dc.contributor.author | Aaltola, Kirsi | |
dc.contributor.author | Ruoslahti, Harri | |
dc.contributor.author | Heinonen, Jarmo | |
dc.contributor.editor | Eze, Thaddeus | |
dc.contributor.editor | Khan, Nabeel | |
dc.contributor.editor | Onwubiko, Cyril | |
dc.date.accessioned | 2022-06-17T06:43:58Z | |
dc.date.available | 2022-06-17T06:43:58Z | |
dc.date.issued | 2022 | |
dc.identifier.citation | Aaltola, K., Ruoslahti, H., & Heinonen, J. (2022). Desired cybersecurity skills and skills acquisition methods in the organizations. In T. Eze, N. Khan, & C. Onwubiko (Eds.), <i>ECCWS 2022 : Proceedings of the 21st European Conference on Cyber Warfare and Security</i> (21, pp. 1-9). Academic Conferences International Ltd. Proceedings of the European conference on cyber warfare and security. <a href="https://doi.org/10.34190/eccws.21.1.293" target="_blank">https://doi.org/10.34190/eccws.21.1.293</a> | |
dc.identifier.other | CONVID_147071251 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/81832 | |
dc.description.abstract | Key personnel and their competences play important roles in continuity management and improving resilience of cybersecurity in organizations. Researchers have addressed many topics and studies in the cybersecurity domain. However, relevant cybersecurity skills and acquisition of them in expertise development, have only been partially touched. If designed systematically and properly, cybersecurity training can improve cybersecurity expertise to ensure better performance in complex cybersecurity situations. More through study on the acquisition of cybersecurity skills, and work-life needs are needed. The research three questions of this study are: How do work-life representatives see cybersecurity? How do work-life representatives see cybersecurity related skills? How do work-life representatives see methods for skills acquisition in the organizations? The work is multi-method, as it builds on both a literature review on skills acquisition in cybersecurity, and on empirical findings of a questionnaire study on cybersecurity skills desired by the work-life representatives. The findings show that cybersecurity is seen important in the organizations. The demanded skills from the employees focus especially on communication and situational awareness. There is a specific need for training with Cyber Ranges (CR) to ensure skills acquisition on cybersecurity. These results can be used to plan and design training and education for future professionals. This study aims to promote constructive discussion on skills and their acquisition in the cybersecurity domain. | en |
dc.format.extent | 449 | |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | Academic Conferences International Ltd | |
dc.relation.ispartof | ECCWS 2022 : Proceedings of the 21st European Conference on Cyber Warfare and Security | |
dc.relation.ispartofseries | Proceedings of the European conference on cyber warfare and security | |
dc.rights | CC BY-NC-ND 4.0 | |
dc.subject.other | information technology | |
dc.subject.other | resilience | |
dc.subject.other | cybersecurity | |
dc.subject.other | cybersecurity skills | |
dc.subject.other | skills acquisition | |
dc.subject.other | training | |
dc.subject.other | Cyber Ranges (CRs) | |
dc.title | Desired cybersecurity skills and skills acquisition methods in the organizations | |
dc.type | conferenceObject | |
dc.identifier.urn | URN:NBN:fi:jyu-202206173441 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.contributor.oppiaine | Koulutusteknologia ja kognitiotiede | fi |
dc.contributor.oppiaine | Kognitiotiede | fi |
dc.contributor.oppiaine | Learning and Cognitive Sciences | en |
dc.contributor.oppiaine | Cognitive Science | en |
dc.type.uri | http://purl.org/eprint/type/ConferencePaper | |
dc.relation.isbn | 978-1-914587-41-2 | |
dc.type.coar | http://purl.org/coar/resource_type/c_5794 | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 1-9 | |
dc.relation.issn | 2048-8602 | |
dc.relation.numberinseries | 1 | |
dc.relation.volume | 21 | |
dc.type.version | publishedVersion | |
dc.rights.copyright | © 2022 European Conference on Cyber Warfare and Security | |
dc.rights.accesslevel | openAccess | fi |
dc.relation.conference | European Conference on Cyber Warfare and Security | |
dc.subject.yso | resilienssi | |
dc.subject.yso | työntekijät | |
dc.subject.yso | organisaatiot | |
dc.subject.yso | kyberturvallisuus | |
dc.subject.yso | osaaminen | |
dc.subject.yso | taidot | |
dc.subject.yso | harjoittelu | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p25253 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p1075 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p272 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p26189 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p8343 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p5798 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p26412 | |
dc.rights.url | https://creativecommons.org/licenses/by-nc-nd/4.0/ | |
dc.relation.doi | 10.34190/eccws.21.1.293 | |
dc.type.okm | A4 | |