The Role of Cybersecurity Certifications

2022 ◽  
pp. 93-118
Author(s):  
Adrian Davis

The chapter looks at the burgeoning field of certification for individuals in the field of information security or cybersecurity. Individual information security certifications cover a wide range of topics from the deeply technical to the managerial. These certifications are used as a visible indication of an individual's status and knowledge, used to define experience and status, used in job descriptions and screening, and may define expectations placed on the individual. This chapter examines how these certifications are produced, the subjects they cover, and how they integrate and the various audiences to which the certifications are aimed. The role, the perceived and real value, and benefits of certification within the field of information security both from an individual and an organizational perspective are discussed. Finally, some conclusions on certification are presented.

Author(s):  
Adrian Davis

The chapter looks at the burgeoning field of certification for individuals in the field of information security or cybersecurity. Individual information security certifications cover a wide range of topics from the deeply technical to the managerial. These certifications are used as a visible indication of an individual's status and knowledge, used to define experience and status, used in job descriptions and screening, and may define expectations placed on the individual. This chapter examines how these certifications are produced, the subjects they cover, and how they integrate and the various audiences to which the certifications are aimed. The role, the perceived and real value, and benefits of certification within the field of information security both from an individual and an organizational perspective are discussed. Finally, some conclusions on certification are presented.


Tehnika ◽  
2021 ◽  
Vol 76 (4) ◽  
pp. 509-520
Author(s):  
Nemanja Majstorović ◽  
Vidosav Majstorović ◽  
Radivoje Mitrović ◽  
Žarko Mišković

Basics: Industry 4.0 is a realized reality, which already today has a growing application in medicine and dentistry. So, at this moment, its application is especially important in the fight against covid-19. Aim of the paper: The purpose of this review paper is to understand the role of Industry 4.0 in the field of medicine and dentistry and to identify research directions, including future applications, especially for covid-19. Material and method: A detailed analysis of papers on Industry 4.0 in medicine, dentistry and related fields was performed and possible applications and directions of research were identified, especially for covid-19.Result: Through this review study, we identified different technologies, opportunities and research status of Industry 4.0 in the field of medicine, dentistry and covid-19 pandemic, through 19 areas of application. We can say that Industry 4.0 will become an essential part of tomorrow's smart factory of medical and dental devices. Conclusion: Industry 4.0 shows a wide range of possibilities for the production of newly adapted implants (medical and dental) and innovative tools and instruments for the field of medicine and dentistry. This model enables the creation of a digital clinic and digital office, with a complete system of medical and dental monitoring, which meets the individual requirements of the patient, thus creating the industry of medicine and dentistry with optimization of treatment time and costs. In the future, Industry 4.0 will create new capabilities and innovative protocols for the treatment and care of patients, both in medicine and dentistry.


2016 ◽  
Vol 31 (4) ◽  
pp. 820-836 ◽  
Author(s):  
Kimberly K Merriman ◽  
Sagnika Sen ◽  
Andrew J Felo ◽  
Barrie E Litzky

Purpose – Organizational sustainability has become a priority on many corporate agendas. How to integrate sustainability efforts throughout the organization, however, remains a challenge. The purpose of this paper is to examine two factors that potentially enhance incentive effects on employee engagement in environmental objectives: explicit organizational values for sustainability and the performance objective’s complementarity with incented financial objectives. Design/methodology/approach – The authors employed a quasi-experimental design in which participants were randomly assigned to one of four conditions, including a status quo condition against which the treatments were contrasted. Participants (n=400) were comprised of a cross-section of US employees from a wide range of occupations and industries. A post hoc qualitative analysis provided additional insights. Findings – Incentive effects were enhanced (i.e. preference for the environmental objective was significantly higher) when the environmental project offered complementary benefits for financial objectives, but not when organization values emphasized sustainability. An entrenched status quo bias for financial performance was discerned among a subset of the sample. Research limitations/implications – Management scholars must pay close attention to the role of implicit norms for financial performance when investigating employee engagement in organizational sustainability efforts. From an applied perspective, framing sustainability objectives to emphasize financial benefits consistent with a financial mission may maximize employee engagement. Originality/value – This study contributes to understanding of organizational sustainability efforts at the individual employee level of analysis, a conspicuously small part of the organizational research surrounding this topic.


Author(s):  
R. S. Astashkin

The article attempts to pose the research problem of the place of the Russian state in the process of the expansion of Europeans to the East in the period of the XVIXVII centuries. The actual basis of the proposed topic consists of the numerous attempts by the representatives of the conditional West to use the specifics of the geographical location of the then Russia in order to establish and further develop the contacts with the particular Asian states. The experience of the complex, consistent and comprehensive coverage of this problem today is practically absent both in the domestic and the foreign historiography. The study of the place and role of the Muscovy empire in the process of penetration of the Western European powers, commercial and clerical corporations to the East is possible on the basis of an analysis of a wide range of written sources of Russian and foreign origins. This publication includes an approximate plan (a program) for the subsequent study of the stated issues. It seems appropriate to highlight the independent thematic aspects, among which the following should be named exclusively: the characteristics of the individual routes connecting the Russian lands with the East, the circumstances and consequences of the European travels to Asia in transit through the Russian territory, the participation of the Asian side (in particular, Persia) in the processes and events under consideration. One of the central places in the research program should be occupied by the little-studied question of the Muscovy empires own position on the problem of the European-Asian transit. In addition, the analysis of the historical experience of the intercontinental dialogue directly in the dominions of the Russian tsars is of considerable interest. The article concludes about the unconditional scientific value, prospects and novelty of the formulated problem.


2020 ◽  
Vol 21 (1) ◽  
pp. 1-2
Author(s):  
Swaminathan JN ◽  
Gopi Ram ◽  
Sureka Lanka

The evolution of Internet of Things has given way to a Smart World where there is an improved integration of devices, systems and processes in humans through all pervasive connectivity. Anytime, anywhere connection and transaction is the motto of the Internet of things which brings comfort to the users and sweeps the problem of physical boundary out of the way. Once it has come into the purview of developers, new areas have been identified and new applications have been introduced. Small wearables which can track your health to big automated vehicles which can move from one place to another self navigating without human intervention are the order of the day. This has also brought into existence a new technology called cloud, since with IoT comes a large number of devices connected to the internet continuously pumping data into the cloud for storage and processing. Another area benefited from the evolution of IoT is the wireless and wired connectivity through a wide range of connectivity standards. As with any technology, it has also created a lot of concerns regarding the security, privacy and ethics.   Data protection issues created by new technologies are a threat which has been recognized by developers, public and also the governing body long back. The complexity of the system arises because of the various sensors and technologies which clearly tell the pattern of the activities of the individual as well an organization making us threat prone. Moreover, the volume of the data in the cloud makes it too difficult to recognize the privacy requirement of the data or to segregate open data from private data. Data analytics is another technology which supposedly increases the opportunity of increasing business by studying this private data collected from IoT and exploring ways to monetize them. It also helps the individual by recognizing their priorities and narrowing their search. But the data collected are real world data and aggregation of this data in the cloud is an open invitation to the hackers to study about the behaviors of the individuals.   The special issues of Scalable Computing has attract related to the Role of Scalable Computing and Data Analytics in Evolution of Internet of Things has attracted 28 submissions from which were selected 12.    


Author(s):  
Phillip Brown

This chapter discusses the history of human capital theory. Before the mid-twentieth century the idea of human capital had a checkered history. Ideas linking the role of human labor to wealth creation can be traced to the works of Aristotle, Ibn Khaldun, and Thomas Aquinas. The chapter examines the ideas posed by notable economic theorists and thinkers such as Adam Smith, Alfred Marshall, Theodore Schultz, and Gary Becker. It shows how the ideas developed by these thinkers extended to a wide range of issues concerning the relationship between education and the labor market. In turn, they were able to influence policy in such powerful ways that their legacy remains. Above all, their influence shaped the way education is viewed in many countries: as an investment in the economic fortunes of the individual and the nation. This view gradually emerged as the dominant one, but was triumphantly sealed by the advent of neoliberalism in the 1980s.


Author(s):  
Mariia Kryvets

The purpose of the article is to determine the role of public libraries in ensuring the information securityof the individual and to establish the formation of its media education. Analyze the practice of teaching medialiteracy in libraries. The methodology consists of the application of general scientific methods of analysis and synthesis, generalization, and review-analytical description, which revealed the place and role of publiclibraries in the formation of personal media literacy and information security of the individual. The scientificnovelty is that the information security of the individual is considered in the context of media literacy andthrough the prism of library activities for the formation of media literacy of users. Conclusions. As a resultof the research, it is determined that - issues of information security of the individual are not considered atthe legislative level, to the appropriate extent, and the main attention is paid to the information security ofthe state. Information security of the individual is an interdisciplinary concept that is studied by scholarsin law, information and library affairs, journalism, computer technology, psychology, sociology, pedagogy,etc. Information security of the individual is an interdisciplinary concept that is studied by scholars in law,information and library affairs, journalism, computer technology, psychology, sociology, pedagogy, etc. It hasbeen proven that the information security of an individual depends on the level of his media literacy, ability tocritically evaluate information, identify unreliable – fake or ordered information that is misleading, to resistpropaganda and manipulation. Modern public libraries play an important role in shaping the media educationof citizens, in particular through their educational and educational activities. Media literacy training is heldon the basis of libraries. Libraries create information materials on this topic, select appropriate informationsources and resources, hold mass events on this topic.Keywords: informational security, media literacy, public library, information.


Sign in / Sign up

Export Citation Format

Share Document