920
Views
2
CrossRef citations to date
0
Altmetric
Original Articles

Skills Expectations in Cybersecurity: Semantic Network Analysis of Job Advertisements

ORCID Icon &

References

  • Brooks. Alarming cyber statistics for mid-year 2022 that you need to know. Forbes; 2022 Jun 3. https://www.forbes.com/sites/chuckbrooks/2022/06/03/alarming-cyber-statistics-for-mid-year-2022-that-you-need-to-know/?sh=3785316e7864.
  • Di L, Ma H, Luo Y, Li Z. A CNN-based information network attack detection algorithm. In: International Conference on Wireless Communications and Applications. Singapore: Springer; 2022. p. 155–61.
  • Khader M, Neo LS, Chai WXT, editors. Introduction to cyber forensic psychology: understanding the mind of the cyber deviant perpetrators. Singapore: World Scientific; 2021.
  • Kamiya S, Kang JK, Kim J, Milidonis A, Stulz RM. Risk management, firm reputation, and the impact of successful cyberattacks on target firms. J Financ Econ. 2021;139(3):719–49. doi:10.1016/j.jfineco.2019.05.019.
  • Cabaj K, Domingos D, Kotulski Z, Respício A. Cybersecurity education: evolution of the discipline and analysis of master programs. Comput Secur. 2018;75:24–35. doi:10.1016/j.cose.2018.01.015.
  • Giboney JS, McDonald JK, Balzotti J, Hansen DL, Winters DM, Bonsignore E. Increasing cybersecurity career interest through playable case studies. TechTrends. 2021;65(4):496–510. doi:10.1007/s11528-021-00585-w.
  • Furnell S. The cybersecurity workforce and skills. Comput Secur. 2021;100:102080. doi:10.1016/j.cose.2020.102080.
  • Blažič BJ. Cybersecurity skills in EU: new educational concept for closing the missing workforce gap. In: Cybersecurity threats with new perspectives. Sarfranz, Muhammad. London, United Kingdom: IntechOpen; 2021.
  • Joseph D, Ang S, Chang RH, Slaughter SA. Practical intelligence in IT: assessing soft skills of IT professionals. Commun ACM. 2010;53(2):149–54. doi:10.1145/1646353.1646391.
  • Bada M, Nurse JR. Developing cybersecurity education and awareness programmes for small-and medium-sized enterprises (SMEs). Inf Comput Secur. 2019;27(3):393–410. doi:10.1108/ICS-07-2018-0080.
  • Payne BK, He W, Wang C, Wittkower DE, Wu H. Cybersecurity, technology, and society: developing an interdisciplinary, open, general education cybersecurity course. J Inf Syst Educ. 2021;32(2):134–49. doi:10.21428/cb6ab371.8113760b.
  • Ishmael A, Halawi DL. Retention of qualified cybersecurity professionals: a qualitative study. J Comput Inf Syst. 2022:1–12. doi:10.1080/08874417.2022.2049018.
  • AlDaajeh S, Saleous H, Alrabaee S, Barka E, Breitinger F, Choo KKR. The role of national cybersecurity strategies on the improvement of cybersecurity education. Comput Secur. 2022;119:102754. doi:10.1016/j.cose.2022.102754.
  • Kelley K, Clark B, Brown V, Sitzia J. Good practice in the conduct and reporting of survey research. Int J Qual Health Care. 2003;15(3):261–66. doi:10.1093/intqhc/mzg031.
  • Cook I, Pfleeger S. Security decision support challenges in data collection and use. IEEE Secur Priv. 2010;8(3):28–35. doi:10.1109/msp.2010.59.
  • Verma A, Yurov KM, Lane PL, Yurova YV. An investigation of skill requirements for business and data analytics positions: a content analysis of job advertisements. J Educ Bus. 2019;94(4):243–50. doi:10.1080/08832323.2018.1520685.
  • Elo S, Kyngäs H. The qualitative content analysis process. J Adv Nurs. 2008;62(1):107–15. doi:10.1111/j.1365-2648.2007.04569.x.
  • Carley K. Coding choices for textual analysis: a comparison of content analysis and map analysis. Sociol Methodol. 1993;23:75–126. doi:10.2307/271007.
  • Van Atteveldt W. Semantic network analysis. Techniques for abstracting, representing, and querying media content. Charleston, South Carolina: BookSurge Publishers; 2008.
  • Quillian MR. Semantic memory. In: Minsky M, editor. Semantic information processing. 227–270. Cambridge (MA): MIT Press. 1968.
  • Li Y, Liu Q. A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments. Energy Rep. 2021;7:8176–86. doi:10.1016/j.egyr.2021.08.126.
  • Snehi M, Bhandari A. Vulnerability retrospection of security solutions for software-defined cyber–physical system against DDoS and IoT-DDoS attacks. Comput Sci Rev. 2021;40:100371. doi:10.1016/j.cosrev.2021.100371.
  • Bordoff S, Chen Q, Yan Z. Cyber attacks, contributing factors, and tackling strategies: the current status of the science of cybersecurity. Int J Cyber Behav Psychol Learn. 2017;7(4):68–82. doi:10.4018/ijcbpl.2017100106.
  • Alkhalil Z, Hewage C, Nawaf L, Khan I. Phishing attacks: a recent comprehensive study and a new anatomy. Front Comput Sci. 2021;3:563060. doi:10.3389/fcomp.2021.563060.
  • Kumar S, Agarwal D. Hacking attacks, methods, techniques and their protection measures. Int J Adv Res Comput Sci Manage. 2018;4:2353–58.
  • Federal Bureau of Investigation. FBI releases the internet crime compliant center 2020 internet crime report, including COVID-19 scam statistics. FBI National Press Office; 2021 Mar 17. https://www.fbi.gov/news/pressrel/press-releases/fbi-releases-the-internet-crime-complaint-center-2020-internet-crime-report-including-covid-19-scam-statistics.
  • Bada M, Nurse JR. The social and psychological impact of cyberattacks. In: Emerging cyber threats and cognitive vulnerabilities. Amsterdam, The Netherlands: Academic Press; 2020. p. 73–92.
  • Yang SC. A curriculum model for cybersecurity master’s program: a survey of AACSB-accredited business schools in the United States. J Educ Bus. 2019;94(8):520–30. doi:10.1080/08832323.2019.1590296.
  • Cheung RS, Cohen JP, Lo HZ, Elia F. Challenge based learning in cybersecurity education. In: Proceedings of the International Conference on Security and Management (SAM). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp) Las Vegas, Nevada USA. 2011. p. 1.
  • Joint Task Force on Cybersecurity Education (JTF). Cybersecurity curricular guidelines. CSEC; 2017 [accessed 2018 Sep 15]. http://cybered.acm.org/.
  • Švábenský V, Vykopal J, Čeleda P. What are cybersecurity education papers about? A systematic literature review of sigcse and iticse conferences. In: Proceedings of the 51st ACM Technical Symposium on Computer Science Education Portland, Oregon USA. 2020. p. 2–8.
  • Evans M, He Y, Maglaras L, Janicke H. HEART-IS: a novel technique for evaluating human error-related information security incidents. Comput Secur. 2019;80:74–89. doi:10.1016/j.cose.2018.09.002.
  • Posey C, Roberts TL, Lowry PB. The impact of organizational commitment on insiders’ motivation to protect organizational information assets. J Manage Inf Syst. 2015;32(4):179–214. doi:10.1080/07421222.2015.1138374.
  • Sussman LL. Exploring the value of non-technical Knowledge, Skills, and Abilities (KSAs) to cybersecurity hiring managers. JHETP. 2021;21(6). doi:10.33423/jhetp.v21i6.4379.
  • Peslak A, Hunsinger DS. What is cybersecurity and what cybersecurity skills are employers seeking? IIS. 2019;20(2). doi:10.48009/2_iis_2019_62-72.
  • Brooks NG, Greer TH, Morris SA. Information systems security job advertisement analysis: skills review and implications for information systems curriculum. J Educ Bus. 2018;93(5):213–21. doi:10.1080/08832323.2018.1446893.
  • Potter LE, Vickers G. What skills do you need to work in cyber security? A look at the Australian market. In: Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research Newport Beach, California USA. 2015. p. 67–72.
  • Furnell S, Bishop M. Addressing cyber security skills: the spectrum, not the silo. Comput Fraud Secur. 2020;2020(2):6–11. doi:10.1016/s1361-3723(20)30017-8.
  • Van den Berg J, Van Zoggel J, Snels M, Van Leeuwen M, Boeke S, van de Koppen L, … De Bos T (2014). On (the emergence of) cyber security science and its challenges for cyber security education. Talin (ES).
  • Jones KS, Namin AS, Armstrong ME. The core cyber-defense knowledge, skills, and abilities that cybersecurity students should learn in school: results from interviews with cybersecurity professionals. TOCE. 2018;18(3):1–12. doi:10.1145/3152893.
  • Segev E. Textual network analysis: detecting prevailing themes and biases in international news and social media. Sociol Compass. 2020;14(4):e12779. doi:10.1111/soc4.12779.
  • Sowa JF. Principles of semantic networks. San Mateo, California: Morgan Kaufmann; 1991.
  • Diestel R. Graph theory. Berlin, Germany: Springer; 2005.
  • Newman M. Networks: an introduction. New York (NY, USA): Oxford University Press, Inc.; 2010.
  • Wassermann S, Faust K. Social network analysis: methods and application. Cambridge: University Press; 1994.
  • Brin, S , Page, L. Reprint of: The anatomy of a large-scale hypertextual web search engine, 56(18):3825–3833. Amsterdam, Netherlands: Computer networks; 2012.
  • Hanneman RA, Riddle M. Introduction to social network methods. Riverside: University of California; 2005.
  • Rice RE, Danowski JA. Is it really just like a fancy answering machine? Comparing semantic networks of different types of voice mail users. J Bus Commun. 1993;30(4):369–97. doi:10.1177/002194369303000401.
  • Zaslavskaya OY, Zaslavskiy AA, Bolnokin VE, Kravets OJ. Features of ensuring information security when using cloud technologies in educational institutions. Int J Inf Technol Secur. 2018;10:93–102.
  • Cigognini ME, Pettenati MC, Edirisingha P. Personal knowledge management skills in Web 2.0-based learning. In: Web 2.0-based e-learning: applying social informatics for tertiary teaching. Hershey, PA USA: IGI Global; 2011. p. 109–27.
  • Tisdale SM. Cybersecurity: challenges from a systems, complexity, knowledge management and business intelligence perspective. IIS. 2015;16(3). doi:10.48009/3_iis_2015_191-198.
  • Miloslavskaya N, Tolstoy A Application of big data, fast data, and data lake concepts to information security issues. In: 2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW) Vienna, Austria. IEEE; 2016. p. 148–53.
  • Rassam MA, Maarof M, Zainal A. Big data analytics adoption for cybersecurity: a review of current solutions, requirements, challenges and trends. JIACS. 2017;12(4). doi:10.1108/978-1-80262-637-720221005.
  • Sahoo S. Big data analytics in manufacturing: a bibliometric analysis of research in the field of business management. Int J Prod Res. 2021:1–29. doi:10.1080/00207543.2021.1919333.
  • Yousef MM. Big data analytics in health care: a review paper. IJCSIT. 2021;13(2):17–28. doi:10.5121/ijcsit.2021.13202.
  • Wang L, Jones R. Big data analytics in cyber security: network traffic and attacks. J Comput Inf Syst. 2021;61(5):410–17. doi:10.1080/08874417.2019.1688731.
  • Nasrallah WF, Ouba CJ, Yassine AA, Srour IM. Modeling the span of control of leaders with different skill sets. Comput Math Organ Theory. 2015;21(3):296–317. doi:10.1007/s10588-015-9187-8.
  • Hoda R, Murugesan LK. Multi-level agile project management challenges: a self-organizing team perspective. J Syst Softw. 2016;117:245–57. doi:10.1016/j.jss.2016.02.049.
  • Wang P, Sbeit R. A constructive team project model for online cybersecurity education. IIS. 2017;18(3). doi:10.48009/3_iis_2017_19-28.
  • Robles MM. Executive perceptions of the top 10 soft skills needed in today’s workplace. Bus commun Q. 2012;75(4):453–65. doi:10.1177/1080569912460400.
  • Vaidya R. Cyber security breaches survey 2019. Dcms. 2019;2019(4):66. doi:10.1016/s1353-4858(19)30044-3.
  • Haney JM, Lutters WG. Cybersecurity advocates: discovering the characteristics and skills of an emergent role. Inf Comput Secur. 2021;29(3):485–99. doi:10.1108/ics-08-2020-0131.
  • Smith-Doerr L, Alegria SN, Sacco T. How diversity matters in the US science and engineering workforce: a critical review considering integration in teams, fields, and organizational contexts. Engag Sci Technol Soc. 2017;3:139–53. doi:10.17351/ests2017.142.
  • Azhar M, Bhatia S, Gagne G, Kari C, Maguire J, Mountrouidou X, Tudor L, Vosen D, Yuen TT. Securing the human: broadening diversity in cybersecurity. In: Proceedings of the 2019 ACM Conference on Innovation and Technology in Computer Science Education. Aberdeen Scotland UK. 2019. p. 251–52.
  • Baskerville R, Rowe F, Wolff FC. Integration of information systems and cybersecurity countermeasures: an exposure to risk perspective. ACM SIGMIS Database. 2018;49(1):33–52. doi:10.1145/3184444.3184448.
  • Langenwalter GA. Enterprise resources planning and beyond: integrating your entire organization. Boca Raton, FL USA: CRC Press; 2020.
  • Wang S, Wang H. Big data for small and medium-sized enterprises (SME): a knowledge management model. J Knowledge Manage. 2020;24(4):881–97. doi:10.1108/JKM-02-2020-0081.
  • Ahmad A, Desouza KC, Maynard SB, Naseer H, Baskerville RL. How integration of cyber security management and incident response enables organizational learning. J Assoc Inf Sci Technol. 2020;71(8):939–53. doi:10.1002/asi.24311.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.