Analysis of cybersecurity competencies: Recommendations for telecommunications policy

The paper aims to analyse and assess cybersecurity competencies and define the recommended solutions to improve the human factor in cybersecurity. The article presents the results of theoretical and empirical research that were carried out in 2019–2021. The research subject constitutes one of the pr...

Full description

Saved in:
Bibliographic Details
Published inTelecommunications policy Vol. 46; no. 3; p. 102282
Main Authors Szczepaniuk, Edyta Karolina, Szczepaniuk, Hubert
Format Journal Article
LanguageEnglish
Published Kidlington Elsevier Ltd 01.04.2022
Butterworth-Heinemann
Subjects
Online AccessGet full text

Cover

Loading…
Abstract The paper aims to analyse and assess cybersecurity competencies and define the recommended solutions to improve the human factor in cybersecurity. The article presents the results of theoretical and empirical research that were carried out in 2019–2021. The research subject constitutes one of the priorities of many countries and international organisations. Cybersecurity is one of the essential foundations for implementing the idea of sustainable development. A cybersecurity analysis using a layered structure was proposed in the theoretical part. Empirical research was conducted using a diagnostic poll method based on a survey. The presentation of the research results includes an analysis of statistical dependencies. The paper presents the research results on cybersecurity competencies in the field of threats to state cyberspace and methods of securing and protecting data. An important element of the research was to identify forms of education that can be used to achieve greater efficiency in increasing cybersecurity competencies. The result of the implementation of the research objectives was the development of recommended solutions facilitating the improvement of the human factor in the field of cybersecurity. •The survey results showed diverse cybersecurity competencies, which are an essential element of sustainable development.•The level of knowledge of cyber threats depends on education, age, and training.•The increase in knowledge about cyber threats positively correlates with the intensification of data protection methods used.•We examined the factors influencing the effectiveness of increasing cybersecurity competencies among employees.•Improving cybersecurity competencies can be achieved through education (courses, training, information campaigns).
AbstractList The paper aims to analyse and assess cybersecurity competencies and define the recommended solutions to improve the human factor in cybersecurity. The article presents the results of theoretical and empirical research that were carried out in 2019–2021. The research subject constitutes one of the priorities of many countries and international organisations. Cybersecurity is one of the essential foundations for implementing the idea of sustainable development. A cybersecurity analysis using a layered structure was proposed in the theoretical part. Empirical research was conducted using a diagnostic poll method based on a survey. The presentation of the research results includes an analysis of statistical dependencies. The paper presents the research results on cybersecurity competencies in the field of threats to state cyberspace and methods of securing and protecting data. An important element of the research was to identify forms of education that can be used to achieve greater efficiency in increasing cybersecurity competencies. The result of the implementation of the research objectives was the development of recommended solutions facilitating the improvement of the human factor in the field of cybersecurity. •The survey results showed diverse cybersecurity competencies, which are an essential element of sustainable development.•The level of knowledge of cyber threats depends on education, age, and training.•The increase in knowledge about cyber threats positively correlates with the intensification of data protection methods used.•We examined the factors influencing the effectiveness of increasing cybersecurity competencies among employees.•Improving cybersecurity competencies can be achieved through education (courses, training, information campaigns).
The paper aims to analyse and assess cybersecurity competencies and define the recommended solutions to improve the human factor in cybersecurity. The article presents the results of theoretical and empirical research that were carried out in 2019–2021. The research subject constitutes one of the priorities of many countries and international organisations. Cybersecurity is one of the essential foundations for implementing the idea of sustainable development. A cybersecurity analysis using a layered structure was proposed in the theoretical part. Empirical research was conducted using a diagnostic poll method based on a survey. The presentation of the research results includes an analysis of statistical dependencies. The paper presents the research results on cybersecurity competencies in the field of threats to state cyberspace and methods of securing and protecting data. An important element of the research was to identify forms of education that can be used to achieve greater efficiency in increasing cybersecurity competencies. The result of the implementation of the research objectives was the development of recommended solutions facilitating the improvement of the human factor in the field of cybersecurity.
ArticleNumber 102282
Author Szczepaniuk, Edyta Karolina
Szczepaniuk, Hubert
Author_xml – sequence: 1
  givenname: Edyta Karolina
  orcidid: 0000-0002-6707-2987
  surname: Szczepaniuk
  fullname: Szczepaniuk, Edyta Karolina
  email: e.szczepaniuk@law.mil.pl
  organization: Military University of Aviation – Lotnicza Akademia Wojskowa, Dywizjonu 303 No. 35 ST., 08-521, Dęblin, Poland
– sequence: 2
  givenname: Hubert
  orcidid: 0000-0001-7613-4281
  surname: Szczepaniuk
  fullname: Szczepaniuk, Hubert
  email: hubert_szczepaniuk@sggw.edu.pl
  organization: Warsaw University of Life Sciences – SGGW, Nowoursynowska 166 ST., 02-787, Warsaw, Poland
BookMark eNqFkMtqwzAQRUVJoUnaP-jC0LVTyZb8yKIQQl8QKJRmLeTxGGQcy5WUgv--StxVF-1qmMvcmblnQWa96ZGQW0ZXjLLsvl157AbTrRKasCAlSZFckDkr8jJOE1HMyJymtIhFmbErsnCupZTlrKRzst_0qhuddpFpIhgrtA7haLUfIzCHAT32oNGto3cM_QH7Wnltehc1xkbh6lk99hp-5PCFhvGaXDaqc3jzU5dk__T4sX2Jd2_Pr9vNLgbOhY8xV6CgFFzlmYCMi7zMU4CGZZyxqmoSWtdMpRxKjkpVUAlBVVlyzlIBrKrTJbmb9g7WfB7Redmaow2JnEyyEDZlacbDFJ-mwBrnLDZysPqg7CgZlSeAspUTQHkCKCeAwbb-ZQPtzzG9Vbr7z_wwmTHE_9JopQsce8BaWwQva6P_XvANsw6SuQ
CitedBy_id crossref_primary_10_1186_s13677_024_00630_y
crossref_primary_10_22139_jobs_1623655
crossref_primary_10_3390_en16010347
crossref_primary_10_1007_s43621_024_00754_w
crossref_primary_10_1108_JSIT_07_2023_0132
crossref_primary_10_3390_en17235871
crossref_primary_10_55676_asi_v3i1_32
crossref_primary_10_1108_JEIM_12_2023_0635
crossref_primary_10_21511_bbs_18_4__2023_05
Cites_doi 10.22215/timreview/835
10.14207/ejsd.2018.v7n4p171
10.1145/360303.360333
10.1016/j.heliyon.2017.e00346
10.1109/ACCESS.2021.3097144
10.1007/978-3-319-23570-7
ContentType Journal Article
Copyright 2021 The Authors
Copyright Butterworth-Heinemann Apr 2022
Copyright_xml – notice: 2021 The Authors
– notice: Copyright Butterworth-Heinemann Apr 2022
DBID 6I.
AAFTH
AAYXX
CITATION
7SP
7TQ
8BJ
8FD
DHY
DON
FQK
JBE
L7M
DOI 10.1016/j.telpol.2021.102282
DatabaseName ScienceDirect Open Access Titles
Elsevier:ScienceDirect:Open Access
CrossRef
Electronics & Communications Abstracts
PAIS Index
International Bibliography of the Social Sciences (IBSS)
Technology Research Database
PAIS International
PAIS International (Ovid)
International Bibliography of the Social Sciences
International Bibliography of the Social Sciences
Advanced Technologies Database with Aerospace
DatabaseTitle CrossRef
International Bibliography of the Social Sciences (IBSS)
Technology Research Database
Advanced Technologies Database with Aerospace
Electronics & Communications Abstracts
PAIS International
DatabaseTitleList
International Bibliography of the Social Sciences (IBSS)
DeliveryMethod fulltext_linktorsrc
Discipline Economics
EISSN 1879-3258
ExternalDocumentID 10_1016_j_telpol_2021_102282
S0308596121001865
GroupedDBID --K
--M
-~X
.~1
0R~
123
13V
1B1
1OL
1RT
1~.
1~5
29Q
4.4
457
4G.
5VS
6I.
7-5
71M
77K
8P~
9JN
9JO
AACTN
AAEDT
AAEDW
AAFJI
AAFTH
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AAXUO
AAYFN
ABBOA
ABFRF
ABJNI
ABKBG
ABMAC
ABMMH
ABMVD
ABXDB
ABYKQ
ACDAQ
ACGFO
ACGFS
ACHQT
ACHRH
ACNCT
ACNNM
ACNTT
ACRLP
ACZNC
ADBBV
ADEZE
ADIYS
ADJOM
ADMUD
AEBSH
AEFWE
AEKER
AENEX
AFKWA
AFTJW
AGHFR
AGJBL
AGUBO
AGUMN
AGYEJ
AHHHB
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
AKYCK
ALEQD
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOMHK
AOUOD
ASPBG
AVARZ
AVWKF
AXJTR
AZFZN
BKOJK
BKOMP
BLXMC
BNSAS
CS3
DU5
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
F5P
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-2
G-Q
GBLVA
GBOLZ
HMY
HVGLF
HZ~
H~9
IHE
J1W
KOM
M3Y
M41
MO0
MS~
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
PQQKQ
PRBVW
Q38
R2-
RIG
ROL
RPZ
RXW
SDF
SDG
SDP
SES
SEW
SPC
SPCBC
SSB
SSL
SSO
SSS
SSV
SSZ
T5K
TAE
TN5
U5U
WH7
WUQ
XFK
ZCA
~G-
AATTM
AAXKI
AAYWO
AAYXX
ABWVN
ACRPL
ACVFH
ADCNI
ADNMO
AEIPS
AEUPX
AFJKZ
AFPUW
AFXIZ
AGCQF
AGQPQ
AGRNS
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
BNPGV
CITATION
SSH
7SP
7TQ
8BJ
8FD
DHY
DON
EFKBS
FQK
JBE
L7M
ID FETCH-LOGICAL-c445t-e7acac954a765c6457973ccf16411bbf20dd1a34c94eaabcb550a9944135c1bd3
IEDL.DBID .~1
ISSN 0308-5961
IngestDate Sat Jul 26 02:54:33 EDT 2025
Thu Apr 24 22:55:59 EDT 2025
Tue Jul 01 00:16:37 EDT 2025
Fri Feb 23 02:41:10 EST 2024
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 3
Keywords Survey research
Cybersecurity
Cyber hygiene
Sustainability development
Competencies
Human factors
Language English
License This is an open access article under the CC BY-NC-ND license.
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c445t-e7acac954a765c6457973ccf16411bbf20dd1a34c94eaabcb550a9944135c1bd3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-6707-2987
0000-0001-7613-4281
OpenAccessLink https://www.sciencedirect.com/science/article/pii/S0308596121001865
PQID 2696131364
PQPubID 37342
ParticipantIDs proquest_journals_2696131364
crossref_primary_10_1016_j_telpol_2021_102282
crossref_citationtrail_10_1016_j_telpol_2021_102282
elsevier_sciencedirect_doi_10_1016_j_telpol_2021_102282
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2022-04-01
PublicationDateYYYYMMDD 2022-04-01
PublicationDate_xml – month: 04
  year: 2022
  text: 2022-04-01
  day: 01
PublicationDecade 2020
PublicationPlace Kidlington
PublicationPlace_xml – name: Kidlington
PublicationTitle Telecommunications policy
PublicationYear 2022
Publisher Elsevier Ltd
Butterworth-Heinemann
Publisher_xml – name: Elsevier Ltd
– name: Butterworth-Heinemann
References Szczepaniuk (bib53) 2019
Com/2020/0624 (bib5) 2020; Vol. 30
Vu, Hanafizadeh, Bohlin (bib57) 2020; 44
Graham, Denning (bib22) 1972
(bib39) 2008
(bib14) 2020
Harrison, Ruzzo, Ullman (bib24) 1976; 19
Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of the personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation) (O.J.EU L 119/1, 4.5.2016).
Geber, Geber, Volkamer (bib21) 2018; 77
Craigen, Diakun-Thibault, Purse (bib7) 2014; 4
Sienkiewicz (bib49) 1989
(bib10) 2017
(bib13) 2019
Vasiu, Vasiu (bib56) 2018; 7
Liu, Ning, Mu, Zheng, Zeng, Yang (bib33) July 2019; Vol. 96
Probst, Hunkel, Dieter, Bishop (bib42) 2010
JOIN (bib73) 2020
Henriksen-Bulmer, Faily, Jeary (bib25) 2019; Vol. 82
Szczepaniuk, Szczepaniuk, Rokicki, Klepacki (bib54) 2020; Vol. 90
(bib27) 2011
(bib12) 2019
Franke, Brynielsson (bib19) 2014; 46
Antonuci (bib1) 2017
Regulation (EU) 2019/881 of the European Parliament and of the Council of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013 (Cybersecurity Act) (Text with EEA relevance) (O.J. EU L 151, 7.6.2019).
Kalhoro, Rehman, Ponnusamy, Shaikh (bib29) 2021; 9
(bib60) 2020
(bib15) 2020
Directive (EU) 2016/1148 of the European Parliament and of the Council of 6. July 2016 concerning measures for a high common level of security of network and information systems across the Union (O.J. EU L 191/1, 19.7.2016).
Frauenstein, Flowerday (bib20) 2020; Vol. 94
Accessed 7 December 2020.
Sharma, Fantin, Prabhu, Guan, Dattakumar (bib48) 2016; 40
Bell, LaPadula (bib3) 1973; ume I
Kraemer, Pascale (bib32) 2003; 47
Person, Calic, Pattison, Butavisius, McComac, Zwaans (bib41) 2017; Vol. 66
Morgan (bib36) 2021
Hadlington (bib23) 2017; 3
Connolly, Wall (bib6) 2019; Vol. 87
Kim, Kim (bib30) 2018; Vol. 88
Sienkiewicz (bib50) 2013; 25 wykładów
Kosseff (bib31) 2019
Oxford Online Dictionary.
(bib55) 2017
Dodge, Carver, Ferguson (bib9) 2007; 26
(bib59) 2020
Whitman (bib61) 2018
(bib35) 2015
Wang (bib58) 2013
Newman (bib38) 2006
Europol (bib18) 2019
Schoon (bib47) 2009
Appiah-Otoo, Song (bib2) 2021; 45
(bib43) 2001
Robison, Crenshaw (bib46) 2002; 21
Biba (bib4) 1975
(bib26) 2012
(bib11) 2018
Refsdal, Soulhug, Stolen (bib44) 2015
Markopoulou, Papakonstantinou, de Her (bib34) 2019; Vol. 35
Singh (bib51) 2006
Cybersecurity Competency Model (bib8) 2019
Neigal, Claypoole, Waldfoogle, Acharya, Hancook (bib37) 2020; Vol. 92
Stouffer, Zimmerman, Tang, Lubell, Cichonski, McCarthy (bib52) 2017
Liu (10.1016/j.telpol.2021.102282_bib33) 2019; Vol. 96
Europol (10.1016/j.telpol.2021.102282_bib18) 2019
Stouffer (10.1016/j.telpol.2021.102282_bib52) 2017
Connolly (10.1016/j.telpol.2021.102282_bib6) 2019; Vol. 87
Vasiu (10.1016/j.telpol.2021.102282_bib56) 2018; 7
(10.1016/j.telpol.2021.102282_bib11) 2018
Schoon (10.1016/j.telpol.2021.102282_bib47) 2009
Robison (10.1016/j.telpol.2021.102282_bib46) 2002; 21
Kim (10.1016/j.telpol.2021.102282_bib30) 2018; Vol. 88
Com/2020/0624 (10.1016/j.telpol.2021.102282_bib5) 2020; Vol. 30
(10.1016/j.telpol.2021.102282_bib35) 2015
(10.1016/j.telpol.2021.102282_bib59) 2020
Szczepaniuk (10.1016/j.telpol.2021.102282_bib53) 2019
Sienkiewicz (10.1016/j.telpol.2021.102282_bib50) 2013; 25 wykładów
Morgan (10.1016/j.telpol.2021.102282_bib36) 2021
Wang (10.1016/j.telpol.2021.102282_bib58) 2013
Dodge (10.1016/j.telpol.2021.102282_bib9) 2007; 26
Cybersecurity Competency Model (10.1016/j.telpol.2021.102282_bib8) 2019
Frauenstein (10.1016/j.telpol.2021.102282_bib20) 2020; Vol. 94
Newman (10.1016/j.telpol.2021.102282_bib38) 2006
Szczepaniuk (10.1016/j.telpol.2021.102282_bib54) 2020; Vol. 90
(10.1016/j.telpol.2021.102282_bib43) 2001
Kraemer (10.1016/j.telpol.2021.102282_bib32) 2003; 47
10.1016/j.telpol.2021.102282_bib69
Probst (10.1016/j.telpol.2021.102282_bib42) 2010
Craigen (10.1016/j.telpol.2021.102282_bib7) 2014; 4
(10.1016/j.telpol.2021.102282_bib39) 2008
Whitman (10.1016/j.telpol.2021.102282_bib61) 2018
Person (10.1016/j.telpol.2021.102282_bib41) 2017; Vol. 66
Geber (10.1016/j.telpol.2021.102282_bib21) 2018; 77
(10.1016/j.telpol.2021.102282_bib26) 2012
Hadlington (10.1016/j.telpol.2021.102282_bib23) 2017; 3
10.1016/j.telpol.2021.102282_bib71
(10.1016/j.telpol.2021.102282_bib10) 2017
Neigal (10.1016/j.telpol.2021.102282_bib37) 2020; Vol. 92
10.1016/j.telpol.2021.102282_bib72
Franke (10.1016/j.telpol.2021.102282_bib19) 2014; 46
Antonuci (10.1016/j.telpol.2021.102282_bib1) 2017
Kalhoro (10.1016/j.telpol.2021.102282_bib29) 2021; 9
Refsdal (10.1016/j.telpol.2021.102282_bib44) 2015
Appiah-Otoo (10.1016/j.telpol.2021.102282_bib2) 2021; 45
(10.1016/j.telpol.2021.102282_bib13) 2019
(10.1016/j.telpol.2021.102282_bib14) 2020
Graham (10.1016/j.telpol.2021.102282_bib22) 1972
Biba (10.1016/j.telpol.2021.102282_bib4) 1975
Sharma (10.1016/j.telpol.2021.102282_bib48) 2016; 40
Henriksen-Bulmer (10.1016/j.telpol.2021.102282_bib25) 2019; Vol. 82
(10.1016/j.telpol.2021.102282_bib27) 2011
Harrison (10.1016/j.telpol.2021.102282_bib24) 1976; 19
JOIN (10.1016/j.telpol.2021.102282_bib73) 2020
(10.1016/j.telpol.2021.102282_bib55) 2017
Bell (10.1016/j.telpol.2021.102282_bib3) 1973; ume I
10.1016/j.telpol.2021.102282_bib40
Kosseff (10.1016/j.telpol.2021.102282_bib31) 2019
Vu (10.1016/j.telpol.2021.102282_bib57) 2020; 44
(10.1016/j.telpol.2021.102282_bib15) 2020
(10.1016/j.telpol.2021.102282_bib12) 2019
Singh (10.1016/j.telpol.2021.102282_bib51) 2006
Markopoulou (10.1016/j.telpol.2021.102282_bib34) 2019; Vol. 35
(10.1016/j.telpol.2021.102282_bib60) 2020
Sienkiewicz (10.1016/j.telpol.2021.102282_bib49) 1989
References_xml – year: 2009
  ident: bib47
  article-title: Measuring social competencies. (RatSWD Working Paper Series, 58). Berlin: Rat für Sozial - und Wirtschaftsdaten (RatSWD)
– year: 2020
  ident: bib73
  article-title: 18. Joint Communication to the European Parliament and the Council the EU’S. Cybersecurity Strategy for the Digital Decade. Brussels
– volume: 21
  start-page: 334
  year: 2002
  end-page: 363
  ident: bib46
  article-title: Post-industrial transformations and cyber-space: A cross-national analysis of internet development. Social science research
  publication-title: Elsevier
– year: 2018
  ident: bib11
  article-title: Analysis of the European R&D priorities in cybersecurity Strategic priorities in cybersecurity for a safer Europe
– volume: Vol. 87
  year: 2019
  ident: bib6
  article-title: The rise of crypto-ransomware in a changing cybercrime landscape: Taxonomising countermeasures
  publication-title: Computers & security
– year: 2013
  ident: bib58
  article-title: Assessment of cybersecurity knowledge and Behavior:an anti -phishingScenario .IC
– year: 2019
  ident: bib13
  article-title: Cybersecurity Culture Guidelines: Behavioural aspects of cybersecurity
– volume: Vol. 30
  year: 2020
  ident: bib5
  publication-title: Communication from the Commission to the European Parliament, the Council, the European economic and social Committee and the Committee of the Regions digital education action plan 2021-2027
– year: 1989
  ident: bib49
  article-title: Systemy kierowania
– year: 2017
  ident: bib52
  article-title: Cybersecurity Framework Manufacturing profile
– volume: Vol. 90
  year: 2020
  ident: bib54
  publication-title: Information security assessment in public administration. Computers & Security
– volume: 19
  start-page: 461
  year: 1976
  end-page: 471
  ident: bib24
  article-title: Protection in operating systems
  publication-title: Communications of the ACM
– reference: Regulation (EU) 2019/881 of the European Parliament and of the Council of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013 (Cybersecurity Act) (Text with EEA relevance) (O.J. EU L 151, 7.6.2019).
– year: 2001
  ident: bib43
  publication-title: Competence in the learning society
– year: 2011
  ident: bib27
  publication-title: Cyber Criminology: Exploring Internet Crimes and Criminal behavior
– reference: Accessed 7 December 2020.
– volume: 46
  start-page: 18
  year: 2014
  end-page: 31
  ident: bib19
  article-title: Cyber situational awareness - a systematic review of the literature. Computers & Security
  publication-title: Elsevier
– volume: 25 wykładów
  year: 2013
  ident: bib50
– year: 2015
  ident: bib44
  article-title: Cybersecurity. Cyber-risk management. SpringerBriefs in computer science
– volume: 3
  year: 2017
  ident: bib23
  article-title: Human factors in cybersecurity; examining the link between Internetaddiction, impulsivity, attitudes towards cybersecurity, and risky cybersecurity behaviours
  publication-title: Heliyon
– volume: 40
  start-page: 628
  year: 2016
  end-page: 643
  ident: bib48
  article-title: Digital literacy and knowledge societies: A grounded theory investigation of sustainable development. Telecommunications policy
  publication-title: Elsevier
– year: 2021
  ident: bib36
  article-title: Report: Cyberwarfare in the C-suite
– year: 2019
  ident: bib8
  article-title: Employment and training Administration
– volume: 7
  start-page: 171
  year: 2018
  end-page: 178
  ident: bib56
  article-title: Cybersecurity as an essential sustainable economic development factor
  publication-title: European Journal of Sustainable Development
– year: 2020
  ident: bib60
  article-title: The future of Jobs report 2020
– year: 2020
  ident: bib15
  article-title: Cybersecurity skills development in the EU
– year: 2020
  ident: bib59
  article-title: The global risks report 2020
– reference: Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of the personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation) (O.J.EU L 119/1, 4.5.2016).
– volume: 26
  start-page: 73
  year: 2007
  end-page: 80
  ident: bib9
  article-title: Phishing for user security awareness. Computers & Security
  publication-title: Elsevier
– volume: Vol. 35
  year: 2019
  ident: bib34
  article-title: The new EU cybersecurity framework: The NIS Directive, ENISA's role and the General Data Protection Regulation
  publication-title: Computer law & security review
– volume: 44
  year: 2020
  ident: bib57
  article-title: ICT as a driver of economic growth: A survey of the literature and directions for future research. Telecommunications policy
  publication-title: Elsevier
– volume: Vol. 96
  start-page: 678
  year: July 2019
  end-page: 691
  ident: bib33
  article-title: (2019). A review of the smart world
  publication-title: Future generation computer systems
– year: 2019
  ident: bib53
  article-title: Efektywność kształcenie e-learningowego w Polsce
– year: 2006
  ident: bib51
  article-title: Fundamental of research methodology and Statistics
– volume: ume I
  year: 1973
  ident: bib3
  publication-title: Secure computer systems: Mathematical foundations
– start-page: 417
  year: 1972
  end-page: 429
  ident: bib22
  article-title: Protection: Principles and practice
  publication-title: Proceedings of the may 16-18, 1972, Spring Joint computer conference
– year: 2015
  ident: bib35
  publication-title: The Smart revolution towards the sustainable digital society: Beyond the Era of Convergence
– volume: Vol. 82
  start-page: 270
  year: 2019
  end-page: 288
  ident: bib25
  article-title: Privacy risk assessment in context: A meta-model based on contextual integrity
  publication-title: Computers & security
– volume: 45
  year: 2021
  ident: bib2
  article-title: The impact of ICT on economic growth-Comparing rich and poor countries. Telecommunications Policy
  publication-title: Elsevier
– volume: Vol. 88
  start-page: 143
  year: 2018
  end-page: 152
  ident: bib30
  article-title: Factors influencing willingness to provide personal information for personalised recommendations
  publication-title: Computers in human behavior
– reference: Directive (EU) 2016/1148 of the European Parliament and of the Council of 6. July 2016 concerning measures for a high common level of security of network and information systems across the Union (O.J. EU L 191/1, 19.7.2016).
– year: 2019
  ident: bib12
  article-title: Threat Landscape report 2018
– year: 2017
  ident: bib10
  article-title: Stock taking of information security training needs in critical sectors
– volume: 4
  start-page: 13
  year: 2014
  end-page: 21
  ident: bib7
  article-title: Defining cybersecurity
  publication-title: Technol. Innov. Manag. Rev.′
– year: 1975
  ident: bib4
  article-title: Integrity considerations for secure computer systems
– year: 2018
  ident: bib61
  article-title: Industry priorities for cybersecurity competencies
  publication-title: J. Colloq. Inform. Syst. Secur. Edu. Edition 6
– year: 2020
  ident: bib14
  article-title: ECSM ECSM Deployment report 2019
– year: 2010
  ident: bib42
  article-title: Insider threats in cyber security
– year: 2012
  ident: bib26
  article-title: Information technology – security techniques – Guides for cybersecurity
– start-page: 68
  year: 2006
  end-page: 78
  ident: bib38
  article-title: Cybercrime, identity theft, and fraud: Practicing safe internet - network security threats and vulnerabilities
  publication-title: Proceedings of the 3rd annual conference on Information security curriculum development (InfoSecCD '06)
– volume: Vol. 94
  year: 2020
  ident: bib20
  article-title: Susceptibility to phishing on social network sites: A personality information processing model
  publication-title: Computers & security
– volume: Vol. 66
  start-page: 40
  year: 2017
  end-page: 51
  ident: bib41
  article-title: The human aspects of information security questionnaire (HAIS-Q): Two further validation studies
  publication-title: Computers & security
– year: 2019
  ident: bib31
  article-title: Cybersecurity law
– volume: Vol. 92
  year: 2020
  ident: bib37
  article-title: Holistic cyber hygiene education: Accounting for the human factors
  publication-title: Computers & security
– volume: 9
  start-page: 99339
  year: 2021
  end-page: 99363
  ident: bib29
  article-title: Extracting key factors of cyber hygiene behaviour among software engineers: A systematic literature review
  publication-title: IEEE Access
– volume: 47
  start-page: 1389
  year: 2003
  end-page: 1393
  ident: bib32
  article-title: A human factors vulnerability evaluation method for computer and information security. Human Factors and Ergonomics Society Annual Meeting Proceedings
  publication-title: Sage
– volume: 77
  start-page: 226
  year: 2018
  end-page: 261
  ident: bib21
  article-title: Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior. Computers & security
  publication-title: Elsevier
– year: 2008
  ident: bib39
  article-title: National security Presidential directive/NSPD-54. National security Presidential directive/NSPD-23
– reference: Oxford Online Dictionary.
– year: 2017
  ident: bib55
  article-title: Report of the Committee on the future Economy. Pioneers of the next generation
– year: 2019
  ident: bib18
  article-title: Internet organised Crime Thread assessment (IOCTA). Europol. European cybercrime Centre. The Hauge
– year: 2017
  ident: bib1
  article-title: The cyber risk Handbook: Creating and Measurning effective cybersecurity capabilities
– volume: 4
  start-page: 13
  issue: Number 10
  year: 2014
  ident: 10.1016/j.telpol.2021.102282_bib7
  article-title: Defining cybersecurity
  publication-title: Technol. Innov. Manag. Rev.′
  doi: 10.22215/timreview/835
– year: 2019
  ident: 10.1016/j.telpol.2021.102282_bib12
– year: 2017
  ident: 10.1016/j.telpol.2021.102282_bib55
– year: 2017
  ident: 10.1016/j.telpol.2021.102282_bib52
– year: 2008
  ident: 10.1016/j.telpol.2021.102282_bib39
– volume: 47
  start-page: 1389
  issue: 12
  year: 2003
  ident: 10.1016/j.telpol.2021.102282_bib32
  article-title: A human factors vulnerability evaluation method for computer and information security. Human Factors and Ergonomics Society Annual Meeting Proceedings
  publication-title: Sage
– year: 2012
  ident: 10.1016/j.telpol.2021.102282_bib26
– volume: 40
  start-page: 628
  issue: 7
  year: 2016
  ident: 10.1016/j.telpol.2021.102282_bib48
  article-title: Digital literacy and knowledge societies: A grounded theory investigation of sustainable development. Telecommunications policy
  publication-title: Elsevier
– volume: 44
  issue: Issue 2
  year: 2020
  ident: 10.1016/j.telpol.2021.102282_bib57
  article-title: ICT as a driver of economic growth: A survey of the literature and directions for future research. Telecommunications policy
  publication-title: Elsevier
– start-page: 68
  year: 2006
  ident: 10.1016/j.telpol.2021.102282_bib38
  article-title: Cybercrime, identity theft, and fraud: Practicing safe internet - network security threats and vulnerabilities
– volume: 7
  start-page: 171
  issue: Number 4
  year: 2018
  ident: 10.1016/j.telpol.2021.102282_bib56
  article-title: Cybersecurity as an essential sustainable economic development factor
  publication-title: European Journal of Sustainable Development
  doi: 10.14207/ejsd.2018.v7n4p171
– volume: ume I
  year: 1973
  ident: 10.1016/j.telpol.2021.102282_bib3
– year: 2017
  ident: 10.1016/j.telpol.2021.102282_bib1
– ident: 10.1016/j.telpol.2021.102282_bib69
– year: 2015
  ident: 10.1016/j.telpol.2021.102282_bib35
– year: 2011
  ident: 10.1016/j.telpol.2021.102282_bib27
– year: 2001
  ident: 10.1016/j.telpol.2021.102282_bib43
– volume: 19
  start-page: 461
  year: 1976
  ident: 10.1016/j.telpol.2021.102282_bib24
  article-title: Protection in operating systems
  publication-title: Communications of the ACM
  doi: 10.1145/360303.360333
– year: 2006
  ident: 10.1016/j.telpol.2021.102282_bib51
– year: 2020
  ident: 10.1016/j.telpol.2021.102282_bib59
– volume: 3
  issue: 7
  year: 2017
  ident: 10.1016/j.telpol.2021.102282_bib23
  article-title: Human factors in cybersecurity; examining the link between Internetaddiction, impulsivity, attitudes towards cybersecurity, and risky cybersecurity behaviours
  publication-title: Heliyon
  doi: 10.1016/j.heliyon.2017.e00346
– volume: Vol. 90
  year: 2020
  ident: 10.1016/j.telpol.2021.102282_bib54
– year: 2021
  ident: 10.1016/j.telpol.2021.102282_bib36
– year: 2013
  ident: 10.1016/j.telpol.2021.102282_bib58
– issue: 1
  year: 2018
  ident: 10.1016/j.telpol.2021.102282_bib61
  article-title: Industry priorities for cybersecurity competencies
  publication-title: J. Colloq. Inform. Syst. Secur. Edu. Edition 6
– volume: 46
  start-page: 18
  issue: October
  year: 2014
  ident: 10.1016/j.telpol.2021.102282_bib19
  article-title: Cyber situational awareness - a systematic review of the literature. Computers & Security
  publication-title: Elsevier
– volume: Vol. 94
  year: 2020
  ident: 10.1016/j.telpol.2021.102282_bib20
  article-title: Susceptibility to phishing on social network sites: A personality information processing model
– volume: 25 wykładów
  year: 2013
  ident: 10.1016/j.telpol.2021.102282_bib50
– year: 2020
  ident: 10.1016/j.telpol.2021.102282_bib15
– volume: Vol. 92
  year: 2020
  ident: 10.1016/j.telpol.2021.102282_bib37
  article-title: Holistic cyber hygiene education: Accounting for the human factors
– volume: Vol. 30
  year: 2020
  ident: 10.1016/j.telpol.2021.102282_bib5
– volume: Vol. 66
  start-page: 40
  year: 2017
  ident: 10.1016/j.telpol.2021.102282_bib41
  article-title: The human aspects of information security questionnaire (HAIS-Q): Two further validation studies
– year: 2019
  ident: 10.1016/j.telpol.2021.102282_bib53
– volume: 77
  start-page: 226
  issue: August
  year: 2018
  ident: 10.1016/j.telpol.2021.102282_bib21
  article-title: Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior. Computers & security
  publication-title: Elsevier
– ident: 10.1016/j.telpol.2021.102282_bib72
– volume: 45
  issue: Issue 2
  year: 2021
  ident: 10.1016/j.telpol.2021.102282_bib2
  article-title: The impact of ICT on economic growth-Comparing rich and poor countries. Telecommunications Policy
  publication-title: Elsevier
– year: 2020
  ident: 10.1016/j.telpol.2021.102282_bib73
– volume: 9
  start-page: 99339
  year: 2021
  ident: 10.1016/j.telpol.2021.102282_bib29
  article-title: Extracting key factors of cyber hygiene behaviour among software engineers: A systematic literature review
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2021.3097144
– year: 2015
  ident: 10.1016/j.telpol.2021.102282_bib44
  doi: 10.1007/978-3-319-23570-7
– year: 2020
  ident: 10.1016/j.telpol.2021.102282_bib14
– year: 1989
  ident: 10.1016/j.telpol.2021.102282_bib49
– start-page: 417
  year: 1972
  ident: 10.1016/j.telpol.2021.102282_bib22
  article-title: Protection: Principles and practice
– volume: Vol. 82
  start-page: 270
  year: 2019
  ident: 10.1016/j.telpol.2021.102282_bib25
  article-title: Privacy risk assessment in context: A meta-model based on contextual integrity
– year: 2019
  ident: 10.1016/j.telpol.2021.102282_bib8
– volume: 26
  start-page: 73
  issue: 1
  year: 2007
  ident: 10.1016/j.telpol.2021.102282_bib9
  article-title: Phishing for user security awareness. Computers & Security
  publication-title: Elsevier
– year: 2019
  ident: 10.1016/j.telpol.2021.102282_bib13
– year: 2018
  ident: 10.1016/j.telpol.2021.102282_bib11
– year: 2017
  ident: 10.1016/j.telpol.2021.102282_bib10
– year: 2020
  ident: 10.1016/j.telpol.2021.102282_bib60
– year: 2009
  ident: 10.1016/j.telpol.2021.102282_bib47
– ident: 10.1016/j.telpol.2021.102282_bib40
– year: 2019
  ident: 10.1016/j.telpol.2021.102282_bib18
– volume: Vol. 96
  start-page: 678
  year: 2019
  ident: 10.1016/j.telpol.2021.102282_bib33
  article-title: (2019). A review of the smart world
– ident: 10.1016/j.telpol.2021.102282_bib71
– year: 1975
  ident: 10.1016/j.telpol.2021.102282_bib4
– year: 2010
  ident: 10.1016/j.telpol.2021.102282_bib42
– year: 2019
  ident: 10.1016/j.telpol.2021.102282_bib31
– volume: Vol. 87
  year: 2019
  ident: 10.1016/j.telpol.2021.102282_bib6
  article-title: The rise of crypto-ransomware in a changing cybercrime landscape: Taxonomising countermeasures
– volume: Vol. 35
  year: 2019
  ident: 10.1016/j.telpol.2021.102282_bib34
  article-title: The new EU cybersecurity framework: The NIS Directive, ENISA's role and the General Data Protection Regulation
– volume: Vol. 88
  start-page: 143
  year: 2018
  ident: 10.1016/j.telpol.2021.102282_bib30
  article-title: Factors influencing willingness to provide personal information for personalised recommendations
– volume: 21
  start-page: 334
  issue: 3
  year: 2002
  ident: 10.1016/j.telpol.2021.102282_bib46
  article-title: Post-industrial transformations and cyber-space: A cross-national analysis of internet development. Social science research
  publication-title: Elsevier
SSID ssj0017190
Score 2.3659275
Snippet The paper aims to analyse and assess cybersecurity competencies and define the recommended solutions to improve the human factor in cybersecurity. The article...
SourceID proquest
crossref
elsevier
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 102282
SubjectTerms Academic achievement
Competence
Competencies
Computer security
Cyber hygiene
Cybersecurity
Empirical analysis
Human factors
International organizations
Internet
Research methodology
Research subjects
Survey research
Sustainability development
Sustainable development
Telecommunications
Telecommunications policy
Title Analysis of cybersecurity competencies: Recommendations for telecommunications policy
URI https://dx.doi.org/10.1016/j.telpol.2021.102282
https://www.proquest.com/docview/2696131364
Volume 46
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSwMxEA6lHvQiPvFRSw5eY5vdZLPxVoqlKvaihd5Ckmah0hfuevDibzfJJkUFKXhdkrBMZifft5n5BoDrTNK0qwtLcowukI1-EuWSY8SMJSuWjSnjpZSeRtlwTB4mdNIA_VgL49IqQ-yvY7qP1uFJJ1izs57NOs9OaYVyr4DVxXnmCs0JYc7Lbz43aR6Y4fo_ix2M3OhYPudzvCozX6_cBUSCnYZBkid_HU-_ArU_fQYHYD_ARtir3-wQNMzyCOzGquLyGIyjughcFVB_KIvqQmc6qCM0tqT4Fjq-uViY0EuphBa0wso1w_leKVLCtdcLPgHjwd1Lf4hCywSkCaEVMkxqqTklkmVUZ4QyzlKtC0uKMFaqSLrTKZYp0ZwYKZVWlqBIzi0mSqnGapqeguZytTRnABLJM2LcvahmRClLlQkvGMu1NG5Feg7SaCmhg564a2sxFzFx7FXU9hXOvqK27zlAm1nrWk9jy3gWN0H88AthQ_6Wma24ZyJ8l6Ww7mfxC04zcvHvhS_BXuJqIHz6Tgs0q7d3c2WRSaXa3vXaYKd3_zgcfQGK3uSB
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1NTwIxEJ0gHPRi_Iwoag9eN9Dddku9ESIB-bgIibemLd0Eg0BkPfjvbXdboibGxOumbTbT2el725k3AHeppElLZ5bkGJ1FNvrJqC05jpixZMWyMWUKKaXxJO3PyOMzfa5AN9TCuLRKH_vLmF5Ea_-k6a3Z3CwWzSentEJ5oYDVwu2U7kHNqVPRKtQ6g2F_srtMYLj81WLHR25CqKAr0rxys9ys3R1EjJ2MQdyOfzuhfsTq4gDqHcGhR46oU77cMVTM6gT2Q2Hx9hRmQWAErTOkP5QFdr45HdIBHVtefI8c5Xx9Nb6d0hZZ3Ipy1w_na7HIFm0KyeAzmPUept1-5LsmRJoQmkeGSS01p0SylOqUUMZZonVmeRHGSmVxaz7HMiGaEyOl0spyFMm5hUUJ1VjNk3OortYrcwGISJ4S465GNSNKWbZMeMZYW0vjVqR1SIKlhPaS4q6zxVKE3LEXUdpXOPuK0r51iHazNqWkxh_jWdgE8c01hI36f8xshD0T_tPcCuuBFsLgJCWX_174Fvb70_FIjAaT4RUcxK4kosjmaUA1f3s31xao5OrGO-InYpvnMg
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Analysis+of+cybersecurity+competencies%3A+Recommendations+for+telecommunications+policy&rft.jtitle=Telecommunications+policy&rft.au=Szczepaniuk%2C+Edyta+Karolina&rft.au=Szczepaniuk%2C+Hubert&rft.date=2022-04-01&rft.issn=0308-5961&rft.volume=46&rft.issue=3&rft.spage=102282&rft_id=info:doi/10.1016%2Fj.telpol.2021.102282&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_telpol_2021_102282
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0308-5961&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0308-5961&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0308-5961&client=summon