Näytä suppeat kuvailutiedot

dc.contributor.authorAaltola, Kirsi
dc.contributor.authorRuoslahti, Harri
dc.contributor.authorHeinonen, Jarmo
dc.contributor.editorEze, Thaddeus
dc.contributor.editorKhan, Nabeel
dc.contributor.editorOnwubiko, Cyril
dc.date.accessioned2022-06-17T06:43:58Z
dc.date.available2022-06-17T06:43:58Z
dc.date.issued2022
dc.identifier.citationAaltola, K., Ruoslahti, H., & Heinonen, J. (2022). Desired cybersecurity skills and skills acquisition methods in the organizations. In T. Eze, N. Khan, & C. Onwubiko (Eds.), <i>ECCWS 2022 : Proceedings of the 21st European Conference on Cyber Warfare and Security</i> (21, pp. 1-9). Academic Conferences International Ltd. Proceedings of the European conference on cyber warfare and security. <a href="https://doi.org/10.34190/eccws.21.1.293" target="_blank">https://doi.org/10.34190/eccws.21.1.293</a>
dc.identifier.otherCONVID_147071251
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/81832
dc.description.abstractKey personnel and their competences play important roles in continuity management and improving resilience of cybersecurity in organizations. Researchers have addressed many topics and studies in the cybersecurity domain. However, relevant cybersecurity skills and acquisition of them in expertise development, have only been partially touched. If designed systematically and properly, cybersecurity training can improve cybersecurity expertise to ensure better performance in complex cybersecurity situations. More through study on the acquisition of cybersecurity skills, and work-life needs are needed. The research three questions of this study are: How do work-life representatives see cybersecurity? How do work-life representatives see cybersecurity related skills? How do work-life representatives see methods for skills acquisition in the organizations? The work is multi-method, as it builds on both a literature review on skills acquisition in cybersecurity, and on empirical findings of a questionnaire study on cybersecurity skills desired by the work-life representatives. The findings show that cybersecurity is seen important in the organizations. The demanded skills from the employees focus especially on communication and situational awareness. There is a specific need for training with Cyber Ranges (CR) to ensure skills acquisition on cybersecurity. These results can be used to plan and design training and education for future professionals. This study aims to promote constructive discussion on skills and their acquisition in the cybersecurity domain.en
dc.format.extent449
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherAcademic Conferences International Ltd
dc.relation.ispartofECCWS 2022 : Proceedings of the 21st European Conference on Cyber Warfare and Security
dc.relation.ispartofseriesProceedings of the European conference on cyber warfare and security
dc.rightsCC BY-NC-ND 4.0
dc.subject.otherinformation technology
dc.subject.otherresilience
dc.subject.othercybersecurity
dc.subject.othercybersecurity skills
dc.subject.otherskills acquisition
dc.subject.othertraining
dc.subject.otherCyber Ranges (CRs)
dc.titleDesired cybersecurity skills and skills acquisition methods in the organizations
dc.typeconferenceObject
dc.identifier.urnURN:NBN:fi:jyu-202206173441
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.contributor.oppiaineKoulutusteknologia ja kognitiotiedefi
dc.contributor.oppiaineKognitiotiedefi
dc.contributor.oppiaineLearning and Cognitive Sciencesen
dc.contributor.oppiaineCognitive Scienceen
dc.type.urihttp://purl.org/eprint/type/ConferencePaper
dc.relation.isbn978-1-914587-41-2
dc.type.coarhttp://purl.org/coar/resource_type/c_5794
dc.description.reviewstatuspeerReviewed
dc.format.pagerange1-9
dc.relation.issn2048-8602
dc.relation.numberinseries1
dc.relation.volume21
dc.type.versionpublishedVersion
dc.rights.copyright© 2022 European Conference on Cyber Warfare and Security
dc.rights.accesslevelopenAccessfi
dc.relation.conferenceEuropean Conference on Cyber Warfare and Security
dc.subject.ysoresilienssi
dc.subject.ysotyöntekijät
dc.subject.ysoorganisaatiot
dc.subject.ysokyberturvallisuus
dc.subject.ysoosaaminen
dc.subject.ysotaidot
dc.subject.ysoharjoittelu
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p25253
jyx.subject.urihttp://www.yso.fi/onto/yso/p1075
jyx.subject.urihttp://www.yso.fi/onto/yso/p272
jyx.subject.urihttp://www.yso.fi/onto/yso/p26189
jyx.subject.urihttp://www.yso.fi/onto/yso/p8343
jyx.subject.urihttp://www.yso.fi/onto/yso/p5798
jyx.subject.urihttp://www.yso.fi/onto/yso/p26412
dc.rights.urlhttps://creativecommons.org/licenses/by-nc-nd/4.0/
dc.relation.doi10.34190/eccws.21.1.293
dc.type.okmA4


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot

CC BY-NC-ND 4.0
Ellei muuten mainita, aineiston lisenssi on CC BY-NC-ND 4.0