skip to main content
10.1145/2751957.2751958acmconferencesArticle/Chapter ViewAbstractPublication PagescprConference Proceedingsconference-collections
research-article

Video Games as a Training Tool to Prepare the Next Generation of Cyber Warriors

Published:04 June 2015Publication History

ABSTRACT

There is a global shortage of more than 1 million skilled cybersecurity professionals needed to address current cybersecurity challenges [5]. Criminal organizations, nation-state adversaries, hacktavists, and numerous other threat actors continuously target business, government, and even critical infrastructure networks. Estimated losses from cyber crime and cyber espionage amount to hundreds of billions annually [4]. The need to build, maintain, and defend computing resources is greater than ever before. A novel approach to closing the cybersecurity workforce gap is to develop cutting-edge cybersecurity video games that (1) grab the attention of young adults, (2) build a solid foundation of information security knowledge and skills, (3) inform players of potential career paths, and (4) establish a passion that drives them through higher education and professional growth. Although some video games and other games do exist, no viable options are available that target high-school-age students and young adults that supply both a quality gaming experience and foster the gain of key cybersecurity knowledge and skills. Given the Department of Defense's success with simulations and gaming technology, its sponsorship of a cybersecurity video game could prove extremely valuable in addressing the current and future needs for our next generation cyber warriors.

References

  1. Activision & Blizzard. (2014). First Quarter 2014 Results {PDF Document}. Retrieved from http://investor.activision.com/events.cfm.Google ScholarGoogle Scholar
  2. Baldor, Lolita C. & Jelinek, Pauline (March 2014). "Pentagon to triple cyber staff to thwart attacks". Associated Press. Retrieved from http://news.yahoo.com/pentagon-triple-cyber-staff-thwart-attacks-194534255--politics.html.Google ScholarGoogle Scholar
  3. Bureau of Labor Statistics. (Jan 8, 2014).Occupational Outlook Handbook: Information Security Analysts. Retrieved from http://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm.Google ScholarGoogle Scholar
  4. Center for Strategic and International Studies. (2013).The Economic Impact of Cybercrime and Cyber Espionage. {PDF Document} Retrieved from http://csis.org/files/publication/60396rpt_cybercrime-cost_0713_ph4_0.pdf.Google ScholarGoogle Scholar
  5. CISCO. (2014). CISCO 2014 Annual Security Report. {PDF Document} Retrieved from http://www.cisco.com/web/offer/gist_ty2_asset/Cisco_2014_ASR.pdf.Google ScholarGoogle Scholar
  6. Dye, M. W., Green, C. S., & Bavelier, D. (2009). Increasing speed of processing with action video games. Current Directions in Psychological Science, 18(6), 321--326.Google ScholarGoogle ScholarCross RefCross Ref
  7. Dyer, M. (2013, Nov 4). People Play 1900 Years of Call of Duty Multiplayer Every Day. Retrieved from http://www.ign.com/articles/2013/11/04/people-play-1900-years-of-call-of-duty-multiplayer-every-day.Google ScholarGoogle Scholar
  8. Frost and Sullivan. (2013). The 2013 (ISC)2 Global Information Security Workforce Study. {PDF Document} Retrieved from https://www.isc2cares.org/uploadedFiles/wwwisc2caresorg/Content/2013-ISC2-Global-Information-Security-Workforce-Study.pdf.Google ScholarGoogle Scholar
  9. Frost and Sullivan. (2013). Agents of Change: Women in the Information Security Profession, The (ISC)2 Global Information Security Workforce Subreport. {PDF Document} Retrieved from https://www.isc2cares.org/uploadedFiles/wwwisc2caresorg/Content/Women-in-the-Information-Security-Profession-GISWS-Subreport.pdf.Google ScholarGoogle Scholar
  10. Granic, I., Lobel, A., & Engels, R. C. (2013). The benefits of playing video games.Google ScholarGoogle Scholar
  11. Kennedy, B. (2002, July 11). "Uncle Sam Wants You (To Play This Game)." New York Times. http://www.nytimes.com/2002/07/11/technology/uncle-sam-wants-you-to-play-this-game.html.Google ScholarGoogle Scholar
  12. Libicki, M., Senry, D., & Julia, P. (2014). Hackers Wanted: an examination of the cybersecurity labor market. RAND. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Lubinski, W., Bendow, C.P, & Steiger, J. H. (2010). Accomplishment in science, technology, engineering, and mathematics (STEM) and its relation to STEM educational dose: A 25-year longitudinal study. Journal of Educational Psychology. 102, 860--871. Doi: 10.1037/a0019454.Google ScholarGoogle ScholarCross RefCross Ref
  14. McGonigal, J. (2011). Reality is Broken: Why Games Make Us Better and How They Can Change the World. London: Penguin. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Mead, C. (2011). War Play: Video Games and the Future of Armed Conflict. New York: Houghton Mifflin Harcourt. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Merel, T. (2011, July 6). The Big V: The great games market split. Retrieved from http://venturebeat.com/2011/07/06/the-big-v-the-great-games-market-split/.Google ScholarGoogle Scholar
  17. Pearson, D. (2014). Report: Mobile gaming to become gaming's biggest market by 2015. Retrieved from http://www.gamesindustry.biz/articles/2014--10--22-report-mobile-to-become-gamings-biggest-market-by-2015.Google ScholarGoogle Scholar
  18. Prensky, M. (2006). "Don't Bother Me Mom -- I'm Learning." Sat. Paul: Paragon House. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Raytheon. (2013). Preparing Millennials to Lead in Cyberspace. {PDF Document} Retrieved from http://www.raytheon.com/capabilities/rtnwcm/groups/gallery/documents/digitalasset/rtn_158203.pdf.Google ScholarGoogle Scholar
  20. Riddell, R. (1994, April). Doom Goes to War. Wired 5.4 Retrieved from http://archive.wired.com/wired/archive/5.04/ff_doom_pr.html.Google ScholarGoogle Scholar
  21. Rosenberg, D. (2010, May 26). Mobile-gaming revenue to hit $11.4 billion in 2014. Retrieved from http://www.cnet.com/news/mobile-gaming-revenue-to-hit-11--4-billion-in-2014/.Google ScholarGoogle Scholar
  22. Singer, P. (2009, Nov 17). Video Games Veterans and the New American Politics. Washington Examiner. Retrieved from http://washingtonexaminer.com/video-game-veterans-and-the-new-american-politics/article/20385.Google ScholarGoogle Scholar
  23. Turman, L. (Sep 27, 2010). "Action video games speed up decision-making process." Washington Post. Retrieved from http://washingtonpost.com/wp-dyn/content/article/2010/09/27/AR2010092705244.html.Google ScholarGoogle Scholar
  24. United States Government Accountability Office. (Sep 2013). DHS Recruiting and Hiring: DHS is Generally Filling Mission-Critical Positions, but Could Better Track Costs of Coordinated Recruiting Efforts. {PDF Document}. Retrieved from http://www.gao.gov/assets/660/657902.pdf.Google ScholarGoogle Scholar

Index Terms

  1. Video Games as a Training Tool to Prepare the Next Generation of Cyber Warriors

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Conferences
                SIGMIS-CPR '15: Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research
                June 2015
                176 pages
                ISBN:9781450335577
                DOI:10.1145/2751957

                Copyright © 2015 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 4 June 2015

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • research-article

                Acceptance Rates

                SIGMIS-CPR '15 Paper Acceptance Rate26of47submissions,55%Overall Acceptance Rate300of480submissions,63%

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader