Journal of Education and Learning (EduLear. Vol. No. August 2020, pp. ISSN: 2089-9823 DOI: 10. 11591/edulearn. An analysis framework of portable and measurable higher education for future cybersecurity workforce development Feihong Liu 1. Manghui Tu 2 1School of Information Technology. Ivy Tech Community College. USA 2 Department of Computer Information Technology. Purdue University Northwest. USA Article Info ABSTRACT Article history: An educated workforce is essential to government and industry, hence the need to provide a high-quality workforce has been crucial in higher education academic program development. In the cybersecurity field, the situation is not quite satisfactory, the reason comes down to the fact that this new industry is lacking a portable and measurable framework to evaluate the efficacy of the academic programs, thus, to provide the industry with the unified high-quality In this paper, we aim to come up with a design of an analytical framework for portable and measurable academic programs for future workforce development. The ultimate purpose for our research is to develop cybersecurity workforce through the increase of the number of cybersecurity professionals with a 4-year degree, in this project we will develop a seamless pathway for students transferring from 2-year programs such as Ivy Tech Community College of Indiana(Ivy Tec. Cybersecurity AAS program to a 4year program such as Purdue University Northwest(PNW) CIT program. Received Feb 12, 2020 Revised May 10, 2020 Accepted Jul 24, 2020 Keywords: Competency level Curriculum alignment Cybersecurity Program evaluation Workforce development This is an open access article under the CC BY-SA license. Corresponding Author: Feihong Liu. School of Information Technology Ivy Tech Community College, 3485 Broadway. Gary. IN 46409. USA. Email: fliu9@ivytech. INTRODUCTION The evolving of emerging technologies provides the world with great potential to fuel economic transformation and has achieved more than expected . Cloud computing technology provides economic scale and achieved cost savings for small and medium-sized businesses and has been one of the most profitable departments for large-sized businesses such as Amazon and Microsoft. Big data technology provides business with more information in a shorter period to optimize business processes and produce new products or services to a better-targeted market . , . The technological advancement of the Internet of Things, cloud computing, and big data has driven the industry to the Industry 4. 0 Era and already has a huge social and economic impact on human society. For example, the smart manufacturing driven by the industrial internet is projected to increase productivity and resource efficiency by 18% in the next few years and reduce cost by 2. 6% annually . While these emerging technologies brought the world the economic prosperity, they also raise severe cybersecurity challenges to public organizations and private businesses . , and we have seen everincreasing threats from cyberspace, including eavesdropping, retransmission, tampering, and denial of service attacks, and lead to network behavior denial, spoofing, unauthorized access, and virus transmission. Ginni Rometty. IBMAos Chairman. President, and CEO once said thatAy Cybercrime is the greatest threat to every company and individual in the worldAy. Thus, the advance of cyber technology should be the primary concern in this thrive. Journal homepage: http://journal. id/index. php/EduLearn J. Edu. & Learn. ISSN: 2089-9823 According to Forbes, cybersecurity workforce development is the key to assuring that the nation has adequate capacity to protect information and information systems and yet, more than 30% of companies are short of security expertise in 2017. But it has been estimated by some research that there will be a 3. 5 million shortage in the cybersecurity workforce . The increasing demand for cybersecurity professionals from both government and private sectors makes it a critical mission for the education system to develop the next generation of cybersecurity workforce and citizenry that are capable of advancing national economic prosperity and security. But the fact is that we are short of the cybersecurity workforce, so preparing cybersecurity students to be career-ready is crucial in this case. Studies have shown that while 46% of undergraduates in the US are enrolled in community colleges, only 25% of them will transfer to a four-year institution within five years, but 70% of the cybersecurity jobs require a bachelor degree or higher, so how to better prepare for students to transfer from a 2-Y institution to a 4-Y became the key to this issue. In this paper, we are going to discuss how to develop higher education programs that can educate the high-quality future workforce in the field of cybersecurity. VISION ON LONG TERM CYBERSECURITY HIGHER EDUCATION Higher education served as the pipeline to a smooth transition to the workforce. There are some key points for the vision of long-term higher education. K12 cybersecurity education According to our research to investigate, 67 out of the 14832 school districts from 50 states defined cybersecurity courses to offer to K12 students. It aims to increase student interest in cybersecurity careers, which may, in turn, increase the pipeline of the future cybersecurity workforce. The National Center of Academic Excellence (CAE) program, a joint effort between National Security Agency (NSA) and the higher education community, has accredited less than 250 US higher education institutions as the NSA/DHS designated National Center of Academic Excellence in Cyber Defense and certified their cybersecurity programs including 2 year, 4-year, and graduate programs, with a rigorous curriculum that is well mapped to a set of core and optional Cybersecurity Knowledge Units. Private sectors have also actively involved in the cybersecurity education program development and numerous training and certification programs have been launched . , . However, these efforts still fall in short to address the huge national workforce shortage, and more quality academic programs need to be developed. Pathway for community college Research indicates that the key to developing more graduates in the cybersecurity field is establishing a meaningful pathway in the educational process. Studies have shown that while 46% of undergraduates in the US are enrolled in community colleges, only 25% of them will transfer to a four-year institution within five however, 62% of those transferred will complete a bachelorAos degree within six years . These statistics indicate that one of the keys to developing more graduates with a bachelorAos degree is to assure more community college students make the transfer. Recent studies have shown that motivation and a welldeveloped pathway are keys to transferring from a community college to a four-year institution. The course curriculum of cybersecurity programs at different colleges may have varying specializations, and cybersecurity programs at community colleges are usually designed with certification as an endpoint. Hence, gaps exist between 2-year and 4-year cybersecurity programs. One-on-one course mapping between a 2-year program and a 4-year cybersecurity program is not always practical. Currently, program-level articulation agreements between 4-year and 2-year cybersecurity programs are either missing or have become outdated due to the dramatic changes in the course curriculum and plans of study within cybersecurity programs. Hence, there is a critical need to develop a seamless pathway that can motivate students and successfully transition them to a 4year degree program. Since the early 2000s. Corby Hovis. NSF program director, has led ATE efforts to grow cybersecurity education opportunities at community colleges. Since then, the growth of the cybersecurity program has been exploding in the United States. Bragg from the US Department of Education also states that coherent workforce development should be underway to cover both academic and training . Community College Cyber Summit . CS) as the only national academic conference, stating that the role of community colleges in preparing students for cybersecurity jobs is changing. We must focus anew on workforce development and the NICE Job Roles . Community Colleges are now considered new gateways to hot cybersecurity jobs. For an effective, affordable, and flexible educational pathway into a cybersecurity job, students of all ages and backgrounds are increasingly enrolling in community college degrees and certificate cybersecurity programs across the country. Many of these programs got their start through the An analysis framework of portable and measurable higher education for future A (Feihong Li. A ISSN: 2089-9823 developmental support offered through five security technology centers and projects sponsored by the National Science Foundation's (NSF) Advanced Technology Education (ATE) initiative. Higher education According to a report by McAfee Burling Glass Technologies. Auobtaining a BachelorAos degree is the minimum qualification for entry-level positions in cybersecurity, with nearly half of companies making it a minimum requirementAy . This is especially true in the US that 70% of US companies require a BS degree as a minimum requirement. With a large number of prestigious colleges and universities that offer computer science and IT degrees. Aucybersecurity programs are still less common than traditional computer science degree programsAy, according to the study from Cybersecurity Ventures, the Aulimited degree of specialized cybersecurity education program in information technology and computer science around the world is a major factor in the shortageAy. Cybersecurity workforce development Based upon the giant deficiency of the cybersecurity talent pool and the severe cyberspace threats, cybersecurity workforce development became the key to assuring that one nation has adequate security measures to protect and defend information and information systems, and yet, more than 30% of companies are short of security expertise . In 2017, the U. employs nearly 780,000 people in cybersecurity positions, with approximately 350,000 current cybersecurity openings unfilled, according to CyberSeek, a project supported by the National Initiative for Cybersecurity Education (NICE), a program of the National Institute of Standards and Technology (NIST) in the U. Department of Commerce. Cybersecurity Workforce Framework (NICE Framewor. , a reference structure that describes the interdisciplinary nature of the cybersecurity work. It serves as a fundamental reference resource for describing and sharing information about cybersecurity work and the knowledge, skills, and abilities (KSA. needed to complete tasks that can strengthen the cybersecurity posture of an organization. A new survey from Cybersecurity Ventures also projected that there will be 3. 5 million unfilled cybersecurity jobs by 2021. Another survey of the hiring manager project, the Global Information Security Workforce Study 2017 pointed out that the increase of annual workforce demand in cybersecurity in North America is 21%. Among the various reasons why the cybersecurity labor shortage continues to increase, the issue of finding enough qualified workers topped the list, at 49%. More than half of respondents in North America cite a lack of qualified workers as the main reason for their shortage of staff. RESEARCH METHOD As pointed out by EC-Council . , a leading cybersecurity training vendor, while certificate training provides learners the state-of-the-art knowledge and hands-on skill practices, training experiences may expire soon with the advancement of technology. On the other hand. Audegree programs tend to teach students how to think and work through problems and that kind of knowledge doesn't expire". Cybersecurity is an evolving field with the rapid-changing set of knowledge and skills, cybersecurity professionals must stay with the latest knowledge and skills. Thus, it would be ideal for the 4-year and graduate cybersecurity programs to provide learners with a good mix of certification training experience and problem-solving ability learning process, to help college graduates to have a strong start at work. Challenges exposed to the cybersecurity education community are to determine what future workforce a . achelor or maste. degree program can educate, evaluate how much gain on knowledge, skills, and abilities a degree program can achieve, and how to effectively and efficiently educate learners with diverse backgrounds. Essentially, the following three questions should be answered to develop a cybersecurity education program. (What workforce developed in terms of KSA?) What cybersecurity knowledge, skills, and abilities (KSA. , as well as work roles, can be developed for learners that complete the target education program. (How many differences in KSA attained?) Comparing to a certificate training program, an associate degree program, another peer bachelor degree program, what knowledge, skills, and abilities (KSA. will be attained for learners to complete the target education program. To address the above questions, there is a critical need to develop a suite of mechanisms as a comprehensive framework to evaluate an educational program by correlating course curriculum with workforce requirements, assess the program differences based on the knowledge, skills, and ability gains, and develop pedagogy to provide the right content for diverse learners. Quantitative solution I . ontent competenc. With a basic knowledge of the course material, the team found that it is not enough just by identify the knowledge gap by locating the knowledge in the documents and course requirements, it is also very important to identify the competency level. Only in this way can we find the actual knowledge gap. In this Edu. & Learn. Vol. No. August 2020 : 322 Ae 330 J. Edu. & Learn. ISSN: 2089-9823 case, we wouldnAot make mistakes like they cover the same topic and then identify them as the same, but one is the entry-level class, and another is an advanced class. To address the proficiency issue of knowledge units/topics, a competency proficiency level concept will be introduced, as shown in Table 1, to give another dimension of evaluation criterion to KUs and especially major topics. Table 1. Competency level list Score Competence Proficiency Levels Fundamental Awareness . asic knowledg. Novice . imited experienc. Intermediate . ractical applicatio. Advanced . pplied theor. Example Introduce concepts of penetration testing, tools, method. Individual ethical hacking labs . can, break-in, et. Applying the penetration testing process to a virtual environment Developing exploitations for unknown/known vulnerabilities To have an unbiased comparison of two programs required more than just qualitative knowledge cover difference, we also need to quantitate analyze the learning outcome. We will achieve this goal by proposing a correlation solution of a combination of several approaches. First, we analyze the content that may correlate the competency levels of KU topics to KSAs. Here we are going to demonstrate this with two examples, one positive and one negative to show that with only coverage, we cannot differentiate two programs with apparently different levels. As you can see from the table above, a class might have covered a topic, but only as an introduction, and there is no lab or in-class activity associated with the topic, in the learning time has been set to 1 hour and the competency level as well. Now, letAos see the novice example, the same topic could be an important topic that has been discussed throughout the whole class, but still lacking enough lab and project activity, so the learning hour is 3 and the competency level is also 1. Same situation with the intro course. Now, letAos examine the intermediate level class. In these classes, the topic is lectured and practiced both in class and on labs, but there is only one or two lab associate with the topic, so we set the learning time to 6 and the competency level to 2. Lastly, the advanced level class does not only covered lectures on the topic, but it also has labs and a final project implementing it, so the competency level here has been set to 4. This competency level comparison serves as an example of even if two classes covered the same topic, similar content, we still need a quantitative approach to examine exactly how much time students spend on such topics, to come to an unbiased conclusion on the comparison of two academic programs. After the examination on competency level, we also need to work on the relationship between KSAs and Work Roles. Below is the table on NCWF Work Roles, the table header is as follows: describes each of the Work Roles described by the NCWF. Each Work Role is identified by the Category and Specialty Area, followed by a sequential number . SP-RM-001 is the first Work Role in the SP Category. RM Specialty Are. Some of the Work Role Descriptions originate with external documents . Committee on National Security Systems Instruction [CNSSI] 4. and include that information in the description column. Quantitative solution II . earning effor. We propose to use the term Learning Effort by several hours as our second Quantitative Solution, which is assessed and combined by Instructional/discussion time. Lab/practices time. Self-reading/research time, and Project time. For learning effort, we calculate the learning effort by assessing how many hoursAo student spend on one topic, we get the information on how many chapters cover that topic and how many labs cover that topic. For a class that meets once a week for lecture and once for the lab, if this topic contains a lab, we normally count this as 3 hours of leaning effort, for those topics that have been developed as a project, we counted it as 9 hours. For the topic that has not been extended as a lab or project, depend on if that specific topic is a major topic in that chapter, the learning time can range from 0. 5 to 2 hours. We will use this criterion to categorize all topics in all the classes. SUMMARY ANALYSIS OF EXISTING PROGRAM CRITERIA Center of academic excellence knowledge units According to NICE. AuA Knowledge Unit (KU) is a coherent defined block of knowledge related to cybersecurityAy . In the learning process of KU, the author found that KUs has changed several times in the time frame. There are four types of KU in the 2020 version. Foundational KUs. Technical Core KUs. NonTechnical Core KUs, and Optional KUs. The structure of a KU should include a title, description, outcomes. An analysis framework of portable and measurable higher education for future A (Feihong Li. A ISSN: 2089-9823 topics, and vocabulary. There are three Foundational KUs, five Technical Core KUs, five Non-Technical Core KUs, and 51 Optional KUs according to the latest update for 2020. KUs contains several topics in them, each represents a unique topic in its area. Those KUs serves as a curricular guideline for course materials. Mapping each course to the KUs can give the reader an understanding of the academic program performance if each course contains essential knowledge topics regarding cybersecurity standards. Especially for information assurance and network security related courses, programs can adjust its course based on the KUs. In that way, the course will have a comprehensive cybersecurity-related knowledge topic, also the program can keep up with the current cybersecurity trend by following the KUs. Criteria based method In this section, we will study the mainstream criteria solution to see how they can represent the different approaches to evaluating the academic programs. For criteria solution, they focused more on the quality aspect of a program, which has been serving the academic society very well, but with the fact of the criteria solution lacking the quantitative aspect, sometimes it cannot fully represent the difference and the level of difference between programs. Accreditation Board for Engineering and Technology (ABET) criteria According to the official ABET website. ABET is s a non-governmental organization that accredits post-secondary education programs in applied and natural science, computing, engineering, and engineering technology . There is an increasing demand for continuing education, lifelong learning as it is often called, especially among technical workers. This demand is bolstered by both employers and employees themselves, each understanding the need to stay as up-to-date as possible in these rapidly changing technological times. ABET is leading the curriculum development by promoting the idea and for providing quality assurance in technical higher education, it is not unreasonable to think that it may, too, have a hand in quality assurance of lifelong learning in the not-so-distant future. Scholars have appealed for ABET to come up a specific cybersecurity standard for years. Greenlaw et al talked about this issue in the paper AuIs it time for ABET cybersecurity criteria?Ay, they state that cybersecurity is becoming increasingly important in society at large and ABET should establish cybersecurity as a formal academic discipline . Having a unified guideline across the country not only benefits the academic institutions to educate their students with shared expectations of core knowledge, abilities, and skills but also helps the employees to hire graduates. Although other curricular guidelines already described different aspects of cybersecurity education, they do not define what constitutes an undergraduate cybersecurity program. So, a clearer and more comprehensive curricular guideline has to come in order. According to John Schnase, senior computer scientist at NASA Goddard Space Flight Center and CAC Chair. AuBy creating these program-specific criteria. CAC and ABET are helping to establish cybersecurity as an academic discipline, and helping to address the critical skills gap weAore seeing in this areaAy. If the program has already been accredited by the CAC standard, it will be reviewed under the new program criteria for cybersecurity and similarly named computing programs. The advantages of the ABET curriculum is clear, with a unified guideline across the country, the academic institutions can educate their students with shared expectations key learning skills and the employees can hire graduates knowing they were educated with the same standard. Meanwhile, the disadvantage is also obvious. ABET standard lacks measurable and quantifiable part to distinguish the difference and gap between academic programs. CAE KU is a better content guide in technical areas comparing to ABET. Ie/ACM curriculum guide Ie is the acronym for Institute of Electrical and Electronics Engineers which defines the standards for Electronics & communication, while Association for Computing Machinery (ACM) is entirely made for Computer Science Majors. Electrical Engineering and Computer Science (EECS) majors for providing them the resources they need such as books, journals, conferences to improve themselves. Curriculum guidelines for baccalaureate degree programs in information technology served as a guideline for academic programs following the Ie standard. Practices are a critical consideration in cybersecurity education. The CSEC thought model links the academic curriculum to professional practice through the use of application areas. The application areas provide an organizing structure to combine curricular content, professional development and training opportunities, and professional certifications. Application areas serve as an organizing framework to identify competency levels for each practice. The application areas help to define the depth of coverage needed for each core idea. Also, application areas provide a bridge between the thought model and a specific workforce framework. Edu. & Learn. Vol. No. August 2020 : 322 Ae 330 J. Edu. & Learn. ISSN: 2089-9823 Practices are a critical consideration in cybersecurity education. The CSEC thought model links the academic curriculum to professional practice through the use of application areas. The application areas provide an organizing structure to combine curricular content, professional development and training opportunities, and professional certifications. Application areas serve as an organizing framework to identify competency levels for each practice. The application areas help to define the depth of coverage needed for each core idea. Also, application areas provide a bridge between the thought model and a specific workforce framework. By comparing the ABET. Ie, and the details of examining KU, it is clear the ABET and Ie are lacking the quantitative solution to quantify the difference between two programs. Also. KU cannot work alone to determine the coverage and gap between programs, we have to take into consideration that the competency level is the quantitative solution that needed to use in conjunction with the qualitative solution to unbiasedly represent and compare two programs. Certificate LO Associate, bachelorAos, masterAos, and doctoral degree programs are the most commonly earned marks of completion in higher education. Another common, but lesser-known, the mark of completion are certificates earned from certificate programs. Certificate programs are like associate programs because they both take a short amount of time to complete, although associate degrees are generally better-rounded in terms of topics and courses. Certificate programs are generally completed during your education before earning your actual degree and are generally suited to the field of study youAove chosen, whether itAos business, technology, science, or anything else. The benefit of certificate programs can include it stands out on a resume, it can facilitate a last-minute career change, it takes a short amount of time to complete, etc. But the problems are also evidential: it lacks diversity in the knowledge area, and for these certificates must be completed before a student can earn a degree in their area of study, it can be hard for some students that struggle to pass the certificate. 2018 has been an eventful year of a cyber breach. Starting with the 2018 reform of EU data protection rules . , following with Facebook leaking millions of data, cybersecurity has yet again become a center of Those security breaches equate not only with bigger losses and more media coverage but also with more jobs and opportunities for IT and programming professionals. Scholars also expressed their onions on this issue, whether to use professional certifications as facilitation in designing higher education curricula. Knapp and Plachkinova think that just as cybersecurity professionals must hone they also need to evolve to ensure they continue to produce knowledgeable graduates . So, they shared their valued experience that to maintain a cybersecurity curriculum, the program must consider professional certifications as valuable guidance. Other scholars also promoted universities to hire cybersecurity faculty and cybersecurity professionals to teach security and encouraging professional development, thus for those that are currently offering, or planning on offering, degree programs in cybersecurity, or cybersecurity-related degrees could benefit from this pedagogical perspective . Summary analysis of all criteria Here we are providing this an analysis summary table for the program criteria (CAE KU. CAE KU with quantitative metrics. ABET. Ie/ACM Guideline. Certificate LO), shown in Table 2. Table 2. Analysis summary table for all program criteria CAE KU extensive topics with the specification of ABET work as a unified guideline across the country, have general criteria and program The curriculum requirements specify topics but do not prescribe specific courses Ie/ACM Guideline Education competency level and scope are used Certificate LO Stands out on a resume, facilitate a career change. Advantage takes a shorter time to not a deep dive into lack quantitative lacks diversity in the specifics lack knowledge area, too Problem concentrate on the specific As we can see from the table above. CAE KU with quantitative metrics not only has the coverage of topics but also provided a quantitative measurement to the program analysis. SYSTEM IMPLEMENTATIONS As an implementation tool for the pathway from 2-Y to 4-Y cybersecurity program, we developed a database system to automate the process of course mapping. This system is developed on the Windows system. it is also available on Linux or Mac OS environment. To make this deigned system function well, it requires An analysis framework of portable and measurable higher education for future A (Feihong Li. A ISSN: 2089-9823 users to pre-installed Java JDK, at least 1. 8 version, application server Tomcat, version 8. 0 and above. MySQL on the device that runs it. After the user logged into the system, all the architecture and description of the function tab will be shown in the following Table 3. Table 3. System function architecture Main Module Two Level module User Management System Administration Three Level module User Profiles Password Update User-Defined Course Data Management Analysis Criteria Question and Answer Data Download KSAS Work Role Knowledge Units Competency Level Course Mapping Program Analysis Analysis Tool KU Mapping Summary Functions Search, add, delete, update data Update password Allow user to self-define import data and shown on the website Search, add, delete, update data Show all the courses on the selected institution Students can post their questions and make it public. Anyone can publish answer of the uploaded questions Users can upload, download and delete attachments Search, add, delete, update all data about KSAs. Search, add, delete, update all data about Work Role Search, add, delete, update all data about Knowledge Units Search, add, delete, update all data about Competency Level. Any of two or more courses can be chosen to show their specific Any of the different Knowledge Units under the dropdown list can be chosen to have a comparison. Polymerization display non-duplicate topics with the highest proficiency level or One by one polymerization displays nonduplicate topics with the highest proficiency level Model layer: The data model, which defines how data is connected and how data is processed and stored within the system. It provides the data which to be displayed, mainly supports different kinds of data processing, which is the foundation of the Database Management System (DBMS). View layer: It takes responsibility for the userAos interface. Controller layer: It takes charge of receiving the userAos request, delegating to the model for processing, then returning the processed good data to the view . As has been described above, the view layer will show this data. CONCLUSION The revolution is needed in classroom pedagogy, taking us beyond the traditional model of one teacher at the front of the classroom with twenty more or less similar students listening. We need to develop pedagogical approaches that move beyond on-the-same-page, standardized content paradigms, replacing them with approaches that continuously diagnose differentiated learning needs and promote the design of customized learning programs. We need to move away from traditional one-size-fits-all instruction, developing and testing strategies for customization of learning to meet individual learner needs more effectively. A broader aspect of curriculum customization will entail research and development of new programs to meet the needs of special groups. Teachers need to be supported as designers of learning that suit learner needs, instead of just following standardized tests. The Productive Diversity Curriculum needs to be developed through collaborations with learners, their communities, and education experts. It would also require ongoing professional learning opportunities and investment in leadership training to support pedagogical improvements and effective use of resources. By doing the mapping process in this project, it should be clear that the seamless 2Y-4Y cybersecurity program pathway development for community college students will achieve the following objectives. ensure transfer students are sufficiently prepared to be successful in pursuing their higher education in the CAE 4Y program and will be able to graduate on time, . ensure all CAE knowledge units and their associated major topics are covered for transfer students when they graduate from the CAE 4Y cybersecurity program, . Determine knowledge/skill/ability gains that could motivate studentsAo transfer to a CAE 4Y program. The pathway development will be achieved through the following approach. A systematic study of the course curriculum for the 2Y and 4Y cybersecurity programs CAE 2Y-4Y program articulation development and knowledge gap identification. Knowledge gap remediation through curricular and extra-curricular activity The way to achieve the seamless 2Y-4Y cybersecurity program pathway development for community college students is by incorporating competency levels into the curricular design, along with the KU and the certificate LO. This is the analytical framework we proposed for portable and measurable academic Edu. & Learn. Vol. No. August 2020 : 322 Ae 330 J. Edu. & Learn. ISSN: 2089-9823 programs for future workforce development: as competency level as a major part of the quantitative measure. KU as the center for the qualitative solution, working together with certificate LO as the evaluation and preparation for the future workforce. REFERENCE