skip to main content
10.1145/3322385.3322418acmconferencesArticle/Chapter ViewAbstractPublication PagescprConference Proceedingsconference-collections
short-paper

Employer Preferences for Cybersecurity Skills among Information Systems Graduates

Published: 12 June 2019 Publication History

Abstract

Recognizing the global need for cybersecurity professionals and shedding light on the employers' preference of skills give educators the opportunity to improve their process to prepare future generations for the workforce. The goal of this paper is to acquire a collection of skills employers value when hiring for a new cybersecurity position. Our research plan is split into three phases. First, we will develop an initial list of cybersecurity skills by using a systematic literature review to assess what past research has found. Next, we will validate the importance of these skills through a ratings-based survey of employers. Finally, we will refine and prioritize the validated skills using two preference capturing studies - rank order survey and conjoint analysis. Discussion and implications for future research and academic departments in cybersecurity are provided.

References

[1]
Robert Ackerman. 2019. Too few cybersecurity professionals is a gigantic problem for 2019. Tech Crunch. Retrieved January 29, 2019 from https://techcrunch.com/2019/01/27/too-few-cybersecurity-professionals-is-a-gigantic-problem-for-2019/
[2]
Raj Arora and Charles Stoner. 1992. The Importance of Skills of M.B.A Students Seeking Marketing Positions: An Employers' Perspective. Journal of Marketing Education 14, 2 (1992), 2--9.
[3]
William M. Baker and Calvert C. McGregor. 2000. Empirically Assessing the Importance of Characteristics of Accounting Students. Journal of Education for Business 75, 3 (February 2000), 149--157.
[4]
Matthias Baum and Rüdiger Kabst. 2013. Conjoint implications on job preferences: the moderating role of involvement. International Journal of Human Resource Management 24, 7 (May 2013), 1393--1417.
[5]
E. W. Boatwright and Miriam B. Stamps. 1988. Employers' Importance Ratings of Student Characteristics: A Conjoint Analysis Approach. Journal of Marketing Education 10, 2 (1988), 74--78.
[6]
Nita G. Brooks, Timothy H. Greer, and Steven A. Morris. 2018. Information systems security job advertisement analysis: Skills review and implications for information systems curriculum. Journal of Education for Business 93, 5 (July 2018), 213--221.
[7]
M. Carlton and Y. Levy. 2015. Expert assessment of the top platform independent cybersecurity skills for non-IT professionals. In Conference Proceedings - IEEE SOUTHEASTCON.
[8]
Wm. Arthur Conklin and Matt Bishop. 2018. Contrasting the CSEC 2017 and the CAE Designation Requirements.
[9]
Wm. Arthur Conklin, Raymond Cline, and Tiffany Roosa. Re-engineering Cybersecurity Education in the US: An Analysis of the Critical Factors. 2006--2014. Retrieved from https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6758852
[10]
J. Dawson and R. Thomson. 2018. The future cybersecurity workforce: Going beyond technical skills for successful cyber performance. Frontiers in Psychology 9, JUN (2018).
[11]
Callum J. Floyd and Mary Ellen Gordon. 1998. What skills are most important? A comparison of employer, student, and staff perceptions. Journal of Marketing Education 20, 2 (1998), 103--109.
[12]
Husam Haqaf and Murat Koyuncu. 2018. Understanding key skills for information security managers. International Journal of Information Management 43, (December 2018), 165--172.
[13]
Lance Hoffman, Diana Burley, and Costis Toregas. 2012. Holistically Building the Cybersecurity Workforce. IEEE Software 10, 2 (2012), 33--39.
[14]
(ISC)2. 2018. (ISC)2 Cybersecurity Workforce Study. Retrieved from https://www.isc2.org/-/media/ISC2/Research/2018-ISC2-Cybersecurity-Workforce-Study.ashx
[15]
Joint Task Force for Computing Curricula 2005. 2005. Computing Curricula 2005: The Overview Report. Retrieved from https://www.acm.org/binaries/content/assets/education/curricula-recommendations/cc2005-march06final.pdf
[16]
K.S. Jones, A.S. Namin, and M.E. Armstrong. 2018. The core cyber-defense knowledge, skills, and abilities that cybersecurity students should learn in school: Results from interviews with cybersecurity professionals. ACM Transactions on Computing Education 18, 3 (01 2018).
[17]
Kenneth J. Knapp, Christopher Maurer, and Miloslava Plachkinova. 2017. Maintaining a Cybersecurity Curriculum: Professional Certifications as Valuable Guidance. Journal of Information Systems Education 28, 2 (December 2017), 101--113.
[18]
William Newhouse, Stephanie Keith, Benjamin Scribner, and Greg Witte. 2017. National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework. National Institute of Standards and Technology. Retrieved from
[19]
Celia Paulsen, Ernest McDuffie, William Newhouse, and Patricia Toth. 2012. NICE: Creating a Cybersecurity Workforce and Aware Public. IEEE Security & Privacy 10, 3 (2012), 76--79.
[20]
Leigh-Ellen Potter and Greg Vickers. 2015. What Skills do you Need to Work in Cyber Security? A Look at the Australian Market. In Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research, 67--72.
[21]
Tanya Ruetzler, William Baker, Dennis Reynolds, Jim Taylor, and Brian Allen. 2014. Perceptions of technical skills required for successful management in the hospitality industry-An exploratory study using conjoint analysis. International Journal of Hospitality Management 39, (May 2014), 157--164.
[22]
Tanya Ruetzler, Jim Taylor, Dennis Reynolds, and William Baker. 2011. Understanding perceptions of professional attributes using conjoint analysis. International Journal of Hospitality Management 30, (January 2011), 551--557.
[23]
Harold F Tipton. 2010. Official (ISC)2 Guide to the CISSP CBK (Second ed.). Taylor and Francis Group LLC, FL: Boca Raton.

Cited By

View all
  • (2021)The Impact of Electronic Surveillance on Teleworkers' Well-beingProceedings of the 2021 Computers and People Research Conference10.1145/3458026.3462150(39-40)Online publication date: 29-Jun-2021
  • (2020)Future Job Market of Information Technology in the Kingdom of Bahrain2020 International Conference on Innovation and Intelligence for Informatics, Computing and Technologies (3ICT)10.1109/3ICT51146.2020.9312017(1-6)Online publication date: 20-Dec-2020
  • (2020)A meta-model of cybersecurity curriculums: Assessing cybersecurity curricular frameworks for business schoolsJournal of Education for Business10.1080/08832323.2020.1757594(1-12)Online publication date: 4-May-2020

Index Terms

  1. Employer Preferences for Cybersecurity Skills among Information Systems Graduates

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SIGMIS-CPR '19: Proceedings of the 2019 on Computers and People Research Conference
    June 2019
    211 pages
    ISBN:9781450360883
    DOI:10.1145/3322385
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 12 June 2019

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. conjoint analysis
    2. cybersecurity employment
    3. cybersecurity skills
    4. employer preference

    Qualifiers

    • Short-paper

    Conference

    SIGMIS-CPR '19
    Sponsor:

    Acceptance Rates

    SIGMIS-CPR '19 Paper Acceptance Rate 20 of 30 submissions, 67%;
    Overall Acceptance Rate 300 of 480 submissions, 63%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)25
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 15 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2021)The Impact of Electronic Surveillance on Teleworkers' Well-beingProceedings of the 2021 Computers and People Research Conference10.1145/3458026.3462150(39-40)Online publication date: 29-Jun-2021
    • (2020)Future Job Market of Information Technology in the Kingdom of Bahrain2020 International Conference on Innovation and Intelligence for Informatics, Computing and Technologies (3ICT)10.1109/3ICT51146.2020.9312017(1-6)Online publication date: 20-Dec-2020
    • (2020)A meta-model of cybersecurity curriculums: Assessing cybersecurity curricular frameworks for business schoolsJournal of Education for Business10.1080/08832323.2020.1757594(1-12)Online publication date: 4-May-2020

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media