skip to main content
column
Free access

Would cybersecurity professionalization help address the cybersecurity crisis?

Published: 01 February 2014 Publication History

Abstract

Evaluating the trade-offs involved in cybersecurity professionalization.

References

[1]
Homeland Security Advisory Council. Cyber Skills Task Force Report. Department of Homeland Security, Washington, D.C., 2012.
[2]
National Research Council. Professionalizing the Nation's Cybersecurity Workforce?: Criteria for Decision-Making. The National Academies Press, Washington, D.C., 2013.

Cited By

View all
  • (2025)Insider ThreatsComputer and Information Security Handbook10.1016/B978-0-443-13223-0.00036-9(601-612)Online publication date: 2025
  • (2022)A Multiple Case Study of METI Cybersecurity Education and Training: A Basis for the Development of a Guiding Framework for Educational ApproachesTransNav, the International Journal on Marine Navigation and Safety of Sea Transportation10.1271616:2(319-334)Online publication date: 2022
  • (2022)Competency Models for Information Security and Cybersecurity Professionals: Analysis of Existing Work and a New ModelACM Transactions on Computing Education10.1145/357320523:2(1-33)Online publication date: 5-Dec-2022
  • Show More Cited By

Index Terms

  1. Would cybersecurity professionalization help address the cybersecurity crisis?

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image Communications of the ACM
        Communications of the ACM  Volume 57, Issue 2
        February 2014
        103 pages
        ISSN:0001-0782
        EISSN:1557-7317
        DOI:10.1145/2556647
        • Editor:
        • Moshe Y. Vardi
        Issue’s Table of Contents
        Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 01 February 2014
        Published in CACM Volume 57, Issue 2

        Check for updates

        Qualifiers

        • Column
        • Popular
        • Un-reviewed

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)407
        • Downloads (Last 6 weeks)119
        Reflects downloads up to 25 Feb 2025

        Other Metrics

        Citations

        Cited By

        View all
        • (2025)Insider ThreatsComputer and Information Security Handbook10.1016/B978-0-443-13223-0.00036-9(601-612)Online publication date: 2025
        • (2022)A Multiple Case Study of METI Cybersecurity Education and Training: A Basis for the Development of a Guiding Framework for Educational ApproachesTransNav, the International Journal on Marine Navigation and Safety of Sea Transportation10.1271616:2(319-334)Online publication date: 2022
        • (2022)Competency Models for Information Security and Cybersecurity Professionals: Analysis of Existing Work and a New ModelACM Transactions on Computing Education10.1145/357320523:2(1-33)Online publication date: 5-Dec-2022
        • (2022)Levereging Apache Guacamole, Linux LXD and Docker Containers to Deliver a Secure Online Lab for a Large Cybersecurity Course2022 IEEE Frontiers in Education Conference (FIE)10.1109/FIE56618.2022.9962510(1-9)Online publication date: 8-Oct-2022
        • (2022)Retention of Qualified Cybersecurity Professionals: A Qualitative StudyJournal of Computer Information Systems10.1080/08874417.2022.204901863:1(204-215)Online publication date: 12-Apr-2022
        • (2020)The Cyber Talent Gap and Cybersecurity ProfessionalizingCyber Warfare and Terrorism10.4018/978-1-7998-2466-4.ch004(56-63)Online publication date: 2020
        • (2020)Teaching Cybersecurity to Computer Science Students Utilizing Terminal Sessions Recording Software as a Pedagogical Tool2020 IEEE Frontiers in Education Conference (FIE)10.1109/FIE44824.2020.9274268(1-8)Online publication date: 21-Oct-2020
        • (2020)Measuring the accuracy of software vulnerability assessments: experiments with students and professionalsEmpirical Software Engineering10.1007/s10664-019-09797-4Online publication date: 20-Jan-2020
        • (2019)Cybersecurity Concerns in International BusinessSecuring the Internet of Things10.4018/978-1-5225-9866-4.ch079(1690-1702)Online publication date: 6-Sep-2019
        • (2019)Cybersecurity and Human Capital in Community BanksMultigenerational Online Behavior and Media Use10.4018/978-1-5225-7909-0.ch087(1650-1664)Online publication date: 2019
        • Show More Cited By

        View Options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Digital Edition

        View this article in digital edition.

        Digital Edition

        Magazine Site

        View this article on the magazine site (external)

        Magazine Site

        Login options

        Full Access

        Figures

        Tables

        Media

        Share

        Share

        Share this Publication link

        Share on social media