Security experts’ capability design for future internet of things platform

Security-related accidents have been occurring frequently in the last few years despite the focus on training security personnel with technical capabilities. Although it is important to be equipped with a technical security system, what is also urgently needed is to cultivate integrative and managerial security personnel. Adept management can not only prevent information and technology leakage caused by their own employees but also establish a security culture. However, in-depth studies on the competency system of personnel suitable for the security field are currently lacking. Accordingly, this paper defined security personnel and various security occupation-specific competencies. In addition, 36 security occupations were classified according to the US NICE classification system. Accordingly, various occupations were evaluated in regards to their suitability to be labeled security jobs, and core competencies were described for each occupation. Specifically, nine security job competencies and three general job competencies were described as core competencies. How the required core competencies vary according to the occupational cluster is also described.

[1]  Mi-sug Jin An exploratory study on inequality of core competence of college students in Korea , 2013 .

[2]  Johan Van Niekerk,et al.  Back to Basics: Information Security Education for the Youth via Gameplay , 2013, World Conference on Information Security Education.

[3]  Jung-Ho Eom Cyber Professionals Certification Evaluation Model for Reinforcing Cyberwar Power , 2014 .

[4]  Yufei Yuan,et al.  The effects of multilevel sanctions on information security violations: A mediating model , 2012, Inf. Manag..

[5]  John Corbin Competencies for Electronic Information Services , 1993 .

[6]  Eun-Joo Oh Work-Competencies and Competency-based Curriculum Development , 2012 .

[7]  Allison B. Dymnicki,et al.  The impact of enhancing students' social and emotional learning: a meta-analysis of school-based universal interventions. , 2011, Child development.

[8]  Qing Hu,et al.  Future directions for behavioral information security research , 2013, Comput. Secur..

[9]  Gurpreet Dhillon,et al.  Organizational power and information security rule compliance , 2013, Comput. Secur..

[10]  David D. Dubois,et al.  Competency-Based Performance Improvement: A Strategy for Organizational Change , 1993 .

[11]  Yongtae Shin,et al.  A Design on Information Security Occupational Classification for Future Convergence Environment , 2015 .

[12]  Patricia A. McLagan Models for HRD practice , 1989 .

[13]  S. Thompson,et al.  Quantifying heterogeneity in a meta‐analysis , 2002, Statistics in medicine.

[14]  Chunying Wu,et al.  Analysis on the Information Security Education for the Public Security Active Forces Academy , 2010, 2010 International Forum on Information Technology and Applications.