2010
DOI: 10.1109/mitp.2010.23
|View full text |Cite
|
Sign up to set email alerts
|

Anatomy of the Information Security Workforce

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…A recent research study on the anatomy of the information security workforce revealed that a majority of middle aged cyber security professionals did not process a bachelor's degree (Lee et al 2010). Cyber security educational environments need to evolve to cater to this group of professionals so they can earn the necessary degrees that would enable them to excel in their professions.…”
Section: Adult Learning Theories and Online Learning Environmentsmentioning
confidence: 99%
See 1 more Smart Citation
“…A recent research study on the anatomy of the information security workforce revealed that a majority of middle aged cyber security professionals did not process a bachelor's degree (Lee et al 2010). Cyber security educational environments need to evolve to cater to this group of professionals so they can earn the necessary degrees that would enable them to excel in their professions.…”
Section: Adult Learning Theories and Online Learning Environmentsmentioning
confidence: 99%
“…2006) in order to obtain the right skills in the field. Also, studies indicate that the cyber security workforce requires a distinct skill set and should be considered separately than the general IT workforce (Lee et al 2010). Specifically, Lee et al (2010) showed that cyber security professionals required higher IT and business skills than the general IT area.…”
Section: Interdisciplinary Approach To Cyber Security Educationmentioning
confidence: 99%
“…The literature also identifies the pertinence of cybersecurity approaches and their applications across industries. For example, [3] shows that cybersecurity professionals are often required to possess an understanding and skills in both IT and business fields. The triad of people, process and technology need to be integrated into cybersecurity education [4].…”
Section: Introductionmentioning
confidence: 99%