Skip to main content

Advertisement

Log in

Security experts’ capability design for future internet of things platform

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Security-related accidents have been occurring frequently in the last few years despite the focus on training security personnel with technical capabilities. Although it is important to be equipped with a technical security system, what is also urgently needed is to cultivate integrative and managerial security personnel. Adept management can not only prevent information and technology leakage caused by their own employees but also establish a security culture. However, in-depth studies on the competency system of personnel suitable for the security field are currently lacking. Accordingly, this paper defined security personnel and various security occupation-specific competencies. In addition, 36 security occupations were classified according to the US NICE classification system. Accordingly, various occupations were evaluated in regards to their suitability to be labeled security jobs, and core competencies were described for each occupation. Specifically, nine security job competencies and three general job competencies were described as core competencies. How the required core competencies vary according to the occupational cluster is also described.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
€32.70 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (France)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. United States Department of Homeland Security (2008) Information technology (IT) security essential body of knowledge (EBK): a competency and functional framework for IT security workforce development. United States Department of Homeland Security, United States Department of Homeland Security

  2. Moon HJ (2009) Training status and problems for information security empowerment in Korea SMES. Korea Inst Inf Secur Cryptol 19(1):29–39

    Google Scholar 

  3. Kim SM (2007) The analysis of college-student competencies for globalization and informatization. Soc Stud Educ 46(3):125–145

    Google Scholar 

  4. Oh E (2012) Work-competencies and competency-based curriculum development. J Korea Contents Assoc 12(2):517–531

    Article  Google Scholar 

  5. Eom J-H (2014) Cyber professionals certification evaluation model for reinforcing cyberwar power. J Secur Eng 11(2):177–186

    Article  Google Scholar 

  6. Kwon Y-J (2013) A review and prospect of Korean University student’s career competencies. J Employ Career 3(2):21–39

    Google Scholar 

  7. Chunying W (2010) Analysis on the information security education for the public security active forces academy. Inf Technol Appl 3:355–357

    Google Scholar 

  8. Higgins JPT, Thompson SG (2002) Quantifying heterogeneity in a meta-analysis. Stat Med 21(11):1539–1558

    Article  Google Scholar 

  9. Durlak JA (2011) The impact of enhancing students’ social and emotional learning: a meta-analysis of school based universal interventions. Child Dev 82(1):405–432

    Article  Google Scholar 

  10. Kolkowska E, Dhillon G (2013) Organizational power and information security rule compliance. Comput Secur 33:3–11

    Article  Google Scholar 

  11. Crossler RE (2013) Future directions for behavioral information security research. Comput Secur 32:90–101

    Article  Google Scholar 

  12. Reid R, Van Niekerk J (2013) Back to basics: information security education for the youth via gameplay. Inf Assur Secur Educ Train 406:1–10

    Article  Google Scholar 

  13. Ken H, Guo YY (2012) The effects of multilevel sanctions on information security violations: a mediating model. Inf Manag 49(6):320–326

    Article  Google Scholar 

  14. Jung-deok K, Taeseok B (2011) A study on essential body of knowledge and education certification program for information security professional development. J Digit Converg 9(5):113–121

    Google Scholar 

  15. Lee Y, Shin Y (2015) A design on information security occupational classification for future convergence environment. J Soc e-Bus Stud 20(1):201–215

    Article  Google Scholar 

  16. McLagan PA (1989) Models for HRD practice. Train Dev J 43(9):49–59

    Google Scholar 

  17. Dubois DD (1993) Competency-based performance improvement: a strategy for organizational change. HRD Press Inc, Amherst, MA

  18. Corbin J (1993) Competencies for electronic information services. Public-Access Comput Syst Rev 4(6):17–25

    Google Scholar 

  19. Jin M (2013) An exploratory study on inequality of core competence of college students in Korea. Korean J Sociol Educ 23(1):106–127

    Google Scholar 

Download references

Acknowledgments

This research was supported by the MSIP (Ministry of Science, ICT and Future Planning), Korea, under the CPRC (Communication Policy Research Center) support program (R0880-15-1007) supervised by the IITP (Institute for Information and Communication Technology Promotion).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hangbae Chang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kang, M., Na, O. & Chang, H. Security experts’ capability design for future internet of things platform. J Supercomput 72, 103–119 (2016). https://doi.org/10.1007/s11227-015-1490-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-015-1490-0

Keywords

Navigation