Recipient Organization
NORTHEAST COMMUNITY COLLEGE
801 E BENJAMIN AVE
NORFOLK,NE 687016831
Performing Department
(N/A)
Non Technical Summary
Many people may not realize how dependent today's food production systems and processes are on information technology. At the individual producer level, few operations exist which do not utilize GPS-driven crop production equipment, GIS mapping for efficient irrigation and chemical application, automated temperature, humidity and feeding controls in livestock barns or computer based records management. At the processor level, the increase in robotics and automation in processing lines and use of predictive analytics for scheduling and distribution are just two examples of dependence upon technology-based tools. All these tools are vulnerable to hacking and ransomware attacks, essentially putting our food safety and security in jeopardy.This project creates a framework for educating incumbent workers in rural agriculture cooperatives on data analysis and information security as well as developing a pipeline of ag-tech workers for growing industry needs. Use of short-term, flexible training options to provide training is cornerstone to the success of this project. Making upskiling and reskilling accessible to the geographically dispersed audiences of rural workforce elevates the practice of information security measures essential to minimizing disruption of operations.
Animal Health Component
(N/A)
Research Effort Categories
Basic
(N/A)
Applied
(N/A)
Developmental
(N/A)
Goals / Objectives
The major goal of this project is to support the security and reliability of Nebraska's food production system dependent upon technology-based solutions, ultimately impacting the reliability of the nation's food supply.Many people may not realize how dependent today's food production systems and processes are on information technology. At the individual producer level, few operations exist which do not utilize GPS-driven crop production equipment, GIS mapping for efficient irrigation and chemical application, automated temperature, humidity and feeding controls in livestock barns or computer based records management. At the processor level, the increase in robotics and automation in processing lines and use of predictive analytics for scheduling and distribution are just two examples of dependence upon technology-based tools. All these tools are vulnerable to hacking and ransomware attacks, essentially putting our food safety and security in jeopardy. The major goal of this project is to elevate the technical knowledge of information security within agriculture-based employers.Specific objectives include:- Provide training to 40 individuals annually via synchronous, virtual, short-term training.- Fifteen industry-recognized certifications earned by program participants annually.- Couple a general agriculture comptence course with cybersecurity bootcamp to equip five entry-level workers annually for integration into the agriculture-technology workforce pipeline.
Project Methods
The project will be conducted using multiple efforts, each with distinct evaluation strategies.Curriculum Development: One effort of the grant will entail devleoping curriculum relevant to incumbent workers. The curriculum learning outcomes will be informed by needs analysis conversations with Agriculture Cooperative managers. The information gathered will be used to develop curriculum, which will be evaluated in two ways. 1) Participant feedback. Participant feedback on curriculum relevance will be gathered via informal methods during delivery and formally with a post-evaluation form. The informal data will be used by instructors to adjust pace and application exercises as needed. Formal data will be evaluated after the first three deliveries to identify trends in data and adjust content as indicated. Annual evaluation of formal data on course relevance will continue throughout the project lifecycle. 2) Employer feedback. Employers will be asked to complete a formal survey 90-days after incumbent workers have finished the training program. The survey will include questions on curriculum relevance and observable transfer of knowledge to the workplace. This data will be reviewed annually to identify trends and adjust curriculum as indicated.Instruction: Instructional methods that will be utilized in this project include a combination of classroom instruction, synchronous online (virtual) delivery and assynchronous online delivery. A combination of methods may be used for any particular subject matter or audience. The flexibility to deliver curriculum in multiple ways expands the accessibility to geogrpaphically remote areas by reducing the need for travel to a central location. Evaluation of instruction will occur in two ways. At the conclusion of each course, participants will be required to complete a learning assessment. This learning assessment will evaluate the achievement of desired learning objectives. This data will be evaluated after the first three deliveries to determine need for curriculum change and annually to identify any trends that indicate need for curriculum adjustment. Additionally, a post-course participant survey will solicit feedbak on the appropriateness of the instructional delivery method to the students needs. This survey data will be reviewed annually to determine adjustments needed.Experiential Learning: Experiential learning opportunities will be available to participants in two forms. 1) Virtual, lab environment of cybersecurity bootcamp. Individuals participating in cybersecurity bootcamp experiences will be required to complete several exercises in a virtual lab environment mimicking a real cyber incident scenario. This use of a 'safe place' to practice threat detection and mitigration is essential to prepare entry-level workers. Evaluation of participant performance is tied to course success. Participants will not complete the course successfully without proper execution of the exercises. 2) Work-based learning opportunities. Incumbent workers and entry-level workers will have the opportunity to participate in work-based learning experiences throughout the course of their training. These work-based learning experiences will have specific learning objectives articulated and a process for verification of succesful demonstration on the job. This format mirrors Registered Apprenticeship Programs, while minimizing paperwork. Evaluation of this effort will include analysis of completeness of learning objectives in the targeted time period, number of work-based learning experiences and employer satisfaction with those experiences.