通过一个可操作的员工参与框架来监督和授权Y和Z一代网络安全员工

D. Burrell
{"title":"通过一个可操作的员工参与框架来监督和授权Y和Z一代网络安全员工","authors":"D. Burrell","doi":"10.4018/IJHIOT.2021070102","DOIUrl":null,"url":null,"abstract":"A leading consulting and cybersecurity research firm, Consulting Ventures, predicted that cybercrime will cost $6 trilling annually by 2021. That amount is a significant increase from the $3 trillion in 2015. According to growing estimates, there could be as many as 3.5 million unfilled cybersecurity jobs by 2021. This has created a need for new expertise and workers in cybersecurity and information security from Generation Y and Generation Z. These professionals have different career interests from previous generations in terms of work environments and cultures. These younger professionals are a product of new degree programs that have been newly developed in the last 10 years. But in order to attract, recruit, and retain this younger generation of professionals with these critically needed workforce skills, managers must consider alternative management approaches that look to empower, energize, and engage this new and different generation of employees instead of the use of micromanaging and controlling antiqued performance management approaches.","PeriodicalId":262783,"journal":{"name":"International Journal of Hyperconnectivity and the Internet of Things","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Supervising and Empowering Generation Y and Z Cybersecurity Employees Through an Actionable Framework for Worker Engagement\",\"authors\":\"D. Burrell\",\"doi\":\"10.4018/IJHIOT.2021070102\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A leading consulting and cybersecurity research firm, Consulting Ventures, predicted that cybercrime will cost $6 trilling annually by 2021. That amount is a significant increase from the $3 trillion in 2015. According to growing estimates, there could be as many as 3.5 million unfilled cybersecurity jobs by 2021. This has created a need for new expertise and workers in cybersecurity and information security from Generation Y and Generation Z. These professionals have different career interests from previous generations in terms of work environments and cultures. These younger professionals are a product of new degree programs that have been newly developed in the last 10 years. But in order to attract, recruit, and retain this younger generation of professionals with these critically needed workforce skills, managers must consider alternative management approaches that look to empower, energize, and engage this new and different generation of employees instead of the use of micromanaging and controlling antiqued performance management approaches.\",\"PeriodicalId\":262783,\"journal\":{\"name\":\"International Journal of Hyperconnectivity and the Internet of Things\",\"volume\":\"12 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Hyperconnectivity and the Internet of Things\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4018/IJHIOT.2021070102\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Hyperconnectivity and the Internet of Things","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/IJHIOT.2021070102","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

领先的咨询和网络安全研究公司consulting Ventures预测,到2021年,网络犯罪每年将造成6万亿美元的损失。与2015年的3万亿美元相比,这一数字有了显著增长。根据越来越多的估计,到2021年,网络安全职位空缺可能多达350万个。这就产生了对网络安全和信息安全领域的新专业知识和工作者的需求。这些专业人士在工作环境和文化方面与前几代人有着不同的职业兴趣。这些年轻的专业人士是过去10年新开发的新学位课程的产物。但是,为了吸引、招募和留住这些拥有这些急需的工作技能的年轻一代专业人士,管理者必须考虑其他管理方法,这些方法旨在赋予这些新的、不同的一代员工权力、激励和参与,而不是使用微观管理和控制过时的绩效管理方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Supervising and Empowering Generation Y and Z Cybersecurity Employees Through an Actionable Framework for Worker Engagement
A leading consulting and cybersecurity research firm, Consulting Ventures, predicted that cybercrime will cost $6 trilling annually by 2021. That amount is a significant increase from the $3 trillion in 2015. According to growing estimates, there could be as many as 3.5 million unfilled cybersecurity jobs by 2021. This has created a need for new expertise and workers in cybersecurity and information security from Generation Y and Generation Z. These professionals have different career interests from previous generations in terms of work environments and cultures. These younger professionals are a product of new degree programs that have been newly developed in the last 10 years. But in order to attract, recruit, and retain this younger generation of professionals with these critically needed workforce skills, managers must consider alternative management approaches that look to empower, energize, and engage this new and different generation of employees instead of the use of micromanaging and controlling antiqued performance management approaches.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Strategic Approach to IoT Security by Working Towards a Secure IoT Future Internet of Things-Based Personal Device for Diabetes Mellitus Treatment and Management Adaptive IoT Technology for Measuring Salinity, Dissolved Oxygen, and pH in Aquatic Environments IoT Security and Privacy Concern A systematic Mapping Study Implicit Cognitive Vulnerability through Nudges, Boosts and Bounces
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1