1 |
Author(s):
Ervin Frenzel, Ian McAndrew.
Page No : 1-7
|
Identifying and Engaging Adjoining Career Fields to Increase Cybersecurity Training Efficacy
Abstract
Abstract
This paper provides a recommendation guide for connecting existing career fields to various cybersecurity countermeasures to correct an oversight that has long haunted the people, processes, and technology model. The belief cybersecurity only deals with securing technology prevents incorporation of needed skill sets to counter the lack of people skills associated with technology and technologists. Incorporation of people skill experts can greatly enhance the effectiveness of techniques to counter attacks against the people security countermeasure. Analysis of ACM, IEEE, and other existing cybersecurity documentation indicate a need increase training in the people and processes countermeasures to effectively train cybersecurity technicians. ACM and IEEE technology specialists recognize a lack of non-technical skills within the technical fields, technologists need to embrace non-technical specialists who can broaden the base knowledge within cybersecurity. The researched documentation further indicated a potential to cross specialists in the people and processes countermeasures into the cybersecurity career field. Cybersecurity is only effective is all three countermeasures; people, processes, and technology are addressed within an organization. Training technology has long been used as effective cybersecurity training; in truth it is only addressing technology security. To maximize cybersecurity, specialists in the people and processes countermeasures must be brought in to aid training in all of the countermeasures.
Keywords: cybersecurity skills training, non-technical cybersecurity skills training, security countermeasures skills development
2 |
Author(s):
Ervin Frenzel, Ian McAndrew.
Page No : 1-8
|
Cybersecurity: Revealing the Legalized Profession
Abstract
Abstract
The cybersecurity profession is composed of recognized occupations accepted both nationally and internationally. Little effort has taken place to formally define the cybersecurity profession, although significant work focuses on cybersecurity task identification. Formal recognition of several professions, including cybersecurity, occurs through ISO and ANSI treaty, a treaty derived from US Legislative authority granted by the US Constitution. Analysis of current treaties and constitutional authority provides a basis for understanding, recognizing, and legalizing existing professions. This study focuses on identifying underlying contributions which provide a solid legal foundation for recognition of the multiple professions including cybersecurity in the US, without identifying individual skill sets belonging to the major technology branches of the governing technology associations.
Index Terms: US constitutional powers, defining the cybersecurity profession, legalizing professions
3 |
Author(s):
McKell W Sanderson, Linda F. Martin.
Page No : 1-15
|
Technical paper: Challenges with Risk Management in Safety
Abstract
Abstract: Much emphasis has been placed on the adaptation of risk management tools/principles for the safety profession. This article reviews some of the challenges that the safety industry faces in the adoption of risk management tools. Additionally, this article focuses on a few of the most common tools that have been implemented, and highlights some of the deficiencies, as well as offers suggestions for improvement.
4 |
Author(s):
David G. I. Heinrich, Ian McAndrew, Jeremy Pretty.
Page No : 1-15
|
Automation, Alarm Management, and Human-Computer Interaction in Space Operations Environments
Abstract
Abstract: Data from an online human factors survey of 59 remote operations professionals was analyzed to understand how automation, alarm management, and human-computer interaction affect dynamic shift work pattern workers. This research found a need for increased vigilance when working with automated systems, specifically in space operations. Subsequently, the study suggests that training and crew resource management are critical components of an effective operations center. Informed crews who work efficiently as a team are better able to mitigate automation bias, ineffective alarm management, and less than optimal human-computer interaction implementation. Furthermore, incorporating lessons learned in space operations programs could help decrease overall risk to individual on-orbit assets if leaders invest in proper documentation and continuity concepts while also prioritizing incorporating outside lessons learned into their programs.
Index Terms: Automation, Alarm Management, Human-Computer Interaction
5 |
Author(s):
Cezary Przęczek.
Page No : 1-16
|
Analysis of Recruitment E-forms in Terms of Compliance of the Scope of Data Obtained about Job Candidates with the Provisions of Polish Labor Law
Abstract
Each organization is faced with the problem of recruiting staff to meet the needs of the tasks
carried out in the organization. This process is becoming more and more complicated every
year, among others, due to the greater mobility of employees, and thus the increase in the
number of applications for open positions in recruitment processes. One of the key stages of
the recruitment process is to obtain relevant information concerning job applicants. The purpose
of this article is to present the results of the survey on a group of 76 organizations that conduct
online recruitment in Krakow (Poland) in terms of obtaining data on employees by these
organizations within the framework of the applicable legal framework in this area. In the case
of more than half of the organizations analyzed (52.63%), they collected redundant data on job
applicants, thus exceeding the scope of data collection permitted by the provisions of Polish
labor law.
6 |
Author(s):
Ervin Henry Frenzel, Ian McAndrew.
Page No : 1-16
|
Component Security vs. Cybersecurity: Defining Next Generation Cybersecurity
Abstract
The cybersecurity profession is composed of recognized occupations accepted both nationally and internationally. Little effort has taken place to formally define the cybersecurity profession, although significant work focuses on cybersecurity task identification. Formal recognition of several professions, including cybersecurity, occurs through ISO and ANSI treaty, a treaty derived from US Legislative authority granted by the US Constitution. Analysis of current treaties and constitutional authority provides a basis for understanding, recognizing, and legalizing existing professions. This study focuses on identifying underlying contributions which provide a solid legal foundation for recognition of the multiple professions including cybersecurity in the US, without identifying individual skill sets belonging to the major technology branches of the governing technology associations.
7 |
Author(s):
Ryan Silvia.
Page No : 1-17
|
Reductions in Life and Property Loss by Home Fire Sprinklers
Abstract
This research article aims to answer whether areas that have adopted residential fire sprinkler codes experienced statistically significant reductions in life and property loss in sprinklered homes. The study conducted an extensive literature review as well as an analysis of the most current home fire sprinkler data from the state of California. The data collected for this article supports the hypothesis that home fire sprinklers provide a significant property protection benefit and a substantial reduction in fire injuries and deaths for the civilian population. In the five years of data provided by the California Office of the State Fire Marshal, sprinklered homes showed a decrease in property loss of 48% or more in every year except for 2021. Civilian fire injuries and deaths were practically non-existent in fires involving sprinklered homes, and firefighter injuries were also substantially reduced. However, the study is limited by the small sample size of fires where a home fire sprinkler was documented to operate. This is due to both the relatively small number of homes in the United States equipped with fire sprinklers and the inconsistent data collection regarding their use. Fire departments and home fire sprinkler advocates should endeavor to highlight the potential property conservation benefits of home fire sprinklers alongside the life safety benefits in their public education efforts. The fire service must also strive to improve the data collection regarding home fire sprinklers by increasing mandatory reporting requirements for fire sprinklers and should consider working collaboratively with home fire sprinkler advocacy groups to establish a database where fire incidents involving home fire sprinkler systems can be reported.
Keywords: sprinklers, fire service, fire protection systems, fire suppression technology, home fire safety