DOI QR코드

DOI QR Code

A Study on Retraining for Career Development of Information Security Workforce

정보보호 업무인력의 경력개발을 위한 재교육 방향

  • Received : 2018.10.23
  • Accepted : 2018.12.20
  • Published : 2018.12.31

Abstract

With the types and targets of cyber attacks expanding and with personal information leaks increasing, the quantitative demand for information security specialists has increased. The base for training the workforce has expanded accordingly, but joblessness and job-seeking still coexist. To resolve the gap between labor demand and supply, education and training systems that can supply demand quickly are needed. It takes a considerable amount of time for information security education and new manpower supply through universities and graduate schools to be reflected in the market. However, if information security retraining is carried out in terms of career development of information security and related workforce, the problem of lack of experts could be solved in a relatively short period. This paper investigates and analyzes the information security work of the information security workforce, the degree of skill level, the need for retraining, and the workplace migration experience; it also discusses the direction of career development retraining.

Keywords

Major Knowledge and Skills of Information Security

DOTSBL_2018_v25n4_67_t0001.png 이미지

Turnover Causes of Respondents Who had Experiences of Workplace Turnover

DOTSBL_2018_v25n4_67_t0002.png 이미지

Turnover Path of Respondents Who had Experiences of Workplace Turnover

DOTSBL_2018_v25n4_67_t0003.png 이미지

References

  1. Bishop, M. and Frincke, D. A., "Achieving learning objectives through E-voting case studies", IEEE Security & Privacy, Vol. 5, No. 1, 2007, pp. 53-56.
  2. Buchel, F. and Mertens, A., "Overeducation, undereducation, and the theory of career mobility", Applied Economics, Vol. 36, No. 8, 2004, pp. 803-816. https://doi.org/10.1080/0003684042000229532
  3. Choi, M. G. and Kim, S. H., "Analysis of knowledge and skill for security professionals", Asia Pacific Journal of Information Systems, Vol. 14, No. 4, 2004, pp. 71-85.
  4. Cockcroft, S., "Securing the commercial Internet : Lessons learned in developing a postgraduate course in information security management", Journal of Information Systems Education, Vol. 13, No. 3, 2002, pp. 205-210.
  5. Connelly, B. L., Certo, S. T., Ireland, R. D., and Reutzel, C. R., "Signaling theory : A review and assessment", Journal of Management, Vol. 37, No. 1, 2011, pp. 39-67. https://doi.org/10.1177/0149206310388419
  6. Dekker, R. A., Grip, A. D., and Heijke, H., "The effects of training and overeducation on career mobility in a segmented labour market", International Journal of Manpower, Vol. 23, No. 2, 2002, pp. 106-125. https://doi.org/10.1108/01437720210428379
  7. Elchanan, C. and Shahina, P. K., "The wage effects of overschooling revisited", Labour Economics, Vol. 2, 1995, pp. 67-76.
  8. Ferratt, T. W., Agarwal, R., Brown, C. V., and Moore, J., "IT human resource management configurations and it turnover : Theoretical synthesis and empirical analysis", Information Systems Research, Vol. 16, No. 3, 2005, pp. 237-255. https://doi.org/10.1287/isre.1050.0057
  9. Ghapanchi, A. H. and Aurum, A., "Antecedents to IT personnel's intentions to leave : A systematic literature review", Journal of Systems and Software, Vol. 84, No. 2, 2011, pp. 238-249. https://doi.org/10.1016/j.jss.2010.09.022
  10. Jun, H. J., Yoo, H. W., and Kim, T. S., "Analysis on knowledge and skills for information security professionals", Information Systems Review, Vol. 14, No. 4, 2008, pp. 253-267.
  11. Kim, J. D. and Baek, T. S., "A study on essentials body of knowledge and education certification program for information security professional development", Journal of Digital Convergence, Vol. 9, No. 5, 2011, pp. 113-121. https://doi.org/10.14400/JDPM.2011.9.5.113
  12. Kim, K. Y. and Surendran, K., "Information security management curriculum design : A joint industry and academic effort", Journal of Information Systems Education, Vol. 13, No. 3, 2002, pp. 227-236.
  13. Korean Women's Development Institute, Recognition of the career development of female knowledge workers in knowledge-based industries, Research Report 230-26, 2003.
  14. Lee, P. C. B., "Turnover on information technology professionals : A contextual model", Accounting Management and Information Technologies, Vol. 10, No. 2, 2000, pp. 101-124. https://doi.org/10.1016/S0959-8022(99)00016-8
  15. Libicki, M. C., Senty, D., and Pollak, J., Hackers Wanted : An Examination of the Cybersecurity Labor Market, Rand Corporation, 2014.
  16. Lo, J., "The information technology workforce : A review and assessment of voluntary turnover research", Information Systems Frontiers, Vol. 17, No. 2, pp. 387-411, 2015. https://doi.org/10.1007/s10796-013-9408-y
  17. Logan, P. Y., "Crafting an undergraduate information security emphasis within information technology", Journal of Information Systems Education, Vol. 13, No. 3, 2002, pp. 177-182.
  18. McKnight, D. H., Phillips B., and Hardgrave, B. C., "Which reduces IT turnover intention the most : Workplace characteristics or job characteristics?", Information & Management, Vol. 46, 2009, pp. 167-174.
  19. Niedermann, F. and Summer, M., Decision paths affecting turnover among Information Technology Professionals, Paper presented at the ACM SIGMIS CPR Conference : Philadelphia, PE, 2003.
  20. Rubb, S., "Overeducation, undereducation and asymmetric information in occupational mobility", Applied Economics, Vol. 45, No. 6, 2013, pp. 741-751. https://doi.org/10.1080/00036846.2011.610754
  21. Schein, E. H., "Career anchors and job/role planning : the links between career pathing and career development", Working paper (Sloan School of Management) 3192-3190.
  22. Sharma, S. K. and Sefchek, J., "Teaching information systems security courses : A hands-on approach", Computers & Security, Vol. 26, No. 4, 2007, pp. 290-299. https://doi.org/10.1016/j.cose.2006.11.005
  23. Shelton, M., Impact of Perceived Organizational Support on Cyber Security Practitioners' Turnover Intentions, Doctoral dissertation : Walden University, 2013.
  24. Sicherman, N. and Galor, O., "A theory of career mobility", Journal of Political Economy, Vol. 98, No. 1, 1990, pp. 169-192. https://doi.org/10.1086/261674
  25. Spence, M., "Job market signaling", The Quarterly Journal of Economics, Vol. 87, No. 3, 1973, pp. 355-374. https://doi.org/10.2307/1882010
  26. Spence, M., "Product differentiation and welfare", The American Economic Review, Vol. 66, No. 2, 1976, pp. 407-414.
  27. Theoharidou, M., Xidara, D., and Gritzalis, D., "A CBK for Information Security and Critical Information and Communication Infrastructure Protection", International Journal of Critical Infrastructure Protection, Vol. 1, 2008, pp. 81-96.
  28. Tsai, Y., "Returns to overeducation : A longitudinal analysis of the US labor market", Economics of Education Review, Vol. 29, No. 4, 2010, pp. 606-617. https://doi.org/10.1016/j.econedurev.2010.01.001
  29. Whitten, D., "The chief information security officer : an analysis of the skills required for success", Journal of Computer Information Systems, Vol. 48, No. 3, 2008, pp. 15-19.

Cited by

  1. 행정기관의 정보보호 담당인력을 어떻게 관리할 것인가? vol.18, pp.4, 2018, https://doi.org/10.9716/kits.2019.18.4.055
  2. 공공부문 정보보호 교육과정의 평가 : 사례 연구 vol.19, pp.1, 2018, https://doi.org/10.9716/kits.2020.19.1.173