Affiliation:
1. Kansas State University, USA
Abstract
Demand is very high for people to work in various cybersecurity professions and ceteris paribus that demand may well continue into the near term. While there are more formal trails for employment, such as higher-educational pathways, performance in cybersecurity competitions, participation in professional conferences, and social media presentations may all offer less conventional paths into cybersecurity hiring. Through a convenience sample across a number of social media platforms and bottom-up coding, this work explores some aspects of cybersecurity professional profiles (“calling cards”) available on the open Social Web and what may be learned about respective skills and capabilities from these glimmers of the person(s) behind the profiles. These profiles are assessed based on a 2x2 axis with focuses on (1) target skills and (2) personhood attributes. From these analyses, some tentative insights are shared about the cybersecurity calling cards and how informative they may be for recruitment and retention of cybersecurity workers.
Reference34 articles.
1. Securing the Internet of Things: A review.;M.Ahlmeyer;Issues in Information Systems,2016
2. Appazov, A. (2014). Legal aspects of cybersecurity. Justitsministeriet. Retrieved on May 9, 2017, from: http://justitsministeriet.dk/sites/default/files/media/Arbejdsomraader/Forskning/Forskningspuljen/Legal_Aspects_of_Cybersecurity.pdf
3. Balaish, T. (2017, Aug. 21). Cyber Soldiers: White-hat hackers. CBSN. Retrieved on December 22, 2017, from: https://www.cbsnews.com/news/cyber-soldiers-cbsn-on-assignment/
4. Profiling cybersecurity competition participants: Self-efficacy, decision-making and interests predict effectiveness of competitions as a recruitment tool
5. Bell, S., Sayre, E., & Vasserman, E. (2014). A longitudinal study of students in an introductory cybersecurity course.Proceedings of the 121st ASEE Annual Conference & Exposition.