Proceedings of the 2019 ACM Conference on Innovation and Technology in Computer Science Education 2019
DOI: 10.1145/3304221.3325537
|View full text |Cite
|
Sign up to set email alerts
|

Securing the Human

Abstract: Recent global demand for cybersecurity professionals is promising, with the U.S. job growth rate at 28%, three times the national average [1]. Lacking qualified applicants, many organizations struggle to fill open positions [2]. In a global survey, 2,300 security man-

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 5 publications
0
1
0
Order By: Relevance
“…Methodology to ensure information security in a distributed architecture for a public organization of Ecuador [2], Hyperledger technology in public organizations in Ecuador [3], Study of the evolution of information security in Colombia: 2000-2018 [4], Information security methods to protect rest web services communication and data in http requests using json web token and keycloak red hat single sign on [5], El rol de la seguridad informática en el ámbito académico y los sistemas de información asociados [6], Security of networks and information systems in the European Union: A comprehensive approach? [7], WSN security applied to smart metering systems based on cryptography techniques [8], The reduction of number of parliamentary members and the modification of remuneration schemes for deputies in autonomous community [9], A new data protection law [10], From «computing freedom» towards the constitutionalization of new digital rights [11], Securing the human: Broadening diversity in cybersecurity [12], Intruder attacks on wireless sensor networks: A soft decision and prevention mechanism [13], Transposition of EU network and information security directive into national law [14] and An Approach to Optimize the Management of Information Security in Public Organizations of Ecuador [15].…”
Section: Introductionmentioning
confidence: 99%
“…Methodology to ensure information security in a distributed architecture for a public organization of Ecuador [2], Hyperledger technology in public organizations in Ecuador [3], Study of the evolution of information security in Colombia: 2000-2018 [4], Information security methods to protect rest web services communication and data in http requests using json web token and keycloak red hat single sign on [5], El rol de la seguridad informática en el ámbito académico y los sistemas de información asociados [6], Security of networks and information systems in the European Union: A comprehensive approach? [7], WSN security applied to smart metering systems based on cryptography techniques [8], The reduction of number of parliamentary members and the modification of remuneration schemes for deputies in autonomous community [9], A new data protection law [10], From «computing freedom» towards the constitutionalization of new digital rights [11], Securing the human: Broadening diversity in cybersecurity [12], Intruder attacks on wireless sensor networks: A soft decision and prevention mechanism [13], Transposition of EU network and information security directive into national law [14] and An Approach to Optimize the Management of Information Security in Public Organizations of Ecuador [15].…”
Section: Introductionmentioning
confidence: 99%