Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3538969.3543821acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article

Job Adverts Analyzer for Cybersecurity Skills Needs Evaluation

Published: 23 August 2022 Publication History

Abstract

This article presents a new free web-based application, the Cybersecurity Job Ads Analyzer, which has been created to collect and analyse job adverts using a machine learning algorithm. This algorithm enables the detection of the skills required in advertised cybersecurity work positions. The application is both interactive and dynamic allowing for automated analyses and for the underlying database of job adverts to be easily updated. Through the Cybersecurity Job Ads Analyzer, it is possible to explore the skills required over time, and thereby enable academia and other training providers to better understand and address the needs of the industry. We will describe in detail the user interface and technical background of the application, as well as highlight the preliminary statistical results we have obtained from analysing the current database of job adverts.

References

[1]
Georgia Bafoutsou Anna Sarri, Viktor Paggio. 2021. Cybersecurity for SMEs: Challenges and Recommendations. https://www.enisa.europa.eu/publications/enisa-report-cybersecurity-for-smes
[2]
ANSSI. 2021. SecNumedu, labeling of higher education courses in cybersecurity.https://www.ssi.gouv.fr/en/cybersecurity-in-france/formations/secnumedu- labeling-of-higher-education-courses-in-cybersecurity/
[3]
Stuart Berg, Dominik Kutra, Thorben Kroeger, Christoph N Straehle, Bernhard X Kausler, Carsten Haubold, Martin Schiegg, Janez Ales, Thorsten Beier, Markus Rudy, 2019. Ilastik: interactive machine learning for (bio) image analysis. Nature Methods 16, 12 (2019), 1226–1232.
[4]
Gianluca Bontempi, Souhaib Ben Taieb, and Yann-Aël Le Borgne. 2012. Machine learning strategies for time series forecasting. In European business intelligence summer school. Springer, 62–77.
[5]
CEN. 2020. European e‐Competence Framework 3.0. https://itprofessionalism.org/app/uploads/2019/11/User-guide-for-the-application-of-the-e-CF-3.0_CEN_CWA_16234-2_2014.pdf
[6]
Felicia Cutas. 2020. CONCORDIA: Methodology for the creation and deployment of new courses and/or teaching materials for cybersecurity professionals. https://www.concordia-h2020.eu/wpcontent/uploads/2020/06/CONCORDIA-methodology-courses-professionals-for-publication.pdf
[7]
Felicia Cutas. 2020. CONCORDIA Workshop on Education for cybersecurity professionals - post workshop report -. https://www.concordia-h2020.eu/wp-content/uploads/2020/07/CONCORDIAWorkshoponEducation2020-forpublication.pdf
[8]
European Cyber Security Organisation (ECSO). 2018. Gaps in European Cyber Education and Professional Training. https://ecs-org.eu/documents/publications/5fdb282a4dcbd.pdf
[9]
European Cyber Security Organisation (ECSO). 2020. Infromation and Cyber Security Professional Certification. https://ecs-org.eu/documents/publications/60101ad752a50.pdf
[10]
European Cyber Security Organisation (ECSO). 2021. European Cybersecurity Education and Professional Training: Minimum Reference Curriculum. https://ecs-org.eu/documents/publications/62164c38c8139.pdf
[11]
ENISA. 2020. Cybersecurity Skills Development in the EU.https://www.enisa.europa.eu/publications/the-status-of-cyber-security-education-in-the-european-union
[12]
e-Governance Academy (EGA) European Union Agency for Cybersecurity (ENISA). 2021. Raising awareness of cybersecurity. Number November. 53 pages. www.enisa.europa.eu.
[13]
Cyber Security for Europe. 2020. D6.2 Education and Training Review. https://cybersec4europe.eu/wp-content/uploads/2020/02/D6.2-Education-and-Training-Review-V1.2-Submtted.pdf
[14]
Australian Governament. 2020. ASD Cyber Skills Framework. https://www.cyber.gov.au/sites/default/files/2020-09/ASD-Cyber-Skills-Framework-v2.pdf
[15]
ISACA. 2022. State of Cybersecurity 2022 Report. https://www.isaca.org/go/state-of-cybersecurity-2022
[16]
(ISC)2. 2021. (ISC)2 Cybersecurity Workforce Study. https://www.isc2.org//-/media/ISC2/Research/2021/ISC2-Cybersecurity-Workforce-Study-2021.ashx
[17]
Darragh McHenry, Tania Borges, Alex Bollen, Jayesh Navin, Sam Donaldson, David Crozier, and Steven Furnell. 2021. Cyber security skills in the UK labour market 2021. https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/1042429/Cyber_skills_in_the_labour_market_report_v6_.pdf
[18]
INFOCOMM media development Authority. 2021. Skills Framework for ICT. https://www.imda.gov.sg/cwp/assets/imtalent/skills-framework-for-ict/index.html#
[19]
William Newhouse, Stephanie Keith, Benjamin Scribner, and Greg Witte. 2017. National initiative for cybersecurity education (NICE) cybersecurity workforce framework. NIST special publication 800, 2017 (2017), 181.
[20]
Daniel Pedley, Darragh McHenry, Helen Motha, and J Shah. 2018. Understanding the UK cyber security skills labour market. United States Sentencing Commission, Sentencing Guidelines for United States Courts, http://www. ussc. gov/FEDREG/05_04_notice. pdf (2018).
[21]
REWIRE project. 2021. WP2 Methodology to anticipate future needs. https://rewireproject.eu/wp-content/uploads/2021/12/R2.2.3-MethodologyToAnticipateFutureNeeds-FINAL.pdf
[22]
R Core Team. 2013. R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing, Vienna, Austria. http://www.R-project.org/
[23]
REWIRE. 2020. REWIRE: Cybersecurity Skills Alliance - A new Vision for Europe. https://rewireproject.eu/
[24]
David E Rumelhart, Geoffrey E Hinton, and Ronald J Williams. 1986. Learning representations by back-propagating errors. nature 323, 6088 (1986), 533–536.
[25]
Fabian Schmich. 2021. gespeR: Gene-Specific Phenotype EstimatoR. http://www.cbg.ethz.ch/software/gespeR R package version 1.26.0.
[26]
SPARTA. 2019. D9.1 - Cybersecurity skills framework. https://www.sparta.eu/assets/deliverables/SPARTA-D9.1-Cybersecurity-skills-framework-PU-M12.pdf
[27]
SPARTA. 2020. D9.2 - Curricula descriptions. https://www.sparta.eu/assets/deliverables/SPARTA-D9.2-Curricula-descriptions-PU-M18.pdf
[28]
Pavel Varbanov. 2021. D2.6 ECHO CYBERSKILLS FRAMEWORK. https://echonetwork.eu/wpcontent/uploads/2021/03/ECHO_D2.6_Cyberskills-Framework.pdf
[29]
William Webber, Alistair Moffat, and Justin Zobel. 2010. A Similarity Measure for Indefinite Rankings. ACM Transactions on Information Systems 28, 4 (2010).
[30]
Karen A. Wetzel. 2021. NICE Framework Competencies: 19 Assessing Learners for Cybersecurity Work.https://nvlpubs.nist.gov/nistpubs/ir/2021/NIST.IR.8355‐draft.pdf
[31]
Wenpeng Yin, Katharina Kann, Mo Yu, and Hinrich Schütze. 2017. Comparative study of CNN and RNN for natural language processing. arXiv preprint arXiv:1702.01923(2017).

Cited By

View all
  • (2024)Enhancing Cybersecurity Curriculum Development: AI-Driven Mapping and Optimization TechniquesProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3670467(1-10)Online publication date: 30-Jul-2024
  • (2023)Enhancing Cybersecurity Education in Europe: The REWIRE’s Course Selection MethodologyProceedings of the 18th International Conference on Availability, Reliability and Security10.1145/3600160.3605091(1-7)Online publication date: 29-Aug-2023
  • (2023)DJM-CYBER: A Joint Master in Advanced CybersecurityProceedings of the 18th International Conference on Availability, Reliability and Security10.1145/3600160.3605002(1-10)Online publication date: 29-Aug-2023

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and Security
August 2022
1371 pages
ISBN:9781450396707
DOI:10.1145/3538969
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 23 August 2022

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Cybersecurity Education
  2. Job Ads Analyzer
  3. Machine Learning
  4. Skills
  5. Work Roles

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

Conference

ARES 2022

Acceptance Rates

Overall Acceptance Rate 228 of 451 submissions, 51%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)38
  • Downloads (Last 6 weeks)2
Reflects downloads up to 26 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Enhancing Cybersecurity Curriculum Development: AI-Driven Mapping and Optimization TechniquesProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3670467(1-10)Online publication date: 30-Jul-2024
  • (2023)Enhancing Cybersecurity Education in Europe: The REWIRE’s Course Selection MethodologyProceedings of the 18th International Conference on Availability, Reliability and Security10.1145/3600160.3605091(1-7)Online publication date: 29-Aug-2023
  • (2023)DJM-CYBER: A Joint Master in Advanced CybersecurityProceedings of the 18th International Conference on Availability, Reliability and Security10.1145/3600160.3605002(1-10)Online publication date: 29-Aug-2023

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media