Abstract
This article identifies and classifies the core and additional soft skills required not only by engineers that design the security measures against cyber extremism but by other professionals in the field of cybersecurity. Furthermore, it recommends steps in how these competencies may be developed and evolved. IT-based solutions rely on the process of cognition-extrapolation-algorithm-programming from problem identification to the final product delivery. In all approaches to problem-solving, regardless of the nature of the challenge, the end product is only as good as the parameters that define the programming scope. The program capability and scope are defined by the creativity of its creators. Thus, when creating robust security measures that are designed to guard against cyberattacks by extremists, IT measures are only as useful as the creativity of the designer in the cognition-extrapolation phases of product design. Unexpectedly, this implies that the technical-based capabilities of technologically engineered solutions rely on soft human skills in order to have a practical application Additionally, as engineered products become more complex, work packages are broken down even further to more significant numbers of programmers and thus are even further devoid of individual creativity which is grounded and substantiated by soft skills.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
The term hactivism is coined to define hacking with political motives. See in: Klein, J. J.: Deterring and Dissuading Cyberterrorism. Journal of Strategic Security 8, no. 4 (2015): 23–38. DOI: http://dx.doi.org/10.5038/1944-0472.8.4.1460. Available at: http://scholarcommons.usf.edu/jss/vol8/iss4/2.
- 2.
The term swarming is used for simultaneous accessing a website by hundreds or thousands of people. Weimann, G.: Cyberterrorism How Real Is the Threat? Special Report 219. United States Institute of Peace. Washington DC (2004).
References
Awan, I.: Cyber-extremism: isis and the power of social media. Society 54(2), 138–149 (2017). https://doi.org/10.1007/s12115-017-0114-0
Brunst, P.W.: Terrorism and the internet: new threats posed by cyberterrorism and terrorist use of the internet. In: Wade, M., Maljević (eds.) A War on Terror?: The European Stance on a New Threat, Changing Laws and Human Rights Implications. Springer Science + Business Media, LLC (2010). https://doi.org/10.1007/978-0-387-89291-7_2
Canadian Psychological Association. The pre-employment clinical assessment of police candidates: principles and guidelines for Canadian Psychologists (2013). http://www.cpa.ca/docs/File/News/2013-07/Police%20assess%20guidelines%20April2013final.pdf. Accessed 15 May 2015
Carlton, M., Levy, Y.: Cybersecurity skills: foundational theory and the cornerstone of advanced persistent threats (APTs) mitigation. Online J. Appl. Knowl. Manag. 5(2) (2017). A Publication of the International Institute for Applied Knowledge Management
Carter, D.L.: Law enforcement intelligence: a guide for state, local, and tribal law enforcement agencies. COPS Program (2006). http://www.cops.usdoj.gov/pdf/e09042536.pdf. Accessed 15 May 2015
Chenoweth, J.H.: Situational tests – a new attempt at assessing police candidates. J. Crim. Law Criminol. Police 52(2) (1961)
College of Policing: Fast track national assessment centre for serving constables. Overview for candidates. College of Policing Limited, UK (2015)
Oxford Dictionary. https://en.oxforddictionaries.com/definition/cyberterrorism. Accessed 20 June 2018
Deloitte Center for Industry Insights: The cybersecurity talent shortage. an emerging challenge for consumer products companies. Deloitte Development LLC (2018)
Denning, D.E.: Activism, hacktivism, and cyberterrorism: the internet as a tool for influencing foreign policy. In: Arquilla, J., Ronfeldt, D.F. (eds.) Networks and Netwars: The Future of Terror, Crime, and Militancy, pp. 239–288 (2001)
Dessler, G.: Human Resources Management. Global Edition, Pearson (2013)
EUROPOL: Europol internet referral unit to combat terrorist and violent extremist propaganda, 2015 (2011). https://www.europol.europa.eu/content/europol%E2%80%99s-internetreferral-unit-combat-terrorist-and-violent-extremist-propaganda. Accessed 25 June 2018
Harvard Business Review: Hiring and Keeping the Best People. Harvard Business School Press, Boston, MA (2003)
HM Government: Cyber security skills: A guide for business. Getting involved with skills and research initiatives. London, UK (2014)
House of Lords House of Commons. Joint Committee on the National Security Strategy: Cyber Security Skills and the UK’s Critical National Infrastructure. Second Report of Session 2017–19 (2018)
Jerman-Blažic, B., Klobucar, T.: Missing solutions in the fight against cybercrime and cyberterrorism – the new EU research agenda. In: 2016 European Intelligence and Security Informatics Conference. IEEE (2016)
Keith, S.: Fear-mongering or fact: the construction of ‘cyber-terrorism’ in U.S., U.K, and Canadian news media. A paper presented at Safety and Security in a Networked World: Balancing Cyber-Rights and Responsibilities sponsored by the Oxford Internet Institute, 8–10 Sept 2005. Oxford, England (2005)
Lutz, J.M., Lutz, B.J.: Definitions, classifications, and causes. In: Terrorism. Palgrave Macmillan, New York (2005)
Matusitz, J.: Social network theory: a comparative analysis of the Jewish revolt in antiquity and the cyber terrorism incident over Kosovo. Inf. Secur. J. Glob. Perspect. 20, 34–44 (2011). https://doi.org/10.1080/19393555.2010.544702
Moteff, J.D.: Critical Infrastructures: Background, Policy, and Implementation. Congressional Research Service, Washington, DC (2015)
Özeren, S.: Cyberterrorism and international cooperation: general overview of the available mechanisms to facilitate an overwhelming task. In: Responses to Cyber Terrorism Centre of Excellence Defence Against Terrorism, Ankara, Turkey (ed.). IOS Press (2008)
Parks, R.C., Duggan, D.P.: Principle of cyber-warfare. In: Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, West Point, NY (2001)
Rollins, J., Wilson, C.: Terrorist Capabilities for Cyberattack: Overview and Policy Issues. Washington, DC (2007)
Tomić, D., Ilić-Kosanović, T., Ilić, D.: Selekcija kadrova i njihova uloga u inženjeringu protivterorističke odbrane. Zbornik radova. Beograd: Visoka škola strukovnih studija za ekonomiju i upravu, Centar za ekonomska istraživanja (CEIB), 2015, str. 137-142. (Selection of candidates and its role in engineering antiterrorist defence. College for economics and management. Centre for economic research)
United Nations Counter-Terrorism Implementation Task Force: Countering the use of the internet for terrorist purposes - legal and technical aspects. United Nations Department of Political Affairs Counter-Terrorism Implementation Task Office Working Group Compendium (2011)
United Nations: Measures to eliminate international terrorism. A/RES/51/210 88th plenary meeting, 17 Dec 1996 (1996)
United States Department of Justice, Federal Bureau of Investigation: Report to the National Commission on Terrorist Attacks upon the United States: The FBI’s Counterterrorism Program Since September 2001. United States Department of Justice, Federal Bureau of Investigation, Washington DC (2004)
Workforce Intelligence Network for Southeast Michigan: Cybersecurity skills gap analysis. National and Advance Michigan Regional Data. Workforce Intelligence Network, Michigan (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Tomašević, V., Ilić-Kosanović, T., Ilić, D. (2020). Skills Engineering in Sustainable Counter Defense Against Cyber Extremism. In: Al-Masri, A., Al-Assaf, Y. (eds) Sustainable Development and Social Responsibility—Volume 2. Advances in Science, Technology & Innovation. Springer, Cham. https://doi.org/10.1007/978-3-030-32902-0_25
Download citation
DOI: https://doi.org/10.1007/978-3-030-32902-0_25
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-32901-3
Online ISBN: 978-3-030-32902-0
eBook Packages: Earth and Environmental ScienceEarth and Environmental Science (R0)