Knowledge management of cyber security expertise: an ontological approach to talent discovery

Cyber security is a dynamic knowledge environment, where attracting talented people is paramount. However, current initiatives do not always use mechanisms able to search for suited individuals. Approaching cyber security as an organisation can help to manage capabilities and improve domain-oriented talent discovery. This paper presents an ontological approach to support talent discovery as a means of improving allocation of expertise for cyber security projects. A case study is conducted among experts in a cyber security community. Our method is capable of selecting, ranking and evaluating experts given a set of criteria specified in a project profile. The approach combines values of quantitative and qualitative nature provided by the profile owner and derived from external appraisals. Further, the ontology model delivers a systematic integration of talent practices, which embeds a feedback loop that favours ongoing continuous improvement. The model was successfully experimented and further appraised in terms of acceptance by a board of experts.

[1]  Jennifer E. Rowley,et al.  The wisdom hierarchy: representations of the DIKW hierarchy , 2007, J. Inf. Sci..

[2]  Robert E. Lewis,et al.  Talent management: A critical review , 2006 .

[3]  John S. Liu,et al.  Research fronts in data envelopment analysis , 2016 .

[4]  James Conrad Seeking help: the important role of ethical hackers , 2012, Netw. Secur..

[5]  Asunción Gómez-Pérez,et al.  Methodologies, tools and languages for building ontologies: Where is their meeting point? , 2003, Data Knowl. Eng..

[6]  Gabriella Pasi,et al.  Personal ontologies: Generation of user profiles based on the YAGO ontology , 2013, Inf. Process. Manag..

[7]  Dorothy E. Leidner,et al.  Review: Knowledge Management and Knowledge Management Systems: Conceptual Foundations and Research Issues , 2001, MIS Q..

[8]  Thompson S. H. Teo Meeting the challenges of knowledge management at the Housing and Development Board , 2005, Decis. Support Syst..

[9]  Kamel Mellahi,et al.  Strategic talent management: A review and research agenda , 2009 .

[10]  Kieron O'Hara,et al.  Editorial: Knowledge representation with ontologies: Present challenges-Future possibilities , 2007 .

[11]  W. A. Schiemann From talent management to talent optimization , 2014 .

[12]  Nicola Zannone,et al.  A reference model for reputation systems , 2014, Decis. Support Syst..

[13]  Lawrence M. Seiford,et al.  Data envelopment analysis (DEA) - Thirty years on , 2009, Eur. J. Oper. Res..

[14]  John Grundy,et al.  Performance appraisal of software testers , 2014, Inf. Softw. Technol..

[15]  R. Bone Discovery , 1938, Nature.

[16]  Rossouw von Solms,et al.  From information security to cyber security , 2013, Comput. Secur..

[17]  Kecheng Liu,et al.  Understanding the roles of signs and norms in organizations - a semiotic approach to information systems design , 2000, Behav. Inf. Technol..

[18]  B. Fruytier,et al.  Talent management and the relevance of context: Towards a pluralistic approach , 2013 .

[19]  Kecheng Liu,et al.  Semiotics in Information Systems Engineering , 2000 .

[20]  Hung-Tso Lin,et al.  Personnel selection using analytic network process and fuzzy data envelopment analysis approaches , 2010, Comput. Ind. Eng..

[21]  Nicky Dries,et al.  What is the meaning of ‘talent’ in the world of work? , 2013 .

[22]  Heiner Stuckenschmidt,et al.  Handbook on Ontologies , 2004, Künstliche Intell..

[23]  H.A.M. Luiijf,et al.  National Cyber Security Framework Manual , 2013 .

[24]  R. Schuler,et al.  Global talent management: Literature review, integrative framework, and suggestions for further research , 2010 .

[25]  Iuon-Chang Lin,et al.  A fair reputation system for use in online auctions , 2015 .

[26]  Ramón Hermoso,et al.  From blurry numbers to clear preferences: A mechanism to extract reputation in social networks , 2014, Expert Syst. Appl..

[27]  T. L. Saaty A Scaling Method for Priorities in Hierarchical Structures , 1977 .

[28]  Lily Sun,et al.  Talent discovery for cyber security: An organisational perspective , 2015, 2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA).

[29]  Tracey Caldwell,et al.  Plugging the cyber-security skills gap , 2013 .

[30]  A. Kaplan,et al.  Users of the world, unite! The challenges and opportunities of Social Media , 2010 .

[31]  Ivana Pais,et al.  Predictors of job seekers' self-disclosure on social media , 2015, Comput. Hum. Behav..

[32]  X. T. Wang,et al.  Trust or not: Heuristics for making trust-based choices in HR management , 2014 .

[33]  Mohammed Alsaigh,et al.  Information analytics for healthcare service discovery. , 2014, Journal of healthcare engineering.