Proceedings of the 27th ACM Conference on on Innovation and Technology in Computer Science Education Vol. 1 2022
DOI: 10.1145/3502718.3524807
|View full text |Cite
|
Sign up to set email alerts
|

Towards Understanding the Skill Gap in Cybersecurity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…This highlights the interest in cyber security content from students but creates a predicament in which students may be less inclined to enroll in qualifications that have a higher proportion of non-technical areas of cyber security, such as those outlined in the CyBOK category of human, organisational and regulatory aspects. However, recent analysis of job advertisements indicates how the technical aspects of cyber security needs to be complemented by the more human and managerial elements, as there are skills gaps in this area of cyber security in particular [18].…”
Section: 'They [Students] Want To Learn More About Hacking They Want ...mentioning
confidence: 99%
“…This highlights the interest in cyber security content from students but creates a predicament in which students may be less inclined to enroll in qualifications that have a higher proportion of non-technical areas of cyber security, such as those outlined in the CyBOK category of human, organisational and regulatory aspects. However, recent analysis of job advertisements indicates how the technical aspects of cyber security needs to be complemented by the more human and managerial elements, as there are skills gaps in this area of cyber security in particular [18].…”
Section: 'They [Students] Want To Learn More About Hacking They Want ...mentioning
confidence: 99%
“…The digital world is growing at an exponential rate. This process faces regulatory gaps [1,2], staff shortages [3,4], new fields with diversified technologies [5,6], and sophisticated malicious actors. New areas with inherent technological specifics regarding hardware platforms and software applications are being developed.…”
Section: Introductionmentioning
confidence: 99%