-07T18:57:48Z","timestamp":1707332268000},"source":"Crossref","is-referenced-by-count":5,"title":["Behind the curve: technology challenges facing the homeland intelligence and counterterrorism workforce"],"prefix":"10.1093","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8005-5022","authenticated-orcid":false,"given":"Michelle","family":"Black","sequence":"first","affiliation":[{"name":"Department of Political Science, University of Nebraska at Omaha , Omaha, NE 68182 ,","place":["United States"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7046-1238","authenticated-orcid":false,"given":"Lana","family":"Obradovic","sequence":"additional","affiliation":[{"name":"Department of Political Science, University of Nebraska at Omaha , Omaha, NE 68182 ,","place":["United States"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5360-4276","authenticated-orcid":false,"given":"Deanna","family":"House","sequence":"additional","affiliation":[{"name":"Information Systems and Quantitative Analysis, University of Nebraska at Omaha , Omaha, NE 68182 ,","place":["United States"]}]}],"member":"286","published-online":{"date-parts":[[2024,2,7]]},"reference":[{"key":"2024121909125773000_bib1","first-page":"2","volume-title":"Strategic framework for countering terrorism and targeting violence","author":"Department of Homeland Security (DHS)","year":"2019"},{"key":"2024121909125773000_bib2","first-page":"1","article-title":"Strengthening DHS intelligence analysis education: core competencies, gaps and challenges","volume":"17","author":"Black","year":"2022","journal-title":"J Polic Intell Count Terror"},{"key":"2024121909125773000_bib3","article-title":"Spies, lies, and algorithms: why U.S. intelligence agencies must adapt or fail","author":"Zegart","year":"2019","journal-title":"Foreign Aff"},{"key":"2024121909125773000_bib4","first-page":"138","article-title":"Threats never sleep: we still haven\u2019t done enough to prevent another 9\/11","volume":"1","author":"Zegart","year":"2022","journal-title":"Hoover Digest"},{"key":"2024121909125773000_bib5","first-page":"3","volume-title":"Information Technology for Counterterrorism: Immediate Actions and Future Possibilities","author":"National Academies of Sciences, Engineering, and Medicine","year":"2003"},{"key":"2024121909125773000_bib6","doi-asserted-by":"crossref","first-page":"613","DOI":"10.1504\/IJTM.1997.002583","article-title":"Technology, innovation and strategy: recent developments","volume":"14","author":"Giget","year":"1997","journal-title":"Int J Technol Manag"},{"key":"2024121909125773000_bib7","doi-asserted-by":"crossref","first-page":"4","DOI":"10.3991\/ijet.v14i04.9118","article-title":"Technological competencies: as systematic review of the literature in 22 years of study","volume":"14","author":"Arballo","year":"2019","journal-title":"Int J Emerg Technol Learn"},{"key":"2024121909125773000_bib8","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1080\/08850600802486986","article-title":"Training and educating U.S. intelligence analysts","volume":"22","author":"Marrin","year":"2009","journal-title":"Int J Intell Counterintell"},{"key":"2024121909125773000_bib9","doi-asserted-by":"crossref","first-page":"903","DOI":"10.1080\/02684527.2016.1147164","article-title":"Rethinking the training of intelligence analysts","volume":"31","author":"Chang","year":"2016","journal-title":"Intell Natl Secur"},{"key":"2024121909125773000_bib10","first-page":"1","article-title":"The integration of statistical learning in intelligence education: is the academy equipping tomorrow\u2019s intelligence professionals to analyze data-centric threats?","author":"Ramsay","year":"2022","journal-title":"J Polic Intell Count Terror"},{"key":"2024121909125773000_bib11","article-title":"Data-science literacy for future security and intelligence professionals","author":"Coulthart","year":"2023","journal-title":"J Polic Intell Count Terror"},{"key":"2024121909125773000_bib12","author":"Federal Property and Administrative Services"},{"key":"2024121909125773000_bib13","first-page":"33","volume-title":"Cybersecurity: a primer for state utility regulators, version 3.0","author":"Keogh","year":"2017"},{"key":"2024121909125773000_bib14","volume-title":"ISO\/IEO 2382-36. Information technology for learning, education and training","author":"International Organization for Standardization (ISO)","year":"2019"},{"key":"2024121909125773000_bib15","volume-title":"Cybersecurity career paths and progression","author":"Cybersecurity and Infrastructure Security Agency (CISA)","year":"2019"},{"key":"2024121909125773000_bib16","volume-title":"An Ethnographic Study of Culture and Collaborative Technology in the Intelligence Community","author":"McNamara","year":"2007"},{"key":"2024121909125773000_bib17","article-title":"The most militarized universities in America: a VICE News investigation","author":"Arkin","year":"2015"},{"key":"2024121909125773000_bib18","volume-title":"The analytic edge: leveraging emerging technologies to transform intelligence analysis","author":"Katz","year":"2020"},{"key":"2024121909125773000_bib20","doi-asserted-by":"crossref","first-page":"1649","DOI":"10.1108\/JEIM-01-2020-0010","article-title":"Understanding the role of employees in digital transformation: conceptualization of digital literacy of employees as a multi-dimensional organizational affordance","volume":"34","author":"Kozanglu","year":"2020","journal-title":"J Enterp Inf Manag"},{"key":"2024121909125773000_bib22","article-title":"The augmenting intelligence using machines (AIM) initiative: a strategy for augmenting intelligence using machines","volume-title":"Report","author":"Office of the Director of National Intelligence (ODNI)","year":"2019"},{"key":"2024121909125773000_bib23","doi-asserted-by":"crossref","first-page":"673","DOI":"10.1080\/02684527.2019.1579410","article-title":"Augmenting human cognition to enhance strategic, operational, and tactical intelligence","volume":"34","author":"Regens","year":"2019","journal-title":"Intell National Secur"},{"key":"2024121909125773000_bib24","doi-asserted-by":"crossref","first-page":"827","DOI":"10.1080\/02684527.2021.1946952","article-title":"The impact of AI on intelligence analysis: tackling issues of collaboration, algorithmic transparency, accountability and management","volume":"36","author":"Vogel","year":"2021","journal-title":"Intell National Secur"},{"key":"2024121909125773000_bib25","first-page":"239","article-title":"President\u2019s Budget FY22, information technology and cybersecurity funding","author":"The White House","year":"2021"},{"key":"2024121909125773000_bib26","first-page":"92","article-title":"Big data and intelligence: applications, human capital, and education","volume":"9","author":"Landon-Murray","year":"2016","journal-title":"J Strateg Secur"},{"key":"2024121909125773000_bib27","doi-asserted-by":"crossref","first-page":"68","DOI":"10.2478\/raft-2020-0009","article-title":"National cybersecurity education: bridging defense to offense","volume":"25","author":"Dawson","year":"2020","journal-title":"Land Forces Acad Rev"},{"key":"2024121909125773000_bib28","volume-title":"The Comprehensive National Cybersecurity Initiative","author":"The White House","year":"2009"},{"key":"2024121909125773000_bib29","first-page":"24","volume-title":"A human capital crisis in cybersecurity: technical proficiency matters","author":"Evans","year":"2010"},{"key":"2024121909125773000_bib30","first-page":"20","article-title":"A resilient cybersecurity professional charts the path forward: (ISC)2 cybersecurity workforce study","author":"International Information System Security Certification Consortium (ISC)2","year":"2021"},{"key":"2024121909125773000_bib31","volume-title":"The cybersecurity workforce gap","author":"Crumpler","year":"2019"},{"key":"2024121909125773000_bib32","author":"CyberSeek","year":"2022"},{"key":"2024121909125773000_bib33","volume-title":"DHS sprint to hire cybersecurity professionals","author":"Westbrook","year":"2021"},{"key":"2024121909125773000_bib34","article-title":"Nine remote working trends to look out for in 2022 and 2023","author":"Kennard","year":"2022"},{"key":"2024121909125773000_bib35","first-page":"35","article-title":"Closing the gaps in cybersecurity","volume":"115","author":"Petruzzelli","year":"2019","journal-title":"Chem Eng Prog"},{"key":"2024121909125773000_bib36","first-page":"36","volume-title":"The life and times of cybersecurity professionals 2020, a cooperative research project by ESG and ISSA","author":"Oltsik","year":"2020"},{"key":"2024121909125773000_bib37","first-page":"23","volume-title":"The life and times of cybersecurity professionals 2020, a cooperative research project by ESG and ISSA","author":"Oltsik","year":"2020"},{"key":"2024121909125773000_bib38","volume-title":"Occupational Outlook Handbook","author":"U.S. Bureau for Labor Statistics (BLS)","year":"2020"},{"key":"2024121909125773000_bib39","article-title":"Why you should rethink the sources of untapped tech talent","author":"Jebaraj","year":"2022"},{"key":"2024121909125773000_bib40","author":"Gartner","year":"2021"},{"key":"2024121909125773000_bib41","article-title":"What\u00a0We\u00a0Do","author":"Raytheon","year":"2016"},{"key":"2024121909125773000_bib42","doi-asserted-by":"crossref","first-page":"673","DOI":"10.1080\/02684527.2019.1579410","article-title":"Augmenting human cognition to enhance strategic, operational, and tactical intelligence","volume":"34","author":"Regens","year":"2019","journal-title":"Intell National Secur"},{"key":"2024121909125773000_bib43","doi-asserted-by":"crossref","first-page":"827","DOI":"10.1080\/02684527.2021.1946952","article-title":"The impact of AI on intelligence analysis: tackling issues of collaboration, algorithmic transparency, accountability and management","volume":"36","author":"Vogel","year":"2021","journal-title":"Intell National Secur"},{"key":"2024121909125773000_bib44","volume-title":"Policy, data, oversight","author":"Office of Personnel Management [OPM]","year":"2022"},{"key":"2024121909125773000_bib45","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1086\/266934","article-title":"Implications of nonresponse for the interpretation of mail questionnaire data","volume":"24","author":"Donald","year":"1960","journal-title":"Public Opin Q"},{"key":"2024121909125773000_bib46","doi-asserted-by":"crossref","first-page":"284","DOI":"10.1037\/0021-9010.85.2.284","article-title":"Employee attitude surveys: examining the attitudes of noncompliant employees","volume":"85","author":"Rogelberg","year":"2000","journal-title":"J Appl Psychol"},{"key":"2024121909125773000_bib47","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1093\/ijpor\/edh089","article-title":"Survey incentives: cash vs. in-kind; face-to-face vs. mail; response rate vs. nonresponse error","volume":"18","author":"Ryu","year":"2006","journal-title":"Int J Public Opin Res"},{"key":"2024121909125773000_bib48","volume-title":"What is cybersecurity?","author":"Cybersecurity and Infrastructure Security Agency (CISA)","year":"2021"},{"key":"2024121909125773000_bib49","author":"National Initiative for Cybersecurity Careers and Studies (NICCS)","year":"2022"},{"key":"2024121909125773000_bib50","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1353\/gia.2017.0044","article-title":"Who\u2019s in control: balance in cyber\u2019s public\u2013private sector partnerships","volume":"18","author":"Healey","year":"2017","journal-title":"Georget J Int Aff"},{"key":"2024121909125773000_bib51","doi-asserted-by":"crossref","DOI":"10.4324\/9780203207116","volume-title":"Public\u2013Private Partnerships","author":"Osborne","year":"2000"},{"key":"2024121909125773000_bib52","volume-title":"Video and learning at work: the state of video in the enterprise 2019","author":"Kaltura","year":"2019"},{"key":"2024121909125773000_bib53","article-title":"Microlearning: the future of professional development","author":"Baer","year":"2020"},{"key":"2024121909125773000_bib54","article-title":"Engage, immerse and inspire with extended reality: immersive learning with XR","author":"Carrel-Billiard","year":"2021"},{"key":"2024121909125773000_bib55","author":"Henry-Nickie","year":"2019"}],"container-title":["Journal of Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/10\/1\/tyae002\/61182313\/tyae002.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/10\/1\/tyae002\/61182313\/tyae002.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,19]],"date-time":"2024-12-19T09:13:25Z","timestamp":1734599605000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article\/doi\/10.1093\/cybsec\/tyae002\/7602882"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,1]]},"references-count":53,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1,2]]}},"URL":"https:\/\/doi.org\/10.1093\/cybsec\/tyae002","relation":{},"ISSN":["2057-2085","2057-2093"],"issn-type":[{"value":"2057-2085","type":"print"},{"value":"2057-2093","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2024,1,1]]},"published":{"date-parts":[[2024,1,1]]},"article-number":"tyae002"}}