Desired cybersecurity skills and skills acquisition methods in the organizations
Aaltola, K., Ruoslahti, H., & Heinonen, J. (2022). Desired cybersecurity skills and skills acquisition methods in the organizations. In T. Eze, N. Khan, & C. Onwubiko (Eds.), ECCWS 2022 : Proceedings of the 21st European Conference on Cyber Warfare and Security (21, pp. 1-9). Academic Conferences International Ltd. Proceedings of the European conference on cyber warfare and security. https://doi.org/10.34190/eccws.21.1.293
Julkaistu sarjassa
Proceedings of the European conference on cyber warfare and securityPäivämäärä
2022Oppiaine
Koulutusteknologia ja kognitiotiedeKognitiotiedeLearning and Cognitive SciencesCognitive ScienceTekijänoikeudet
© 2022 European Conference on Cyber Warfare and Security
Key personnel and their competences play important roles in continuity management and improving resilience of cybersecurity in organizations. Researchers have addressed many topics and studies in the cybersecurity domain. However, relevant cybersecurity skills and acquisition of them in expertise development, have only been partially touched. If designed systematically and properly, cybersecurity training can improve cybersecurity expertise to ensure better performance in complex cybersecurity situations. More through study on the acquisition of cybersecurity skills, and work-life needs are needed. The research three questions of this study are: How do work-life representatives see cybersecurity? How do work-life representatives see cybersecurity related skills? How do work-life representatives see methods for skills acquisition in the organizations? The work is multi-method, as it builds on both a literature review on skills acquisition in cybersecurity, and on empirical findings of a questionnaire study on cybersecurity skills desired by the work-life representatives. The findings show that cybersecurity is seen important in the organizations. The demanded skills from the employees focus especially on communication and situational awareness. There is a specific need for training with Cyber Ranges (CR) to ensure skills acquisition on cybersecurity. These results can be used to plan and design training and education for future professionals. This study aims to promote constructive discussion on skills and their acquisition in the cybersecurity domain.
...
Julkaisija
Academic Conferences International LtdEmojulkaisun ISBN
978-1-914587-41-2Konferenssi
European Conference on Cyber Warfare and SecurityKuuluu julkaisuun
ECCWS 2022 : Proceedings of the 21st European Conference on Cyber Warfare and SecurityISSN Hae Julkaisufoorumista
2048-8602Asiasanat
Julkaisu tutkimustietojärjestelmässä
https://converis.jyu.fi/converis/portal/detail/Publication/147071251
Metadata
Näytä kaikki kuvailutiedotKokoelmat
Lisenssi
Samankaltainen aineisto
Näytetään aineistoja, joilla on samankaltainen nimeke tai asiasanat.
-
Cybersecurity Attacks on Software Logic and Error Handling within AIS Implementations : A Systematic Testing of Resilience
Khandker, Syed; Turtiainen, Hannu; Costin, Andrei; Hämäläinen, Timo (Institute of Electrical and Electronics Engineers (IEEE), 2022)To increase situational awareness of maritime vessels and other entities and to enable their exchange of various information, the International Maritime Organization mandated the use of the Automatic Identification System ... -
Information Security Governance in Civil Aviation
Salmenpää, Tomi (Springer, 2022)This chapter focuses mainly to proactive means in information security and more specifically governance of information security in civil aviation. The reason is that, to find sustainable, coherent and holistic way to ... -
Cybersecurity attacks on software logic and error handling within ADS-B implementations : systematic testing of resilience and countermeasures
Khandker, Syed; Turtiainen, Hannu; Costin, Andrei; Hämäläinen, Timo (Institute of Electrical and Electronics Engineers (IEEE), 2022)Automatic Dependent Surveillance-Broadcast (ADS-B) is a cornerstone of the next-generation digital sky and is now mandated in several countries. However, there have been many reports of serious security vulnerabilities in ... -
Reconceptualizing the Human in the Loop : A Problematization of Taken-for-Granted Metaphors in Cybersecurity Research
Soliman, Wael; Järveläinen, Jonna (Association for Information Systems, 2024)The use of metaphors is crucial to advancing not only scientific fields but also in facilitating the development of knowledge and understanding in general. While metaphors facilitate the exchange of novel concepts and ... -
Investigating the links between resilience, perceived HRM practices, and retirement intentions
Salminen, Hanna; von Bonsdorff, Mikaela; von Bonsdorff, Monika (Emerald Publishing Limited, 2019)
Ellei toisin mainittu, julkisesti saatavilla olevia JYX-metatietoja (poislukien tiivistelmät) saa vapaasti uudelleenkäyttää CC0-lisenssillä.