Papers by David H Tobey, Ph.D.
Cybersecurity Skills Journal: Practice and Research, 2018
Competence is a complex, multidimensional construct which must be decomposed to fully understand.... more Competence is a complex, multidimensional construct which must be decomposed to fully understand. We review the prevalent problems with the term competency, a term that is essential to clarify if we hope to accurately assess the efficacy of competency-based education. We develop a glossary of terms that eliminate recursive definitions to bring clarity to competency-based instructional design. The proposed taxonomies suggest a framework for evaluating and organizing submissions for the new Cybersecurity Skills Journal.
Cybersecurity Skills Journal: Practice and Research, 2018
The purpose of this paper is to review the development of competency-based educational innovation... more The purpose of this paper is to review the development of competency-based educational innovations introduced at the Community College Cyber Summit (3CS) over the past five years guided by a standard curriculum mapping model. This systematic analysis of the progressive development of competency-based instructional materials contributes insights into the foundations and trends in competency-based education (CBE) for cybersecurity. Most notably limited in this accumulation of instructional innovations are valid assessments of capability maturity and the efficacy of instructional interventions that produce increases in capability. Accordingly, the article will conclude with a discussion of how the 3CS growing emphasis on security fundamentals might gain broader and deeper impact through increasing a focus on Behaviorally-Anchored Rating systems (BARs).
What do the Financial Services and Chemical sectors have in common with the Transportation and Go... more What do the Financial Services and Chemical sectors have in common with the Transportation and Government Facilities sectors? All sectors need workers skilled in cybersecurity. What will it take to have qualified workforce candidates coming out of education or training programs with the necessary cybersecurity skills and abilities? A global study indicates there will be a shortage of approximately 1.8 million skilled cyber workers in the next few years (Center for Cyber Safety and Education 2017) . This creates a two-fold problem for national security and protecting our critical infrastructure from cyber attacks. First, is training a sufficient number of new information security workers and, second, is ensuring that existing Information Technology (IT) and cybersecurity workers have the requisite skills to provide necessary levels of security to protect information assets. This paper addresses the second issue – how to better equip learners to enter into, or remain in, the workforce with the necessary cybersecurity skills and abilities. This paper proposes the use of Competency-Based Education and Mastery Learning (CBML) methodologies as an innovative and more effective approach than the current Outcome-Based Education (OBE) approach. CBML methodologies strive for learners to master critical skills at a minimum 95% competency level, before moving on to the next knowledge or skill component; rather than the OBE approach, where a “passing” grade of “C” equates to a 70% competency level. From which approach would you want to hire cyber workers for the Healthcare and Public Health sector or the Energy sector?
Academy of Management Annual Meeting Proceedings
Prior research tells us much about how experienced leaders attempt to enact strategic change. How... more Prior research tells us much about how experienced leaders attempt to enact strategic change. However, little is known about when is the appropriate time to act. This study proposes and partially tests a model for discovering the onset of a social movement which presents an opportunity for realizing gains from a shift in strategy. We analyze this model in the context of making investment decisions during the recent stock market mania and crisis. We propose that extreme emotive tone expressed in widely distributed communications (news headlines) is an indicator of a shift in market sentiments. Our results show that financial gains may be made by identifying change moments immediately preceding mass shifts in market sentiments. The paper concludes with a discussion of how this model may be applied to better understand the dynamics of strategic organizational change.
In the spring of 2011 the U.S. Department of Energy awarded a project to Pacific Northwest Nation... more In the spring of 2011 the U.S. Department of Energy awarded a project to Pacific Northwest National Laboratory (PNNL) in partnership with the National Board of Information Security Examiners (NBISE) to develop a set of guidelines to enhance the development of the smart grid cybersecurity workforce and provide a foundation for future certifications. The initial scope of the project is limited to operational security job functions. The primary purpose of this study is to develop a measurement model that may be used to guide curriculum, assessments, and other development of technical and operational smart grid cybersecurity knowledge, skills, and abilities. Knowledge is defined as the understanding of a concept, strategy, or procedure. Thus, knowledge is measured by depth of understanding, from shallow to deep. Skill is defined as the reliable application of knowledge to achieve desired outcomes. Thus, skill is measured by the degree of reliability, from inconsistent to consistent. Abi...
For almost twenty years researchers have predicted the end of personnel as HRM practices increasi... more For almost twenty years researchers have predicted the end of personnel as HRM practices increasingly became a line management function. However, while useful for describing shifts in human resource responsibilities, this practice-based view obscures the fundamental strategic reason for this shift – executive demands for effective means to manage performance. This paper contributes a new approach for HRM that may better predict which current practices will be most successful and suggests the characteristics of new practices that may be developed using an example of goal-setting and performance appraisal. The theory includes a model of human performance based on recent advances in cognitive neuroscience that suggests HRM may fulfill a strategic role by reestablishing its core competence as specialists in industrial psychology who create systems for guiding skilled performance. We conclude by proposing a measure that assesses the link between performance and customer perceived value a...
Research in Organizational Change and Development, 2009
Journal of Management, Spirituality & Religion, 2007
International Journal of Innovation and Learning, 2013
ABSTRACT Immigrant-founded enterprises contribute significantly to host country economies. Resear... more ABSTRACT Immigrant-founded enterprises contribute significantly to host country economies. Research indicates that immigrant entrepreneurs garner benefits from their social capital within co-ethnic communities. Relationship strength, community norms, and the level of community embeddedness seem to influence the potential for developing immigrant-founded businesses. Despite its start-up phase benefits, co-ethnic social capital may impose limitations on these enterprises. We offer a theoretical analysis connecting social ties, and network structure with the ability of immigrant-founded enterprises to innovate. This paper expands our understanding of immigrant-founded enterprises, and informs interested parties of the value of developing the immigrant entrepreneurs' social capital beyond co-ethnic communities.
System Sciences, 2001. …, 2001
Abstract A vast wealth of lab and field research shows that when the right group support system (... more Abstract A vast wealth of lab and field research shows that when the right group support system (GSS) tool is applied to the right task, team productivity can be significantly enhanced. Until recently, no clear pattern emerged to explain why one GSS installation would succeed when another would not. The results were unpredictable. The paper considers the case of the US Navy's Third Fleet aboard the USS Coronado. The Fleet's J2 Intelligence community adopted GSS for situational awareness and analysis after only ...
Educators and sponsors endorse competitions as a strong, positive influence on career choice. How... more Educators and sponsors endorse competitions as a strong, positive influence on career choice. However, empirical studies of cybersecurity competitions are lacking, and evidence from computer science and mathematics competitions has been mixed. Here we report initial results from an ongoing study of the National Cyber League to provide a glimpse of the role of competitions in fostering cybersecurity career engagement. Preliminary results suggest that cyber competitions attract experienced individuals who will remain in the profession for the long-term, but future research is needed to understand how cyber competitions may engage women and those new to the field.
The U.S. Department of Energy has taken the initiative to establish a cybersecurity smart grid wo... more The U.S. Department of Energy has taken the initiative to establish a cybersecurity smart grid workforce project to identify a measurement method of the identified job skills for the purpose of developing a certification. A smart grid cybersecurity certification will greatly help employers identify qualified cybersecurity professionals to protect and secure the national electric smart grid infrastructure. Pacific Northwest National Laboratory, in partnership with the National Board of Information Security Examiners (NBISE), is leading this three-phase project. Phase I of the project was completed in June 2012. This report provides a brief review of Phase I activities and documents the results to date.
The proposed Ground Truth Expertise Development model
uses the latest advances in psychological, ... more The proposed Ground Truth Expertise Development model
uses the latest advances in psychological, cognitive, and social
science to identify and develop security “top guns” who can work productively under pressure, think together creatively, regroup adaptively, and adjust swiftly to any tactical failures to create a resilient systems security architecture.
For almost twenty years researchers have predicted the end of personnel as HRM practices increasi... more For almost twenty years researchers have predicted the end of personnel as HRM practices increasingly became a line management function. However, while useful for describing shifts in human resource responsibilities, this practice-based view obscures the fundamental strategic reason for this shift – executive demands for effective means to manage performance. This paper contributes a new approach for HRM that may better predict which current practices will be most successful and suggests the characteristics of new practices that may be developed using an example of goal-setting and performance appraisal. The theory includes a model of human performance based on recent advances in cognitive neuroscience that suggests HRM may fulfill a strategic role by reestablishing its core competence as specialists in industrial psychology who create systems for guiding skilled performance. We conclude by proposing a measure that assesses the link between performance and customer perceived value across the value chain, thereby demonstrating the return on investment in human resources.
Recent research in cognitive and social psychology finds that individual change is more emotional... more Recent research in cognitive and social psychology finds that individual change is more emotional than rational. Mounting evidence suggests that the contagious power of emotions explains how groups may overcome obstacles and behave in unified ways, even though they are unaware of these powerful effects. We offer a neuropsychological model of emotion-driven change in organizations that explains these findings and predicts conditions in which contagion effects will be successful in facilitating rapid change. Our model posits that emotive precursors to conscious action enable goal alignment and overcome cognitive resource limitations necessary to sustain organizational change over time. Our model adapts the findings from social and cognitive neuroscience to bring new insights into the mental mechanisms underlying the change process. The paper concludes with tentative suggestions for developing new methods for research and practice that improve our predictive capability for creating rapid large-scale organizational change.
Talks by David H Tobey, Ph.D.
Review of the emerging science of cybersecurity competency development and assessment, addressing... more Review of the emerging science of cybersecurity competency development and assessment, addressing the critical questions: 1. Are we measuring the right things?
2. Are we measuring the right way?
3. Are our measures meaningful and predictive?
Discuss methods, best practices, and challenges ahead. Conclude with a discussion on why job performance models are important.
The need for expertise has never been greater. Large percentages of the workforce are due for ret... more The need for expertise has never been greater. Large percentages of the workforce are due for retirement as the baby boom generation ages. At the same time, the use of cyber technology as the new weapon of mass destruction is increasing the demand for expertise to be able to detect the feint signals in critical infrastructure system operation that indicate a cyber attack is underway. Therefore certification programs must change from a focus on "reducing the qualified" to "increasing the capable" by measuring potential performance as well as past achievements.
Teaching Documents by David H Tobey, Ph.D.
Uploads
Papers by David H Tobey, Ph.D.
uses the latest advances in psychological, cognitive, and social
science to identify and develop security “top guns” who can work productively under pressure, think together creatively, regroup adaptively, and adjust swiftly to any tactical failures to create a resilient systems security architecture.
Talks by David H Tobey, Ph.D.
2. Are we measuring the right way?
3. Are our measures meaningful and predictive?
Discuss methods, best practices, and challenges ahead. Conclude with a discussion on why job performance models are important.
Teaching Documents by David H Tobey, Ph.D.
uses the latest advances in psychological, cognitive, and social
science to identify and develop security “top guns” who can work productively under pressure, think together creatively, regroup adaptively, and adjust swiftly to any tactical failures to create a resilient systems security architecture.
2. Are we measuring the right way?
3. Are our measures meaningful and predictive?
Discuss methods, best practices, and challenges ahead. Conclude with a discussion on why job performance models are important.
resource-based view (RBV) of the firm in an effort to bring two differing strategic paradigms to a common ground potentially offering insights on how story can be valuated.