1 |
Author(s):
Ervin Frenzel, Ian McAndrew.
Page No : 1-7
|
Identifying and Engaging Adjoining Career Fields to Increase Cybersecurity Training Efficacy
Abstract
Abstract
This paper provides a recommendation guide for connecting existing career fields to various cybersecurity countermeasures to correct an oversight that has long haunted the people, processes, and technology model. The belief cybersecurity only deals with securing technology prevents incorporation of needed skill sets to counter the lack of people skills associated with technology and technologists. Incorporation of people skill experts can greatly enhance the effectiveness of techniques to counter attacks against the people security countermeasure. Analysis of ACM, IEEE, and other existing cybersecurity documentation indicate a need increase training in the people and processes countermeasures to effectively train cybersecurity technicians. ACM and IEEE technology specialists recognize a lack of non-technical skills within the technical fields, technologists need to embrace non-technical specialists who can broaden the base knowledge within cybersecurity. The researched documentation further indicated a potential to cross specialists in the people and processes countermeasures into the cybersecurity career field. Cybersecurity is only effective is all three countermeasures; people, processes, and technology are addressed within an organization. Training technology has long been used as effective cybersecurity training; in truth it is only addressing technology security. To maximize cybersecurity, specialists in the people and processes countermeasures must be brought in to aid training in all of the countermeasures.
Keywords: cybersecurity skills training, non-technical cybersecurity skills training, security countermeasures skills development
2 |
Author(s):
Ervin Frenzel, Ian McAndrew.
Page No : 1-8
|
Cybersecurity: Revealing the Legalized Profession
Abstract
Abstract
The cybersecurity profession is composed of recognized occupations accepted both nationally and internationally. Little effort has taken place to formally define the cybersecurity profession, although significant work focuses on cybersecurity task identification. Formal recognition of several professions, including cybersecurity, occurs through ISO and ANSI treaty, a treaty derived from US Legislative authority granted by the US Constitution. Analysis of current treaties and constitutional authority provides a basis for understanding, recognizing, and legalizing existing professions. This study focuses on identifying underlying contributions which provide a solid legal foundation for recognition of the multiple professions including cybersecurity in the US, without identifying individual skill sets belonging to the major technology branches of the governing technology associations.
Index Terms: US constitutional powers, defining the cybersecurity profession, legalizing professions
3 |
Author(s):
McKell W Sanderson, Linda F. Martin.
Page No : 1-15
|
Technical paper: Challenges with Risk Management in Safety
Abstract
Abstract: Much emphasis has been placed on the adaptation of risk management tools/principles for the safety profession. This article reviews some of the challenges that the safety industry faces in the adoption of risk management tools. Additionally, this article focuses on a few of the most common tools that have been implemented, and highlights some of the deficiencies, as well as offers suggestions for improvement.
4 |
Author(s):
David G. I. Heinrich, Ian McAndrew, Jeremy Pretty.
Page No : 1-15
|
Automation, Alarm Management, and Human-Computer Interaction in Space Operations Environments
Abstract
Abstract: Data from an online human factors survey of 59 remote operations professionals was analyzed to understand how automation, alarm management, and human-computer interaction affect dynamic shift work pattern workers. This research found a need for increased vigilance when working with automated systems, specifically in space operations. Subsequently, the study suggests that training and crew resource management are critical components of an effective operations center. Informed crews who work efficiently as a team are better able to mitigate automation bias, ineffective alarm management, and less than optimal human-computer interaction implementation. Furthermore, incorporating lessons learned in space operations programs could help decrease overall risk to individual on-orbit assets if leaders invest in proper documentation and continuity concepts while also prioritizing incorporating outside lessons learned into their programs.
Index Terms: Automation, Alarm Management, Human-Computer Interaction
5 |
Author(s):
Cezary Przęczek.
Page No : 1-16
|
Analysis of Recruitment E-forms in Terms of Compliance of the Scope of Data Obtained about Job Candidates with the Provisions of Polish Labor Law
Abstract
Each organization is faced with the problem of recruiting staff to meet the needs of the tasks
carried out in the organization. This process is becoming more and more complicated every
year, among others, due to the greater mobility of employees, and thus the increase in the
number of applications for open positions in recruitment processes. One of the key stages of
the recruitment process is to obtain relevant information concerning job applicants. The purpose
of this article is to present the results of the survey on a group of 76 organizations that conduct
online recruitment in Krakow (Poland) in terms of obtaining data on employees by these
organizations within the framework of the applicable legal framework in this area. In the case
of more than half of the organizations analyzed (52.63%), they collected redundant data on job
applicants, thus exceeding the scope of data collection permitted by the provisions of Polish
labor law.
6 |
Author(s):
Ervin Henry Frenzel, Dr. Ian McAndrew.
Page No : 1-16
|
Component Security vs. Cybersecurity: Defining Next Generation Cybersecurity
Abstract
The cybersecurity profession is composed of recognized occupations accepted both nationally and internationally. Little effort has taken place to formally define the cybersecurity profession, although significant work focuses on cybersecurity task identification. Formal recognition of several professions, including cybersecurity, occurs through ISO and ANSI treaty, a treaty derived from US Legislative authority granted by the US Constitution. Analysis of current treaties and constitutional authority provides a basis for understanding, recognizing, and legalizing existing professions. This study focuses on identifying underlying contributions which provide a solid legal foundation for recognition of the multiple professions including cybersecurity in the US, without identifying individual skill sets belonging to the major technology branches of the governing technology associations.