Talent discovery for cyber security: An organisational perspective

The impact of cyber threats in society has led to a joint effort between public and private sector. Some of the major claims in cyber security initiatives involve attracting talented people and leveraging required skills. Thus, talent and knowledge management play a key role in selecting and maintaining the required expertise. However, a novel approach is required to integrate talent management across organisational partnerships in the dynamic cyber security domain. This work entails viewing cyber security as an information system in order to better understand the challenges of talent discovery and managing skills within its complex environment.

[1]  Kim-Kwang Raymond Choo,et al.  The cyber threat landscape: Challenges and future research directions , 2011, Comput. Secur..

[2]  James Conrad Seeking help: the important role of ethical hackers , 2012, Netw. Secur..

[3]  Thomas R. Gruber,et al.  A translation approach to portable ontology specifications , 1993, Knowl. Acquis..

[4]  Lawrence M. Seiford,et al.  Data envelopment analysis (DEA) - Thirty years on , 2009, Eur. J. Oper. Res..

[5]  Kecheng Liu,et al.  Semiotics in Information Systems Engineering , 2000 .

[6]  Hung-Tso Lin,et al.  Personnel selection using analytic network process and fuzzy data envelopment analysis approaches , 2010, Comput. Ind. Eng..

[7]  Lily Sun,et al.  An ontological modelling of user requirements for personalised information provision , 2010, Inf. Syst. Frontiers.

[8]  B. Fruytier,et al.  Talent management and the relevance of context: Towards a pluralistic approach , 2013 .

[9]  Helmut Volger,et al.  ITU – International Telecommunication Union , 2000, A Concise Encyclopedia of the United Nations.

[10]  Marjan Krisper,et al.  Multi-criteria decision making in ontologies , 2013, Inf. Sci..

[11]  Robert E. Lewis,et al.  Talent management: A critical review , 2006 .

[12]  Tracey Caldwell,et al.  Plugging the cyber-security skills gap , 2013 .

[13]  Rossouw von Solms,et al.  From information security to cyber security , 2013, Comput. Secur..

[14]  Thompson S. H. Teo Meeting the challenges of knowledge management at the Housing and Development Board , 2005, Decis. Support Syst..

[15]  Kamel Mellahi,et al.  Strategic talent management: A review and research agenda , 2009 .

[16]  Francesco M. Donini,et al.  Automating competence management through non-standard reasoning , 2011, Eng. Appl. Artif. Intell..

[17]  Gabriella Pasi,et al.  Personal ontologies: Generation of user profiles based on the YAGO ontology , 2013, Inf. Process. Manag..

[18]  Joseph Weiss,et al.  Cyber Security Policy Guidebook: Bayuk/Cyber Security Policy , 2012 .

[19]  H.A.M. Luiijf,et al.  National Cyber Security Framework Manual , 2013 .

[20]  Jennifer E. Rowley,et al.  The wisdom hierarchy: representations of the DIKW hierarchy , 2007, J. Inf. Sci..

[21]  Jennifer L. Bayuk,et al.  Cyber Security Policy Guidebook , 2012 .

[22]  T. L. Saaty A Scaling Method for Priorities in Hierarchical Structures , 1977 .

[23]  Dorothy E. Leidner,et al.  Review: Knowledge Management and Knowledge Management Systems: Conceptual Foundations and Research Issues , 2001, MIS Q..

[24]  Nicky Dries,et al.  What is the meaning of ‘talent’ in the world of work? , 2013 .

[25]  W. A. Schiemann From talent management to talent optimization , 2014 .

[26]  Karsten Lundqvist,et al.  An ontological approach to competency management , 2008 .

[27]  Mehmet Altinöz,et al.  Effects of Talent Management on Organizational Trust: A Field Study , 2013 .

[28]  Mohammed Alsaigh,et al.  Information analytics for healthcare service discovery. , 2014, Journal of healthcare engineering.