A framework for mapping organisational workforce knowledge profile in cyber security DOI Creative Commons
Lata Nautiyal, Awais Rashid

Computers & Security, Год журнала: 2024, Номер 145, С. 103925 - 103925

Опубликована: Июль 14, 2024

A cyber security organisation needs to ensure that its workforce possesses the necessary knowledge fulfil business functions. Similarly, where an chooses delegate their tasks a third-party provider, they must chosen entity robust capabilities effectively carry out assigned tasks. Building comprehensive profile is distinct challenge; field ever evolving with range of professional certifications, academic qualifications and on-the-job training. So far, there has been lack well-defined methodology for systematically evaluating organisation's knowledge, specifically derived from workforce, against standardised reference point. Prior research on profiling across various disciplines predominantly utilised established frameworks such as SWEBOK. However, within domain security, absence point notable. In this paper, we advance framework leveraging Cyber Security Body Knowledge (CyBOK), construct profile. The enables user identify areas coverage gaps may lie, so can consider targeted recruitment or training or, expertise be outsourced, drawing in capability third parties. latter case, also used basis assessing party. We present framework, discussing three case studies organisational teams underpinning initial development, followed by refinement through workshops practitioners.

Язык: Английский

Does cybersecurity regulation promote digital transformation? Evidence from the Cyber Security Law in China DOI

Jin Xianglan,

Huijuan Cui,

Fengwei Liu

и другие.

Finance research letters, Год журнала: 2025, Номер unknown, С. 107041 - 107041

Опубликована: Фев. 1, 2025

Язык: Английский

Процитировано

2

Comparative Analysis of EU-Based Cybersecurity Skills Frameworks DOI Creative Commons
Fernando Almeida

Computers & Security, Год журнала: 2025, Номер unknown, С. 104329 - 104329

Опубликована: Янв. 1, 2025

Язык: Английский

Процитировано

0

QoS-Aware cloud security using lightweight EfficientNet with Adaptive Sparse Bayesian Optimization DOI

J Vinothini,

Srie Vidhya Janani E

Peer-to-Peer Networking and Applications, Год журнала: 2025, Номер 18(2)

Опубликована: Янв. 20, 2025

Язык: Английский

Процитировано

0

Toward a Continental Financial Ecosystem: The Implications of AfCFTA for Fintech License Passporting DOI

Hammed Adedeji Ajani,

Saidu Patrick Conteh

Опубликована: Янв. 1, 2025

Язык: Английский

Процитировано

0

Concerns About the Rapid Growth of FinTech: Data Privacy, Breach, and Cybersecurity Issues and the Resulting Regulatory Reforms DOI
Xiao Peng, Larry Li

Опубликована: Янв. 1, 2025

Язык: Английский

Процитировано

0

Enhancing Cybersecurity in Sustainable Energy: Regulatory Compliance, Challenges, and Policy Innovations DOI

Shruti Saxena,

Shivani Saxena, Nikunj Tahilramani

и другие.

Опубликована: Фев. 21, 2025

Язык: Английский

Процитировано

0

Cybersecurity preparedness of small-to-medium businesses: A Western Australia study with broader implications DOI Creative Commons
Alladean Chidukwani, Sebastian Zander, Polychronis Koutsakis

и другие.

Computers & Security, Год журнала: 2024, Номер 145, С. 104026 - 104026

Опубликована: Июль 30, 2024

This study was prompted by the scarcity of focused quantitative research on cybersecurity SMBs. Our aimed to understand factors influencing SMBs' approach cybersecurity, their level threat awareness and importance placed cybersecurity. It also explored extent which NIST CSF practices are implemented SMBs while detecting ranking prevalent challenges faced Additionally, resources that turn for help guidance were evaluated. While survey-based Western Australian SMBs, results more general wider interest. found lack funds be biggest hindrance along with a knowledge where start implementing good security practices. lacked familiarity relevant regulations frameworks. The highlights areas improvement, such as access control mechanisms, individual user accounts, formalised policies procedures, dedicated budgets. heavily rely Google search information, emphasising need optimised from authoritative sources. IT service providers informal networks emerge important sources guidance, local universities could assist but remain underutilised in this regard. Interestingly, organisational size, industry sector, revenue did not significantly impact perception vulnerability cyber threats. However, further investigation is needed evaluate effectiveness different models needs. Overall, provides valuable insights into specific gaps domain, well preferred methods seeking consuming assistance. findings can guide development targeted strategies enhance posture

Язык: Английский

Процитировано

2

A framework for mapping organisational workforce knowledge profile in cyber security DOI Creative Commons
Lata Nautiyal, Awais Rashid

Computers & Security, Год журнала: 2024, Номер 145, С. 103925 - 103925

Опубликована: Июль 14, 2024

A cyber security organisation needs to ensure that its workforce possesses the necessary knowledge fulfil business functions. Similarly, where an chooses delegate their tasks a third-party provider, they must chosen entity robust capabilities effectively carry out assigned tasks. Building comprehensive profile is distinct challenge; field ever evolving with range of professional certifications, academic qualifications and on-the-job training. So far, there has been lack well-defined methodology for systematically evaluating organisation's knowledge, specifically derived from workforce, against standardised reference point. Prior research on profiling across various disciplines predominantly utilised established frameworks such as SWEBOK. However, within domain security, absence point notable. In this paper, we advance framework leveraging Cyber Security Body Knowledge (CyBOK), construct profile. The enables user identify areas coverage gaps may lie, so can consider targeted recruitment or training or, expertise be outsourced, drawing in capability third parties. latter case, also used basis assessing party. We present framework, discussing three case studies organisational teams underpinning initial development, followed by refinement through workshops practitioners.

Язык: Английский

Процитировано

0