A Performance Analysis Model for the Training and Education of Information Security Talents

There are many defects with the existing performance analysis system for the training and education (T&E) of information security talents in Chinese colleges, ranging from the difficulty in transforming fuzzy information to the lack of objectivity. To overcome these defects, this paper develops an improved performance analysis model for the T&E of information security talents. Firstly, the existing analysis strategies for the T&E performance of information security talents were fully analyzed, and a performance analysis indicator system was established through the analysis. Based on the established indicator system, the gray classification and fuzzy information transformation were discussed for the performance analysis. On this basis, a grey clustering model for the T&E of information security talents was constructed, and the realization of the corresponding algorithm was explained in details. The proposed model was proved feasible and effective through case analysis. In addition to theoretical innovation, our model also has a great potential in engineering, because the solving algorithm can effectively process fuzzy information with only a small sample set.

[1]  Jia Xu,et al.  Application of a Genetic Algorithm with Random Crossover and Dynamic Mutation on the Travelling Salesman Problem , 2018 .

[2]  Atanu Das,et al.  Educational Website Ranking Using Fuzzy Logic and K-Means Clustering Based Hybrid Method , 2019, Ingénierie des Systèmes d Inf..

[3]  Hwai-En Tseng,et al.  A Block-based genetic algorithm for disassembly sequence planning , 2018, Expert Syst. Appl..

[4]  Angraini,et al.  Information Security Policy Compliance: Systematic Literature Review , 2019, Procedia Computer Science.

[5]  InduShobha N. Chengalur-Smith,et al.  Evaluating the effectiveness of learner controlled information security training , 2019, Computers & security.

[6]  Tal Melamed An active man-in-the-middle attack on bluetooth smart devices , 2018 .

[7]  Wen-Hsiang Wu,et al.  Applying hierarchical grey relation clustering analysis to geographical information systems - A case study of the hospitals in Taipei City , 2012, Expert Syst. Appl..

[8]  Mariia Rochikashvili,et al.  Multi-criteria Decision-making for Sustainable Wall Paints and Coatings Using Analytic Hierarchy Process , 2016 .

[9]  Lucía Melián-Alzola,et al.  Information technology capability and organisational agility: A study in the Canary Islands hotel industry , 2020, Tourism Management Perspectives.

[10]  Marco A. Moreno-Armendáriz,et al.  An Analytical Hierarchy Process to manage water quality in white fish (Chirostoma estor estor) intensive culture , 2019, Comput. Electron. Agric..

[11]  Dobroslav Grygar,et al.  An Efficient Adjustment of Genetic Algorithm for Pareto Front Determination , 2019 .

[12]  Ali Eydgahi,et al.  Evaluating the explanatory power of theoretical frameworks on intention to comply with information security policies in higher education , 2019, Comput. Secur..

[13]  Saudah Sofian,et al.  The impact of enterprise risk management on competitive advantage by moderating role of information technology , 2019, Comput. Stand. Interfaces.

[14]  Seniye Ümit Oktay Fırat,et al.  Evaluation of the development level of provinces by grey cluster analysis , 2019 .

[15]  Gurcan Comert,et al.  Short-term freeway traffic parameter prediction: Application of grey system theory models , 2016, Expert Syst. Appl..

[16]  Ahmed Tealab,et al.  Time series forecasting using artificial neural networks methodologies: A systematic review , 2018, Future Computing and Informatics Journal.

[17]  Muammer Kaya,et al.  Leaching method selection for Caldag lateritic nickel ore by the analytic hierarchy process (AHP) , 2017 .

[18]  P. Loesche,et al.  Estimating the true extent of gender differences in scholastic achievement: A neural network approach , 2019, Intelligence.

[19]  R. Rajesh,et al.  Measuring the barriers to resilience in manufacturing supply chains using Grey Clustering and VIKOR approaches , 2018, Measurement.

[20]  Ivano Bongiovanni,et al.  The least secure places in the universe? A systematic literature review on information security management in higher education , 2019, Comput. Secur..

[21]  J. Caballero,et al.  The role of self-efficacy, flexibility, and gender in pharmacy students' health information technology readiness. , 2019, Currents in pharmacy teaching & learning.

[22]  Mita Nasipuri,et al.  Reshaping inputs for convolutional neural network: Some common and uncommon methods , 2019, Pattern Recognit..

[23]  Murat Koyuncu,et al.  Understanding key skills for information security managers , 2018, Int. J. Inf. Manag..