Using Online Job Postings to Analyze Differences in Skill Requirements of Information Security Consultants: South Korea versus United States

نویسندگان

  • Sung-Kyu Park
  • Hyo-Jung Jun
  • Tae-Sung Kim
چکیده

The disproportionate supply/demand ratio of information security consultant manpower is worsening yearly. It is necessary to analyze the specialized knowledge and skills required of information security consultants in their fulfilling job responsibilities, and to reflect the findings in developing and operating training programs. To identify the job requirements of information security consultants across industries, the present paper comparatively analyzed job descriptions posted on monster.com and jobkorea.co.kr sites. Based on the analysis results, the present study defined the job requirements and selected certain items of knowledge and skills valued across industries to help lay the foundation for training programs conducive to demand-oriented manpower cultivation.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Examining the effectiveness of initial response training program for nuclear emergency preparedness

Background: Although nuclear technology has various beneficial, it also has a variety of risks. In particular, initial response is very import to respond to risks. Therefore, the program to increase initial response proficiency can be regarded as very essential. The Republic of Korea annually conducts more than 10 nuclear emergency response training programs, and specialized training courses f...

متن کامل

A Tale of Two Cities: Information Security Policy Compliance of the Banking Industry in the United States and South Korea

This study compares the information security policy (ISP) compliance of the banking industry between the United States and South Korea. The distinctive differences of national culture between both nations has led to meaningful findings of ISP compliance at the organizational and individual levels. Drawing on the Cross Value Framework (CVF), this study conducted a survey and distributed question...

متن کامل

The United States National Security Strategy under Bush and Obama: Continuity and Change

The foreign policy of states determines the way they behave in the international arena. Accurate analysis of official foreign policy documents of a country is helpful in that it shows what the international priorities of a country are at specific periods. This article reviews the U.S. National Security Strategy documents published in 2002, 2006, 2010 and 2015 from the perspective of the percept...

متن کامل

The Place of Desecuritization in the Relations between South Korea and the Islamic World

Objective: South Korea’s relations with the countries of the Muslim world can be seen as having mutual and common interests for both sides. Relationships that are remarkable in the context of relations between a middle power and a great civilization, but in many cases have been challenged due to the considerations of great powers, especially the securitization of issues in the ...

متن کامل

Analysis and Evaluation of Privacy Protection Behavior and Information Disclosure Concerns in Online Social Networks

Online Social Networks (OSN) becomes the largest infrastructure for social interactions like: making relationship, sharing personal experiences and service delivery. Nowadays social networks have been widely welcomed by people. Most of the researches about managing privacy protection within social networks sites (SNS), observes users as owner of their information. However, individuals cannot co...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015