Pub Date : 2024-06-19DOI: 10.1057/s41284-024-00435-3
Petar Radanliev
This paper scrutinises the evolving digital security landscape, encompassing technological advancements, regulatory frameworks, and industry-specific challenges. It explores the influence of technologies like AI, quantum computing, and blockchain on security paradigms whilst identifying emergent threats. The study analyses the interplay between digital security and legislative policies, underlining their impact on industry practices and individual behaviours. Sector-specific examinations are conducted, pinpointing unique security concerns in sectors such as healthcare and finance and advocating bespoke solutions. The study highlights discrepancies between security intentions and actions, proposing strategies to bridge this divide. Projecting into the future, we anticipate shifts in technology and regulation, culminating in pragmatic recommendations for stakeholders. This article offers an informed perspective on digital security, laying the groundwork for proactive approaches in a dynamic digital environment.
{"title":"Digital security by design","authors":"Petar Radanliev","doi":"10.1057/s41284-024-00435-3","DOIUrl":"https://doi.org/10.1057/s41284-024-00435-3","url":null,"abstract":"<p>This paper scrutinises the evolving digital security landscape, encompassing technological advancements, regulatory frameworks, and industry-specific challenges. It explores the influence of technologies like AI, quantum computing, and blockchain on security paradigms whilst identifying emergent threats. The study analyses the interplay between digital security and legislative policies, underlining their impact on industry practices and individual behaviours. Sector-specific examinations are conducted, pinpointing unique security concerns in sectors such as healthcare and finance and advocating bespoke solutions. The study highlights discrepancies between security intentions and actions, proposing strategies to bridge this divide. Projecting into the future, we anticipate shifts in technology and regulation, culminating in pragmatic recommendations for stakeholders. This article offers an informed perspective on digital security, laying the groundwork for proactive approaches in a dynamic digital environment.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"31 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2024-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141529659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-02DOI: 10.1057/s41284-024-00431-7
Richard Kathage, David J. Brooks, Michael Coole
The built environment faces challenges from fire hazards and threats by malicious actors. Risks presented from these hazards and threats are managed through the practices of fire safety and physical security. Whilst distinct disciplines, both impact the built environment systems, resulting in potential conflict. To manage this conflict, a complex process is required. Through the framework of Governmentality, using a mixed methods approach, the study explored the process which fire safety engineers and security practitioners undertake to manage this conflict. The study produced a conceptual model that explains how practitioners operate and manage risk associated with fire safety hazards and security threats. The model indicates that the process for resolving conflicts is a dichotomy between physical security and fire safety, with fire safety being the most dominate and influential. Nevertheless, both fire safety and physical security are subservient to building regulations in this process; however unlike security, fire safety is codified through building regulations. Risk assessment and the design process are core processes, but only used in decision-making when there is conflict between the fire safety and physical security. Findings demonstrated that context remains static for greater threats, whereas context is dynamic for fire safety.
{"title":"Decision-making in balancing fire safety hazards against security threats within the built environment","authors":"Richard Kathage, David J. Brooks, Michael Coole","doi":"10.1057/s41284-024-00431-7","DOIUrl":"https://doi.org/10.1057/s41284-024-00431-7","url":null,"abstract":"<p>The built environment faces challenges from fire hazards and threats by malicious actors. Risks presented from these hazards and threats are managed through the practices of fire safety and physical security. Whilst distinct disciplines, both impact the built environment systems, resulting in potential conflict. To manage this conflict, a complex process is required. Through the framework of Governmentality, using a mixed methods approach, the study explored the process which fire safety engineers and security practitioners undertake to manage this conflict. The study produced a conceptual model that explains how practitioners operate and manage risk associated with fire safety hazards and security threats. The model indicates that the process for resolving conflicts is a dichotomy between physical security and fire safety, with fire safety being the most dominate and influential. Nevertheless, both fire safety and physical security are subservient to building regulations in this process; however unlike security, fire safety is codified through building regulations. <i>Risk assessment</i> and the <i>design process</i> are core processes, but only used in decision-making when there is conflict between the fire safety and physical security. Findings demonstrated that context remains static for greater threats, whereas context is dynamic for fire safety.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"37 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2024-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141255429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-14DOI: 10.1057/s41284-024-00429-1
Juyeon Oh, Seunghwan Myeong
This study investigates the factors influencing Korean corporate workers to increase their intention to comply with security voluntarily. Specifically, this study investigates whether organizational attractiveness affects employees' intention to comply with security. In addition, this study will examine whether affection and job security, which represent the Korean corporate image, affect organizational attractiveness. 477 data collecting online survey was used to test the research model. Participants for our survey were derived from workers and public officials in South Korea. The results were as follows. First, the symbolic image of being affectionate influences the instrumental image of job security. Second, an instrumental image has a significantly positive effect on corporate attractiveness. Third, it was found that job security increased the attractiveness of the organization perceived by the employees and, in turn, increased the intention of the employees to comply with the organization's security. Our findings can be used to develop strategies to enhance security compliance intention within firms.
{"title":"The effects of organizational images on security compliance intention: focused on affection and job security in South Korea","authors":"Juyeon Oh, Seunghwan Myeong","doi":"10.1057/s41284-024-00429-1","DOIUrl":"https://doi.org/10.1057/s41284-024-00429-1","url":null,"abstract":"<p>This study investigates the factors influencing Korean corporate workers to increase their intention to comply with security voluntarily. Specifically, this study investigates whether organizational attractiveness affects employees' intention to comply with security. In addition, this study will examine whether affection and job security, which represent the Korean corporate image, affect organizational attractiveness. 477 data collecting online survey was used to test the research model. Participants for our survey were derived from workers and public officials in South Korea. The results were as follows. First, the symbolic image of being affectionate influences the instrumental image of job security. Second, an instrumental image has a significantly positive effect on corporate attractiveness. Third, it was found that job security increased the attractiveness of the organization perceived by the employees and, in turn, increased the intention of the employees to comply with the organization's security. Our findings can be used to develop strategies to enhance security compliance intention within firms.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"9 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2024-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140935147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-13DOI: 10.1057/s41284-024-00430-8
Zarina I. Vakhitova, Rob I. Mawby, Nicola Helps
Crime risk can affect tourists’ choices of holiday destination, accommodation, and activities. However, victimisation of tourists has received limited attention in existing studies. This paper integrates tourists’ holiday preferences with lifestyles and routine activities explanations to examine the relationship between tourism and victimisation. Using a sample of Australian tourists who travelled to Bali or the British Isles (N = 1027), we demonstrate the usefulness of this integrated approach in understanding the risk of theft while on holiday. We found that tourists aspiring to be adventurous, but opting for pre-arranged package holidays and spending most of their time with other tourists, were most vulnerable to theft from their person. The findings can help ensure that security measures target those who will benefit it the most.
{"title":"Exploring the value of holiday preferences and routine activities for understanding tourist victimisation while on holiday","authors":"Zarina I. Vakhitova, Rob I. Mawby, Nicola Helps","doi":"10.1057/s41284-024-00430-8","DOIUrl":"https://doi.org/10.1057/s41284-024-00430-8","url":null,"abstract":"<p>Crime risk can affect tourists’ choices of holiday destination, accommodation, and activities. However, victimisation of tourists has received limited attention in existing studies. This paper integrates tourists’ holiday preferences with lifestyles and routine activities explanations to examine the relationship between tourism and victimisation. Using a sample of Australian tourists who travelled to Bali or the British Isles (<i>N</i> = 1027), we demonstrate the usefulness of this integrated approach in understanding the risk of theft while on holiday. We found that tourists aspiring to be adventurous, but opting for pre-arranged package holidays and spending most of their time with other tourists, were most vulnerable to theft from their person. The findings can help ensure that security measures target those who will benefit it the most.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"23 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2024-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140935144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The relevance of this topic is due to the increase in the level of crime in Kazakhstan, as well as in foreign countries amid the global crisis, inflation, and other aspects that affect the criminal behavior of citizens. The purpose of the work within this topic is to study the main aspects underlying the legal activities of entities authorized to apply measures to prevent and combat offences. These are the main methods used in this article: comparative method, statistical method, and method of systematization. The identification of the main regulatory legal acts of the Republic of Kazakhstan (RK) are the results of the work, which regulates the activities of internal affairs authorities in the relevant area; it has clarified the issue of problems that arise when performing the functions for prevention of offences among minors, as well as violations of legislation in the transport sector, and others. The most effective types and methods of preventing and deterring offences have been investigated. In addition, in the course of conducting research, it was analyzed foreign experience in the prevention and deterrence of several types of criminals, administrative, and other offences and the main achievements in the relevant field.
{"title":"Comparative analysis of the activities of authorities to ensure the prevention of offenses in the Republic of Kazakhstan and other world countries","authors":"Kassymbek Zhakenov, Leila Kultemirova, Alua Ibraeva","doi":"10.1057/s41284-024-00425-5","DOIUrl":"https://doi.org/10.1057/s41284-024-00425-5","url":null,"abstract":"<p>The relevance of this topic is due to the increase in the level of crime in Kazakhstan, as well as in foreign countries amid the global crisis, inflation, and other aspects that affect the criminal behavior of citizens. The purpose of the work within this topic is to study the main aspects underlying the legal activities of entities authorized to apply measures to prevent and combat offences. These are the main methods used in this article: comparative method, statistical method, and method of systematization. The identification of the main regulatory legal acts of the Republic of Kazakhstan (RK) are the results of the work, which regulates the activities of internal affairs authorities in the relevant area; it has clarified the issue of problems that arise when performing the functions for prevention of offences among minors, as well as violations of legislation in the transport sector, and others. The most effective types and methods of preventing and deterring offences have been investigated. In addition, in the course of conducting research, it was analyzed foreign experience in the prevention and deterrence of several types of criminals, administrative, and other offences and the main achievements in the relevant field.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"22 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2024-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140566956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-02DOI: 10.1057/s41284-024-00423-7
Tyler E. Houser, Alan McMillan, Beidi Dong
Gun violence significantly threatens tens of thousands of people annually in the United States. This paper proposes a multidisciplinary approach to address this issue. Specifically, we bridge the gap between criminology and computer vision by exploring the applicability of firearm object detection algorithms to the criminal justice system. By situating firearm object detection algorithms in situational crime prevention, we outline how they could enhance the current use of closed-circuit television (CCTV) systems to mitigate gun violence. We elucidate our approach to training a firearm object detection algorithm and describe why its results are meaningful to scholars beyond the realm of computer vision. Lastly, we discuss limitations associated with object detection algorithms and why they are valuable to criminal justice practices.
{"title":"Bridging the gap between criminology and computer vision: A multidisciplinary approach to curb gun violence","authors":"Tyler E. Houser, Alan McMillan, Beidi Dong","doi":"10.1057/s41284-024-00423-7","DOIUrl":"https://doi.org/10.1057/s41284-024-00423-7","url":null,"abstract":"<p>Gun violence significantly threatens tens of thousands of people annually in the United States. This paper proposes a multidisciplinary approach to address this issue. Specifically, we bridge the gap between criminology and computer vision by exploring the applicability of firearm object detection algorithms to the criminal justice system. By situating firearm object detection algorithms in situational crime prevention, we outline how they could enhance the current use of closed-circuit television (CCTV) systems to mitigate gun violence. We elucidate our approach to training a firearm object detection algorithm and describe why its results are meaningful to scholars beyond the realm of computer vision. Lastly, we discuss limitations associated with object detection algorithms and why they are valuable to criminal justice practices.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"49 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2024-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140567024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-13DOI: 10.1057/s41284-024-00421-9
Eda Sonmez, Keziban Seckin Codal
Dark Web has turned into a platform for a variety of criminal activities, including weapon trafficking, pornography, fake documents, drug trafficking, and, most notably terrorism as detailed in this study. This article uses an LDA-based topic modeling approach to identify the topics addressed in discussions on the Dark Web. The main purpose is to present an overview of jihadists’ communication in cyberspace for the detection of unusual behavior or terrorism-related purposes. According to the findings, conversations in the context of recruitment and propaganda predominated at the forum. There was no direct evidence of terrorist collaboration at the conclusion of the investigation. This does not, however, imply that these sites are risk-free. Propaganda and recruitment tools feed the terrorist activities.
{"title":"Analyzing a Dark Web forum page in the context of terrorism: a topic modeling approach","authors":"Eda Sonmez, Keziban Seckin Codal","doi":"10.1057/s41284-024-00421-9","DOIUrl":"https://doi.org/10.1057/s41284-024-00421-9","url":null,"abstract":"<p>Dark Web has turned into a platform for a variety of criminal activities, including weapon trafficking, pornography, fake documents, drug trafficking, and, most notably terrorism as detailed in this study. This article uses an LDA-based topic modeling approach to identify the topics addressed in discussions on the Dark Web. The main purpose is to present an overview of jihadists’ communication in cyberspace for the detection of unusual behavior or terrorism-related purposes. According to the findings, conversations in the context of recruitment and propaganda predominated at the forum. There was no direct evidence of terrorist collaboration at the conclusion of the investigation. This does not, however, imply that these sites are risk-free. Propaganda and recruitment tools feed the terrorist activities.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"19 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2024-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140117028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-08DOI: 10.1057/s41284-024-00419-3
Viktorie Paloušová
This research is dedicated to unpacking the complex dynamics of disruptive behavior among youths in shopping malls. It leverages discursive psychology to dissect eight semi-structured interviews with security staff from Czech retail complexes. The study reveals that social control mechanisms within these semi-public spaces significantly impact young people’s conduct. Contributory factors to the onset and progression of unruly behavior are identified as Wi-Fi availability, which seeds the environment for practical jokes, peer pressure, and a lack of parental oversight. Although security measures tend to conform to formal protocols, they frequently rely on instinct or adopt an informal, parental approach. The research suggests that partnering with youth workers could provide a more effective strategy for addressing such behaviors, bridging the gap between formal policy and practice.
{"title":"Disruptive behavior of young people in shopping malls: a security provider perspective","authors":"Viktorie Paloušová","doi":"10.1057/s41284-024-00419-3","DOIUrl":"https://doi.org/10.1057/s41284-024-00419-3","url":null,"abstract":"<p>This research is dedicated to unpacking the complex dynamics of disruptive behavior among youths in shopping malls. It leverages discursive psychology to dissect eight semi-structured interviews with security staff from Czech retail complexes. The study reveals that social control mechanisms within these semi-public spaces significantly impact young people’s conduct. Contributory factors to the onset and progression of unruly behavior are identified as Wi-Fi availability, which seeds the environment for practical jokes, peer pressure, and a lack of parental oversight. Although security measures tend to conform to formal protocols, they frequently rely on instinct or adopt an informal, parental approach. The research suggests that partnering with youth workers could provide a more effective strategy for addressing such behaviors, bridging the gap between formal policy and practice.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"31 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2024-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140076671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-08DOI: 10.1057/s41284-024-00417-5
Seoung Won Choi, Julak Lee, Sang-Hak Lee
The surge of interest in digital currencies has led to a corresponding global increase in Ponzi schemes associated with cryptocurrencies. Scammers of cryptocurrency Ponzi schemes often target older adults who are cash-rich and have limited knowledge of digital assets. Therefore, to reduce the number of victims, it is imperative to increase the understanding of the crime itself. However, there remains a paucity of scholarly exploration focused on the criminal mechanisms underpinning such schemes and the strategic decision-making process of the perpetrators. This study seeks to address this gap in the literature and enhance the current understanding of cryptocurrency-based Ponzi schemes through an examination of their operational tactics. The methodology employed in this study distinguishes the progression of these schemes into two stages: the pre-crime phase and the criminal event phase, each scripted for further clarity, yielding three scripts for the former and eleven for the latter. Based on these parsed narratives, this research proposes several policy strategies aimed at curtailing the prevalence of cryptocurrency Ponzi schemes.
{"title":"Cryptocurrency Ponzi schemes and their modus operandi in South Korea","authors":"Seoung Won Choi, Julak Lee, Sang-Hak Lee","doi":"10.1057/s41284-024-00417-5","DOIUrl":"https://doi.org/10.1057/s41284-024-00417-5","url":null,"abstract":"<p>The surge of interest in digital currencies has led to a corresponding global increase in Ponzi schemes associated with cryptocurrencies. Scammers of cryptocurrency Ponzi schemes often target older adults who are cash-rich and have limited knowledge of digital assets. Therefore, to reduce the number of victims, it is imperative to increase the understanding of the crime itself. However, there remains a paucity of scholarly exploration focused on the criminal mechanisms underpinning such schemes and the strategic decision-making process of the perpetrators. This study seeks to address this gap in the literature and enhance the current understanding of cryptocurrency-based Ponzi schemes through an examination of their operational tactics. The methodology employed in this study distinguishes the progression of these schemes into two stages: the pre-crime phase and the criminal event phase, each scripted for further clarity, yielding three scripts for the former and eleven for the latter. Based on these parsed narratives, this research proposes several policy strategies aimed at curtailing the prevalence of cryptocurrency Ponzi schemes.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"32 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2024-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140073364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-06DOI: 10.1057/s41284-024-00420-w
Ozcan Ozyurt, Ahmet Ayaz
This study aims to reveal the competence areas and skill sets needed in the business world in the field of cyber security (CS). For this purpose, descriptive analysis, topic modeling analysis, and semantic content analysis were conducted on 9407 CS job advertisements obtained from Indeed.com. The results of the study revealed a total of 10 job titles and 23 skill sets expected by the business world in CS job postings. The first three titles in terms of volume were “Engineer”, “Analyst” and “Specialist”, while the first three skill sets were determined as “Business/Customer services”, “System engineering”, and “Bachelor degree”. In addition, maps showing the relationships between titles and skills were created with a title-skill set matrix. The results of our study can be expected to contribute to candidates and professionals in the field of cyber security, IT organizations, and educational institutions in the cyber security business world by seeing, evaluating, developing, and expanding the current knowledge, skills, and competencies needed in the field.
{"title":"Identifying cyber security competencies and skills from online job advertisements through topic modeling","authors":"Ozcan Ozyurt, Ahmet Ayaz","doi":"10.1057/s41284-024-00420-w","DOIUrl":"https://doi.org/10.1057/s41284-024-00420-w","url":null,"abstract":"<p>This study aims to reveal the competence areas and skill sets needed in the business world in the field of cyber security (CS). For this purpose, descriptive analysis, topic modeling analysis, and semantic content analysis were conducted on 9407 CS job advertisements obtained from Indeed.com. The results of the study revealed a total of 10 job titles and 23 skill sets expected by the business world in CS job postings. The first three titles in terms of volume were “Engineer”, “Analyst” and “Specialist”, while the first three skill sets were determined as “Business/Customer services”, “System engineering”, and “Bachelor degree”. In addition, maps showing the relationships between titles and skills were created with a title-skill set matrix. The results of our study can be expected to contribute to candidates and professionals in the field of cyber security, IT organizations, and educational institutions in the cyber security business world by seeing, evaluating, developing, and expanding the current knowledge, skills, and competencies needed in the field.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"2 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2024-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140046861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}