Analysis of cybersecurity competencies: Recommendations for telecommunications policy
The paper aims to analyse and assess cybersecurity competencies and define the recommended solutions to improve the human factor in cybersecurity. The article presents the results of theoretical and empirical research that were carried out in 2019–2021. The research subject constitutes one of the pr...
Saved in:
Published in | Telecommunications policy Vol. 46; no. 3; p. 102282 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
Kidlington
Elsevier Ltd
01.04.2022
Butterworth-Heinemann |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | The paper aims to analyse and assess cybersecurity competencies and define the recommended solutions to improve the human factor in cybersecurity. The article presents the results of theoretical and empirical research that were carried out in 2019–2021. The research subject constitutes one of the priorities of many countries and international organisations. Cybersecurity is one of the essential foundations for implementing the idea of sustainable development. A cybersecurity analysis using a layered structure was proposed in the theoretical part. Empirical research was conducted using a diagnostic poll method based on a survey. The presentation of the research results includes an analysis of statistical dependencies. The paper presents the research results on cybersecurity competencies in the field of threats to state cyberspace and methods of securing and protecting data. An important element of the research was to identify forms of education that can be used to achieve greater efficiency in increasing cybersecurity competencies. The result of the implementation of the research objectives was the development of recommended solutions facilitating the improvement of the human factor in the field of cybersecurity.
•The survey results showed diverse cybersecurity competencies, which are an essential element of sustainable development.•The level of knowledge of cyber threats depends on education, age, and training.•The increase in knowledge about cyber threats positively correlates with the intensification of data protection methods used.•We examined the factors influencing the effectiveness of increasing cybersecurity competencies among employees.•Improving cybersecurity competencies can be achieved through education (courses, training, information campaigns). |
---|---|
AbstractList | The paper aims to analyse and assess cybersecurity competencies and define the recommended solutions to improve the human factor in cybersecurity. The article presents the results of theoretical and empirical research that were carried out in 2019–2021. The research subject constitutes one of the priorities of many countries and international organisations. Cybersecurity is one of the essential foundations for implementing the idea of sustainable development. A cybersecurity analysis using a layered structure was proposed in the theoretical part. Empirical research was conducted using a diagnostic poll method based on a survey. The presentation of the research results includes an analysis of statistical dependencies. The paper presents the research results on cybersecurity competencies in the field of threats to state cyberspace and methods of securing and protecting data. An important element of the research was to identify forms of education that can be used to achieve greater efficiency in increasing cybersecurity competencies. The result of the implementation of the research objectives was the development of recommended solutions facilitating the improvement of the human factor in the field of cybersecurity.
•The survey results showed diverse cybersecurity competencies, which are an essential element of sustainable development.•The level of knowledge of cyber threats depends on education, age, and training.•The increase in knowledge about cyber threats positively correlates with the intensification of data protection methods used.•We examined the factors influencing the effectiveness of increasing cybersecurity competencies among employees.•Improving cybersecurity competencies can be achieved through education (courses, training, information campaigns). The paper aims to analyse and assess cybersecurity competencies and define the recommended solutions to improve the human factor in cybersecurity. The article presents the results of theoretical and empirical research that were carried out in 2019–2021. The research subject constitutes one of the priorities of many countries and international organisations. Cybersecurity is one of the essential foundations for implementing the idea of sustainable development. A cybersecurity analysis using a layered structure was proposed in the theoretical part. Empirical research was conducted using a diagnostic poll method based on a survey. The presentation of the research results includes an analysis of statistical dependencies. The paper presents the research results on cybersecurity competencies in the field of threats to state cyberspace and methods of securing and protecting data. An important element of the research was to identify forms of education that can be used to achieve greater efficiency in increasing cybersecurity competencies. The result of the implementation of the research objectives was the development of recommended solutions facilitating the improvement of the human factor in the field of cybersecurity. |
ArticleNumber | 102282 |
Author | Szczepaniuk, Edyta Karolina Szczepaniuk, Hubert |
Author_xml | – sequence: 1 givenname: Edyta Karolina orcidid: 0000-0002-6707-2987 surname: Szczepaniuk fullname: Szczepaniuk, Edyta Karolina email: e.szczepaniuk@law.mil.pl organization: Military University of Aviation – Lotnicza Akademia Wojskowa, Dywizjonu 303 No. 35 ST., 08-521, Dęblin, Poland – sequence: 2 givenname: Hubert orcidid: 0000-0001-7613-4281 surname: Szczepaniuk fullname: Szczepaniuk, Hubert email: hubert_szczepaniuk@sggw.edu.pl organization: Warsaw University of Life Sciences – SGGW, Nowoursynowska 166 ST., 02-787, Warsaw, Poland |
BookMark | eNqFkMtqwzAQRUVJoUnaP-jC0LVTyZb8yKIQQl8QKJRmLeTxGGQcy5WUgv--StxVF-1qmMvcmblnQWa96ZGQW0ZXjLLsvl157AbTrRKasCAlSZFckDkr8jJOE1HMyJymtIhFmbErsnCupZTlrKRzst_0qhuddpFpIhgrtA7haLUfIzCHAT32oNGto3cM_QH7Wnltehc1xkbh6lk99hp-5PCFhvGaXDaqc3jzU5dk__T4sX2Jd2_Pr9vNLgbOhY8xV6CgFFzlmYCMi7zMU4CGZZyxqmoSWtdMpRxKjkpVUAlBVVlyzlIBrKrTJbmb9g7WfB7Redmaow2JnEyyEDZlacbDFJ-mwBrnLDZysPqg7CgZlSeAspUTQHkCKCeAwbb-ZQPtzzG9Vbr7z_wwmTHE_9JopQsce8BaWwQva6P_XvANsw6SuQ |
CitedBy_id | crossref_primary_10_1186_s13677_024_00630_y crossref_primary_10_22139_jobs_1623655 crossref_primary_10_3390_en16010347 crossref_primary_10_1007_s43621_024_00754_w crossref_primary_10_1108_JSIT_07_2023_0132 crossref_primary_10_3390_en17235871 crossref_primary_10_55676_asi_v3i1_32 crossref_primary_10_1108_JEIM_12_2023_0635 crossref_primary_10_21511_bbs_18_4__2023_05 |
Cites_doi | 10.22215/timreview/835 10.14207/ejsd.2018.v7n4p171 10.1145/360303.360333 10.1016/j.heliyon.2017.e00346 10.1109/ACCESS.2021.3097144 10.1007/978-3-319-23570-7 |
ContentType | Journal Article |
Copyright | 2021 The Authors Copyright Butterworth-Heinemann Apr 2022 |
Copyright_xml | – notice: 2021 The Authors – notice: Copyright Butterworth-Heinemann Apr 2022 |
DBID | 6I. AAFTH AAYXX CITATION 7SP 7TQ 8BJ 8FD DHY DON FQK JBE L7M |
DOI | 10.1016/j.telpol.2021.102282 |
DatabaseName | ScienceDirect Open Access Titles Elsevier:ScienceDirect:Open Access CrossRef Electronics & Communications Abstracts PAIS Index International Bibliography of the Social Sciences (IBSS) Technology Research Database PAIS International PAIS International (Ovid) International Bibliography of the Social Sciences International Bibliography of the Social Sciences Advanced Technologies Database with Aerospace |
DatabaseTitle | CrossRef International Bibliography of the Social Sciences (IBSS) Technology Research Database Advanced Technologies Database with Aerospace Electronics & Communications Abstracts PAIS International |
DatabaseTitleList | International Bibliography of the Social Sciences (IBSS) |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Economics |
EISSN | 1879-3258 |
ExternalDocumentID | 10_1016_j_telpol_2021_102282 S0308596121001865 |
GroupedDBID | --K --M -~X .~1 0R~ 123 13V 1B1 1OL 1RT 1~. 1~5 29Q 4.4 457 4G. 5VS 6I. 7-5 71M 77K 8P~ 9JN 9JO AACTN AAEDT AAEDW AAFJI AAFTH AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO AAYFN ABBOA ABFRF ABJNI ABKBG ABMAC ABMMH ABMVD ABXDB ABYKQ ACDAQ ACGFO ACGFS ACHQT ACHRH ACNCT ACNNM ACNTT ACRLP ACZNC ADBBV ADEZE ADIYS ADJOM ADMUD AEBSH AEFWE AEKER AENEX AFKWA AFTJW AGHFR AGJBL AGUBO AGUMN AGYEJ AHHHB AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV AKYCK ALEQD ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOMHK AOUOD ASPBG AVARZ AVWKF AXJTR AZFZN BKOJK BKOMP BLXMC BNSAS CS3 DU5 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 F5P FDB FEDTE FGOYB FIRID FNPLU FYGXN G-2 G-Q GBLVA GBOLZ HMY HVGLF HZ~ H~9 IHE J1W KOM M3Y M41 MO0 MS~ N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. PQQKQ PRBVW Q38 R2- RIG ROL RPZ RXW SDF SDG SDP SES SEW SPC SPCBC SSB SSL SSO SSS SSV SSZ T5K TAE TN5 U5U WH7 WUQ XFK ZCA ~G- AATTM AAXKI AAYWO AAYXX ABWVN ACRPL ACVFH ADCNI ADNMO AEIPS AEUPX AFJKZ AFPUW AFXIZ AGCQF AGQPQ AGRNS AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP BNPGV CITATION SSH 7SP 7TQ 8BJ 8FD DHY DON EFKBS FQK JBE L7M |
ID | FETCH-LOGICAL-c445t-e7acac954a765c6457973ccf16411bbf20dd1a34c94eaabcb550a9944135c1bd3 |
IEDL.DBID | .~1 |
ISSN | 0308-5961 |
IngestDate | Sat Jul 26 02:54:33 EDT 2025 Thu Apr 24 22:55:59 EDT 2025 Tue Jul 01 00:16:37 EDT 2025 Fri Feb 23 02:41:10 EST 2024 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 3 |
Keywords | Survey research Cybersecurity Cyber hygiene Sustainability development Competencies Human factors |
Language | English |
License | This is an open access article under the CC BY-NC-ND license. |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c445t-e7acac954a765c6457973ccf16411bbf20dd1a34c94eaabcb550a9944135c1bd3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0002-6707-2987 0000-0001-7613-4281 |
OpenAccessLink | https://www.sciencedirect.com/science/article/pii/S0308596121001865 |
PQID | 2696131364 |
PQPubID | 37342 |
ParticipantIDs | proquest_journals_2696131364 crossref_primary_10_1016_j_telpol_2021_102282 crossref_citationtrail_10_1016_j_telpol_2021_102282 elsevier_sciencedirect_doi_10_1016_j_telpol_2021_102282 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2022-04-01 |
PublicationDateYYYYMMDD | 2022-04-01 |
PublicationDate_xml | – month: 04 year: 2022 text: 2022-04-01 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | Kidlington |
PublicationPlace_xml | – name: Kidlington |
PublicationTitle | Telecommunications policy |
PublicationYear | 2022 |
Publisher | Elsevier Ltd Butterworth-Heinemann |
Publisher_xml | – name: Elsevier Ltd – name: Butterworth-Heinemann |
References | Szczepaniuk (bib53) 2019 Com/2020/0624 (bib5) 2020; Vol. 30 Vu, Hanafizadeh, Bohlin (bib57) 2020; 44 Graham, Denning (bib22) 1972 (bib39) 2008 (bib14) 2020 Harrison, Ruzzo, Ullman (bib24) 1976; 19 Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of the personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation) (O.J.EU L 119/1, 4.5.2016). Geber, Geber, Volkamer (bib21) 2018; 77 Craigen, Diakun-Thibault, Purse (bib7) 2014; 4 Sienkiewicz (bib49) 1989 (bib10) 2017 (bib13) 2019 Vasiu, Vasiu (bib56) 2018; 7 Liu, Ning, Mu, Zheng, Zeng, Yang (bib33) July 2019; Vol. 96 Probst, Hunkel, Dieter, Bishop (bib42) 2010 JOIN (bib73) 2020 Henriksen-Bulmer, Faily, Jeary (bib25) 2019; Vol. 82 Szczepaniuk, Szczepaniuk, Rokicki, Klepacki (bib54) 2020; Vol. 90 (bib27) 2011 (bib12) 2019 Franke, Brynielsson (bib19) 2014; 46 Antonuci (bib1) 2017 Regulation (EU) 2019/881 of the European Parliament and of the Council of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013 (Cybersecurity Act) (Text with EEA relevance) (O.J. EU L 151, 7.6.2019). Kalhoro, Rehman, Ponnusamy, Shaikh (bib29) 2021; 9 (bib60) 2020 (bib15) 2020 Directive (EU) 2016/1148 of the European Parliament and of the Council of 6. July 2016 concerning measures for a high common level of security of network and information systems across the Union (O.J. EU L 191/1, 19.7.2016). Frauenstein, Flowerday (bib20) 2020; Vol. 94 Accessed 7 December 2020. Sharma, Fantin, Prabhu, Guan, Dattakumar (bib48) 2016; 40 Bell, LaPadula (bib3) 1973; ume I Kraemer, Pascale (bib32) 2003; 47 Person, Calic, Pattison, Butavisius, McComac, Zwaans (bib41) 2017; Vol. 66 Morgan (bib36) 2021 Hadlington (bib23) 2017; 3 Connolly, Wall (bib6) 2019; Vol. 87 Kim, Kim (bib30) 2018; Vol. 88 Sienkiewicz (bib50) 2013; 25 wykładów Kosseff (bib31) 2019 Oxford Online Dictionary. (bib55) 2017 Dodge, Carver, Ferguson (bib9) 2007; 26 (bib59) 2020 Whitman (bib61) 2018 (bib35) 2015 Wang (bib58) 2013 Newman (bib38) 2006 Europol (bib18) 2019 Schoon (bib47) 2009 Appiah-Otoo, Song (bib2) 2021; 45 (bib43) 2001 Robison, Crenshaw (bib46) 2002; 21 Biba (bib4) 1975 (bib26) 2012 (bib11) 2018 Refsdal, Soulhug, Stolen (bib44) 2015 Markopoulou, Papakonstantinou, de Her (bib34) 2019; Vol. 35 Singh (bib51) 2006 Cybersecurity Competency Model (bib8) 2019 Neigal, Claypoole, Waldfoogle, Acharya, Hancook (bib37) 2020; Vol. 92 Stouffer, Zimmerman, Tang, Lubell, Cichonski, McCarthy (bib52) 2017 Liu (10.1016/j.telpol.2021.102282_bib33) 2019; Vol. 96 Europol (10.1016/j.telpol.2021.102282_bib18) 2019 Stouffer (10.1016/j.telpol.2021.102282_bib52) 2017 Connolly (10.1016/j.telpol.2021.102282_bib6) 2019; Vol. 87 Vasiu (10.1016/j.telpol.2021.102282_bib56) 2018; 7 (10.1016/j.telpol.2021.102282_bib11) 2018 Schoon (10.1016/j.telpol.2021.102282_bib47) 2009 Robison (10.1016/j.telpol.2021.102282_bib46) 2002; 21 Kim (10.1016/j.telpol.2021.102282_bib30) 2018; Vol. 88 Com/2020/0624 (10.1016/j.telpol.2021.102282_bib5) 2020; Vol. 30 (10.1016/j.telpol.2021.102282_bib35) 2015 (10.1016/j.telpol.2021.102282_bib59) 2020 Szczepaniuk (10.1016/j.telpol.2021.102282_bib53) 2019 Sienkiewicz (10.1016/j.telpol.2021.102282_bib50) 2013; 25 wykładów Morgan (10.1016/j.telpol.2021.102282_bib36) 2021 Wang (10.1016/j.telpol.2021.102282_bib58) 2013 Dodge (10.1016/j.telpol.2021.102282_bib9) 2007; 26 Cybersecurity Competency Model (10.1016/j.telpol.2021.102282_bib8) 2019 Frauenstein (10.1016/j.telpol.2021.102282_bib20) 2020; Vol. 94 Newman (10.1016/j.telpol.2021.102282_bib38) 2006 Szczepaniuk (10.1016/j.telpol.2021.102282_bib54) 2020; Vol. 90 (10.1016/j.telpol.2021.102282_bib43) 2001 Kraemer (10.1016/j.telpol.2021.102282_bib32) 2003; 47 10.1016/j.telpol.2021.102282_bib69 Probst (10.1016/j.telpol.2021.102282_bib42) 2010 Craigen (10.1016/j.telpol.2021.102282_bib7) 2014; 4 (10.1016/j.telpol.2021.102282_bib39) 2008 Whitman (10.1016/j.telpol.2021.102282_bib61) 2018 Person (10.1016/j.telpol.2021.102282_bib41) 2017; Vol. 66 Geber (10.1016/j.telpol.2021.102282_bib21) 2018; 77 (10.1016/j.telpol.2021.102282_bib26) 2012 Hadlington (10.1016/j.telpol.2021.102282_bib23) 2017; 3 10.1016/j.telpol.2021.102282_bib71 (10.1016/j.telpol.2021.102282_bib10) 2017 Neigal (10.1016/j.telpol.2021.102282_bib37) 2020; Vol. 92 10.1016/j.telpol.2021.102282_bib72 Franke (10.1016/j.telpol.2021.102282_bib19) 2014; 46 Antonuci (10.1016/j.telpol.2021.102282_bib1) 2017 Kalhoro (10.1016/j.telpol.2021.102282_bib29) 2021; 9 Refsdal (10.1016/j.telpol.2021.102282_bib44) 2015 Appiah-Otoo (10.1016/j.telpol.2021.102282_bib2) 2021; 45 (10.1016/j.telpol.2021.102282_bib13) 2019 (10.1016/j.telpol.2021.102282_bib14) 2020 Graham (10.1016/j.telpol.2021.102282_bib22) 1972 Biba (10.1016/j.telpol.2021.102282_bib4) 1975 Sharma (10.1016/j.telpol.2021.102282_bib48) 2016; 40 Henriksen-Bulmer (10.1016/j.telpol.2021.102282_bib25) 2019; Vol. 82 (10.1016/j.telpol.2021.102282_bib27) 2011 Harrison (10.1016/j.telpol.2021.102282_bib24) 1976; 19 JOIN (10.1016/j.telpol.2021.102282_bib73) 2020 (10.1016/j.telpol.2021.102282_bib55) 2017 Bell (10.1016/j.telpol.2021.102282_bib3) 1973; ume I 10.1016/j.telpol.2021.102282_bib40 Kosseff (10.1016/j.telpol.2021.102282_bib31) 2019 Vu (10.1016/j.telpol.2021.102282_bib57) 2020; 44 (10.1016/j.telpol.2021.102282_bib15) 2020 (10.1016/j.telpol.2021.102282_bib12) 2019 Singh (10.1016/j.telpol.2021.102282_bib51) 2006 Markopoulou (10.1016/j.telpol.2021.102282_bib34) 2019; Vol. 35 (10.1016/j.telpol.2021.102282_bib60) 2020 Sienkiewicz (10.1016/j.telpol.2021.102282_bib49) 1989 |
References_xml | – year: 2009 ident: bib47 article-title: Measuring social competencies. (RatSWD Working Paper Series, 58). Berlin: Rat für Sozial - und Wirtschaftsdaten (RatSWD) – year: 2020 ident: bib73 article-title: 18. Joint Communication to the European Parliament and the Council the EU’S. Cybersecurity Strategy for the Digital Decade. Brussels – volume: 21 start-page: 334 year: 2002 end-page: 363 ident: bib46 article-title: Post-industrial transformations and cyber-space: A cross-national analysis of internet development. Social science research publication-title: Elsevier – year: 2018 ident: bib11 article-title: Analysis of the European R&D priorities in cybersecurity Strategic priorities in cybersecurity for a safer Europe – volume: Vol. 87 year: 2019 ident: bib6 article-title: The rise of crypto-ransomware in a changing cybercrime landscape: Taxonomising countermeasures publication-title: Computers & security – year: 2013 ident: bib58 article-title: Assessment of cybersecurity knowledge and Behavior:an anti -phishingScenario .IC – year: 2019 ident: bib13 article-title: Cybersecurity Culture Guidelines: Behavioural aspects of cybersecurity – volume: Vol. 30 year: 2020 ident: bib5 publication-title: Communication from the Commission to the European Parliament, the Council, the European economic and social Committee and the Committee of the Regions digital education action plan 2021-2027 – year: 1989 ident: bib49 article-title: Systemy kierowania – year: 2017 ident: bib52 article-title: Cybersecurity Framework Manufacturing profile – volume: Vol. 90 year: 2020 ident: bib54 publication-title: Information security assessment in public administration. Computers & Security – volume: 19 start-page: 461 year: 1976 end-page: 471 ident: bib24 article-title: Protection in operating systems publication-title: Communications of the ACM – reference: Regulation (EU) 2019/881 of the European Parliament and of the Council of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013 (Cybersecurity Act) (Text with EEA relevance) (O.J. EU L 151, 7.6.2019). – year: 2001 ident: bib43 publication-title: Competence in the learning society – year: 2011 ident: bib27 publication-title: Cyber Criminology: Exploring Internet Crimes and Criminal behavior – reference: Accessed 7 December 2020. – volume: 46 start-page: 18 year: 2014 end-page: 31 ident: bib19 article-title: Cyber situational awareness - a systematic review of the literature. Computers & Security publication-title: Elsevier – volume: 25 wykładów year: 2013 ident: bib50 – year: 2015 ident: bib44 article-title: Cybersecurity. Cyber-risk management. SpringerBriefs in computer science – volume: 3 year: 2017 ident: bib23 article-title: Human factors in cybersecurity; examining the link between Internetaddiction, impulsivity, attitudes towards cybersecurity, and risky cybersecurity behaviours publication-title: Heliyon – volume: 40 start-page: 628 year: 2016 end-page: 643 ident: bib48 article-title: Digital literacy and knowledge societies: A grounded theory investigation of sustainable development. Telecommunications policy publication-title: Elsevier – year: 2021 ident: bib36 article-title: Report: Cyberwarfare in the C-suite – year: 2019 ident: bib8 article-title: Employment and training Administration – volume: 7 start-page: 171 year: 2018 end-page: 178 ident: bib56 article-title: Cybersecurity as an essential sustainable economic development factor publication-title: European Journal of Sustainable Development – year: 2020 ident: bib60 article-title: The future of Jobs report 2020 – year: 2020 ident: bib15 article-title: Cybersecurity skills development in the EU – year: 2020 ident: bib59 article-title: The global risks report 2020 – reference: Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of the personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation) (O.J.EU L 119/1, 4.5.2016). – volume: 26 start-page: 73 year: 2007 end-page: 80 ident: bib9 article-title: Phishing for user security awareness. Computers & Security publication-title: Elsevier – volume: Vol. 35 year: 2019 ident: bib34 article-title: The new EU cybersecurity framework: The NIS Directive, ENISA's role and the General Data Protection Regulation publication-title: Computer law & security review – volume: 44 year: 2020 ident: bib57 article-title: ICT as a driver of economic growth: A survey of the literature and directions for future research. Telecommunications policy publication-title: Elsevier – volume: Vol. 96 start-page: 678 year: July 2019 end-page: 691 ident: bib33 article-title: (2019). A review of the smart world publication-title: Future generation computer systems – year: 2019 ident: bib53 article-title: Efektywność kształcenie e-learningowego w Polsce – year: 2006 ident: bib51 article-title: Fundamental of research methodology and Statistics – volume: ume I year: 1973 ident: bib3 publication-title: Secure computer systems: Mathematical foundations – start-page: 417 year: 1972 end-page: 429 ident: bib22 article-title: Protection: Principles and practice publication-title: Proceedings of the may 16-18, 1972, Spring Joint computer conference – year: 2015 ident: bib35 publication-title: The Smart revolution towards the sustainable digital society: Beyond the Era of Convergence – volume: Vol. 82 start-page: 270 year: 2019 end-page: 288 ident: bib25 article-title: Privacy risk assessment in context: A meta-model based on contextual integrity publication-title: Computers & security – volume: 45 year: 2021 ident: bib2 article-title: The impact of ICT on economic growth-Comparing rich and poor countries. Telecommunications Policy publication-title: Elsevier – volume: Vol. 88 start-page: 143 year: 2018 end-page: 152 ident: bib30 article-title: Factors influencing willingness to provide personal information for personalised recommendations publication-title: Computers in human behavior – reference: Directive (EU) 2016/1148 of the European Parliament and of the Council of 6. July 2016 concerning measures for a high common level of security of network and information systems across the Union (O.J. EU L 191/1, 19.7.2016). – year: 2019 ident: bib12 article-title: Threat Landscape report 2018 – year: 2017 ident: bib10 article-title: Stock taking of information security training needs in critical sectors – volume: 4 start-page: 13 year: 2014 end-page: 21 ident: bib7 article-title: Defining cybersecurity publication-title: Technol. Innov. Manag. Rev.′ – year: 1975 ident: bib4 article-title: Integrity considerations for secure computer systems – year: 2018 ident: bib61 article-title: Industry priorities for cybersecurity competencies publication-title: J. Colloq. Inform. Syst. Secur. Edu. Edition 6 – year: 2020 ident: bib14 article-title: ECSM ECSM Deployment report 2019 – year: 2010 ident: bib42 article-title: Insider threats in cyber security – year: 2012 ident: bib26 article-title: Information technology – security techniques – Guides for cybersecurity – start-page: 68 year: 2006 end-page: 78 ident: bib38 article-title: Cybercrime, identity theft, and fraud: Practicing safe internet - network security threats and vulnerabilities publication-title: Proceedings of the 3rd annual conference on Information security curriculum development (InfoSecCD '06) – volume: Vol. 94 year: 2020 ident: bib20 article-title: Susceptibility to phishing on social network sites: A personality information processing model publication-title: Computers & security – volume: Vol. 66 start-page: 40 year: 2017 end-page: 51 ident: bib41 article-title: The human aspects of information security questionnaire (HAIS-Q): Two further validation studies publication-title: Computers & security – year: 2019 ident: bib31 article-title: Cybersecurity law – volume: Vol. 92 year: 2020 ident: bib37 article-title: Holistic cyber hygiene education: Accounting for the human factors publication-title: Computers & security – volume: 9 start-page: 99339 year: 2021 end-page: 99363 ident: bib29 article-title: Extracting key factors of cyber hygiene behaviour among software engineers: A systematic literature review publication-title: IEEE Access – volume: 47 start-page: 1389 year: 2003 end-page: 1393 ident: bib32 article-title: A human factors vulnerability evaluation method for computer and information security. Human Factors and Ergonomics Society Annual Meeting Proceedings publication-title: Sage – volume: 77 start-page: 226 year: 2018 end-page: 261 ident: bib21 article-title: Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior. Computers & security publication-title: Elsevier – year: 2008 ident: bib39 article-title: National security Presidential directive/NSPD-54. National security Presidential directive/NSPD-23 – reference: Oxford Online Dictionary. – year: 2017 ident: bib55 article-title: Report of the Committee on the future Economy. Pioneers of the next generation – year: 2019 ident: bib18 article-title: Internet organised Crime Thread assessment (IOCTA). Europol. European cybercrime Centre. The Hauge – year: 2017 ident: bib1 article-title: The cyber risk Handbook: Creating and Measurning effective cybersecurity capabilities – volume: 4 start-page: 13 issue: Number 10 year: 2014 ident: 10.1016/j.telpol.2021.102282_bib7 article-title: Defining cybersecurity publication-title: Technol. Innov. Manag. Rev.′ doi: 10.22215/timreview/835 – year: 2019 ident: 10.1016/j.telpol.2021.102282_bib12 – year: 2017 ident: 10.1016/j.telpol.2021.102282_bib55 – year: 2017 ident: 10.1016/j.telpol.2021.102282_bib52 – year: 2008 ident: 10.1016/j.telpol.2021.102282_bib39 – volume: 47 start-page: 1389 issue: 12 year: 2003 ident: 10.1016/j.telpol.2021.102282_bib32 article-title: A human factors vulnerability evaluation method for computer and information security. Human Factors and Ergonomics Society Annual Meeting Proceedings publication-title: Sage – year: 2012 ident: 10.1016/j.telpol.2021.102282_bib26 – volume: 40 start-page: 628 issue: 7 year: 2016 ident: 10.1016/j.telpol.2021.102282_bib48 article-title: Digital literacy and knowledge societies: A grounded theory investigation of sustainable development. Telecommunications policy publication-title: Elsevier – volume: 44 issue: Issue 2 year: 2020 ident: 10.1016/j.telpol.2021.102282_bib57 article-title: ICT as a driver of economic growth: A survey of the literature and directions for future research. Telecommunications policy publication-title: Elsevier – start-page: 68 year: 2006 ident: 10.1016/j.telpol.2021.102282_bib38 article-title: Cybercrime, identity theft, and fraud: Practicing safe internet - network security threats and vulnerabilities – volume: 7 start-page: 171 issue: Number 4 year: 2018 ident: 10.1016/j.telpol.2021.102282_bib56 article-title: Cybersecurity as an essential sustainable economic development factor publication-title: European Journal of Sustainable Development doi: 10.14207/ejsd.2018.v7n4p171 – volume: ume I year: 1973 ident: 10.1016/j.telpol.2021.102282_bib3 – year: 2017 ident: 10.1016/j.telpol.2021.102282_bib1 – ident: 10.1016/j.telpol.2021.102282_bib69 – year: 2015 ident: 10.1016/j.telpol.2021.102282_bib35 – year: 2011 ident: 10.1016/j.telpol.2021.102282_bib27 – year: 2001 ident: 10.1016/j.telpol.2021.102282_bib43 – volume: 19 start-page: 461 year: 1976 ident: 10.1016/j.telpol.2021.102282_bib24 article-title: Protection in operating systems publication-title: Communications of the ACM doi: 10.1145/360303.360333 – year: 2006 ident: 10.1016/j.telpol.2021.102282_bib51 – year: 2020 ident: 10.1016/j.telpol.2021.102282_bib59 – volume: 3 issue: 7 year: 2017 ident: 10.1016/j.telpol.2021.102282_bib23 article-title: Human factors in cybersecurity; examining the link between Internetaddiction, impulsivity, attitudes towards cybersecurity, and risky cybersecurity behaviours publication-title: Heliyon doi: 10.1016/j.heliyon.2017.e00346 – volume: Vol. 90 year: 2020 ident: 10.1016/j.telpol.2021.102282_bib54 – year: 2021 ident: 10.1016/j.telpol.2021.102282_bib36 – year: 2013 ident: 10.1016/j.telpol.2021.102282_bib58 – issue: 1 year: 2018 ident: 10.1016/j.telpol.2021.102282_bib61 article-title: Industry priorities for cybersecurity competencies publication-title: J. Colloq. Inform. Syst. Secur. Edu. Edition 6 – volume: 46 start-page: 18 issue: October year: 2014 ident: 10.1016/j.telpol.2021.102282_bib19 article-title: Cyber situational awareness - a systematic review of the literature. Computers & Security publication-title: Elsevier – volume: Vol. 94 year: 2020 ident: 10.1016/j.telpol.2021.102282_bib20 article-title: Susceptibility to phishing on social network sites: A personality information processing model – volume: 25 wykładów year: 2013 ident: 10.1016/j.telpol.2021.102282_bib50 – year: 2020 ident: 10.1016/j.telpol.2021.102282_bib15 – volume: Vol. 92 year: 2020 ident: 10.1016/j.telpol.2021.102282_bib37 article-title: Holistic cyber hygiene education: Accounting for the human factors – volume: Vol. 30 year: 2020 ident: 10.1016/j.telpol.2021.102282_bib5 – volume: Vol. 66 start-page: 40 year: 2017 ident: 10.1016/j.telpol.2021.102282_bib41 article-title: The human aspects of information security questionnaire (HAIS-Q): Two further validation studies – year: 2019 ident: 10.1016/j.telpol.2021.102282_bib53 – volume: 77 start-page: 226 issue: August year: 2018 ident: 10.1016/j.telpol.2021.102282_bib21 article-title: Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior. Computers & security publication-title: Elsevier – ident: 10.1016/j.telpol.2021.102282_bib72 – volume: 45 issue: Issue 2 year: 2021 ident: 10.1016/j.telpol.2021.102282_bib2 article-title: The impact of ICT on economic growth-Comparing rich and poor countries. Telecommunications Policy publication-title: Elsevier – year: 2020 ident: 10.1016/j.telpol.2021.102282_bib73 – volume: 9 start-page: 99339 year: 2021 ident: 10.1016/j.telpol.2021.102282_bib29 article-title: Extracting key factors of cyber hygiene behaviour among software engineers: A systematic literature review publication-title: IEEE Access doi: 10.1109/ACCESS.2021.3097144 – year: 2015 ident: 10.1016/j.telpol.2021.102282_bib44 doi: 10.1007/978-3-319-23570-7 – year: 2020 ident: 10.1016/j.telpol.2021.102282_bib14 – year: 1989 ident: 10.1016/j.telpol.2021.102282_bib49 – start-page: 417 year: 1972 ident: 10.1016/j.telpol.2021.102282_bib22 article-title: Protection: Principles and practice – volume: Vol. 82 start-page: 270 year: 2019 ident: 10.1016/j.telpol.2021.102282_bib25 article-title: Privacy risk assessment in context: A meta-model based on contextual integrity – year: 2019 ident: 10.1016/j.telpol.2021.102282_bib8 – volume: 26 start-page: 73 issue: 1 year: 2007 ident: 10.1016/j.telpol.2021.102282_bib9 article-title: Phishing for user security awareness. Computers & Security publication-title: Elsevier – year: 2019 ident: 10.1016/j.telpol.2021.102282_bib13 – year: 2018 ident: 10.1016/j.telpol.2021.102282_bib11 – year: 2017 ident: 10.1016/j.telpol.2021.102282_bib10 – year: 2020 ident: 10.1016/j.telpol.2021.102282_bib60 – year: 2009 ident: 10.1016/j.telpol.2021.102282_bib47 – ident: 10.1016/j.telpol.2021.102282_bib40 – year: 2019 ident: 10.1016/j.telpol.2021.102282_bib18 – volume: Vol. 96 start-page: 678 year: 2019 ident: 10.1016/j.telpol.2021.102282_bib33 article-title: (2019). A review of the smart world – ident: 10.1016/j.telpol.2021.102282_bib71 – year: 1975 ident: 10.1016/j.telpol.2021.102282_bib4 – year: 2010 ident: 10.1016/j.telpol.2021.102282_bib42 – year: 2019 ident: 10.1016/j.telpol.2021.102282_bib31 – volume: Vol. 87 year: 2019 ident: 10.1016/j.telpol.2021.102282_bib6 article-title: The rise of crypto-ransomware in a changing cybercrime landscape: Taxonomising countermeasures – volume: Vol. 35 year: 2019 ident: 10.1016/j.telpol.2021.102282_bib34 article-title: The new EU cybersecurity framework: The NIS Directive, ENISA's role and the General Data Protection Regulation – volume: Vol. 88 start-page: 143 year: 2018 ident: 10.1016/j.telpol.2021.102282_bib30 article-title: Factors influencing willingness to provide personal information for personalised recommendations – volume: 21 start-page: 334 issue: 3 year: 2002 ident: 10.1016/j.telpol.2021.102282_bib46 article-title: Post-industrial transformations and cyber-space: A cross-national analysis of internet development. Social science research publication-title: Elsevier |
SSID | ssj0017190 |
Score | 2.3659275 |
Snippet | The paper aims to analyse and assess cybersecurity competencies and define the recommended solutions to improve the human factor in cybersecurity. The article... |
SourceID | proquest crossref elsevier |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 102282 |
SubjectTerms | Academic achievement Competence Competencies Computer security Cyber hygiene Cybersecurity Empirical analysis Human factors International organizations Internet Research methodology Research subjects Survey research Sustainability development Sustainable development Telecommunications Telecommunications policy |
Title | Analysis of cybersecurity competencies: Recommendations for telecommunications policy |
URI | https://dx.doi.org/10.1016/j.telpol.2021.102282 https://www.proquest.com/docview/2696131364 |
Volume | 46 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSwMxEA6lHvQiPvFRSw5eY5vdZLPxVoqlKvaihd5Ckmah0hfuevDibzfJJkUFKXhdkrBMZifft5n5BoDrTNK0qwtLcowukI1-EuWSY8SMJSuWjSnjpZSeRtlwTB4mdNIA_VgL49IqQ-yvY7qP1uFJJ1izs57NOs9OaYVyr4DVxXnmCs0JYc7Lbz43aR6Y4fo_ix2M3OhYPudzvCozX6_cBUSCnYZBkid_HU-_ArU_fQYHYD_ARtir3-wQNMzyCOzGquLyGIyjughcFVB_KIvqQmc6qCM0tqT4Fjq-uViY0EuphBa0wso1w_leKVLCtdcLPgHjwd1Lf4hCywSkCaEVMkxqqTklkmVUZ4QyzlKtC0uKMFaqSLrTKZYp0ZwYKZVWlqBIzi0mSqnGapqeguZytTRnABLJM2LcvahmRClLlQkvGMu1NG5Feg7SaCmhg564a2sxFzFx7FXU9hXOvqK27zlAm1nrWk9jy3gWN0H88AthQ_6Wma24ZyJ8l6Ww7mfxC04zcvHvhS_BXuJqIHz6Tgs0q7d3c2WRSaXa3vXaYKd3_zgcfQGK3uSB |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1NTwIxEJ0gHPRi_Iwoag9eN9Dddku9ESIB-bgIibemLd0Eg0BkPfjvbXdboibGxOumbTbT2el725k3AHeppElLZ5bkGJ1FNvrJqC05jpixZMWyMWUKKaXxJO3PyOMzfa5AN9TCuLRKH_vLmF5Ea_-k6a3Z3CwWzSentEJ5oYDVwu2U7kHNqVPRKtQ6g2F_srtMYLj81WLHR25CqKAr0rxys9ys3R1EjJ2MQdyOfzuhfsTq4gDqHcGhR46oU77cMVTM6gT2Q2Hx9hRmQWAErTOkP5QFdr45HdIBHVtefI8c5Xx9Nb6d0hZZ3Ipy1w_na7HIFm0KyeAzmPUept1-5LsmRJoQmkeGSS01p0SylOqUUMZZonVmeRHGSmVxaz7HMiGaEyOl0spyFMm5hUUJ1VjNk3OortYrcwGISJ4S465GNSNKWbZMeMZYW0vjVqR1SIKlhPaS4q6zxVKE3LEXUdpXOPuK0r51iHazNqWkxh_jWdgE8c01hI36f8xshD0T_tPcCuuBFsLgJCWX_174Fvb70_FIjAaT4RUcxK4kosjmaUA1f3s31xao5OrGO-InYpvnMg |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Analysis+of+cybersecurity+competencies%3A+Recommendations+for+telecommunications+policy&rft.jtitle=Telecommunications+policy&rft.au=Szczepaniuk%2C+Edyta+Karolina&rft.au=Szczepaniuk%2C+Hubert&rft.date=2022-04-01&rft.issn=0308-5961&rft.volume=46&rft.issue=3&rft.spage=102282&rft_id=info:doi/10.1016%2Fj.telpol.2021.102282&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_telpol_2021_102282 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0308-5961&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0308-5961&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0308-5961&client=summon |