Skip to main content

Skills Engineering in Sustainable Counter Defense Against Cyber Extremism

  • Conference paper
  • First Online:
  • 805 Accesses

Part of the book series: Advances in Science, Technology & Innovation ((ASTI))

Abstract

This article identifies and classifies the core and additional soft skills required not only by engineers that design the security measures against cyber extremism but by other professionals in the field of cybersecurity. Furthermore, it recommends steps in how these competencies may be developed and evolved. IT-based solutions rely on the process of cognition-extrapolation-algorithm-programming from problem identification to the final product delivery. In all approaches to problem-solving, regardless of the nature of the challenge, the end product is only as good as the parameters that define the programming scope. The program capability and scope are defined by the creativity of its creators. Thus, when creating robust security measures that are designed to guard against cyberattacks by extremists, IT measures are only as useful as the creativity of the designer in the cognition-extrapolation phases of product design. Unexpectedly, this implies that the technical-based capabilities of technologically engineered solutions rely on soft human skills in order to have a practical application Additionally, as engineered products become more complex, work packages are broken down even further to more significant numbers of programmers and thus are even further devoid of individual creativity which is grounded and substantiated by soft skills.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    The term hactivism is coined to define hacking with political motives. See in: Klein, J. J.: Deterring and Dissuading Cyberterrorism. Journal of Strategic Security 8, no. 4 (2015): 23–38. DOI: http://dx.doi.org/10.5038/1944-0472.8.4.1460. Available at: http://scholarcommons.usf.edu/jss/vol8/iss4/2.

  2. 2.

    The term swarming is used for simultaneous accessing a website by hundreds or thousands of people. Weimann, G.: Cyberterrorism How Real Is the Threat? Special Report 219. United States Institute of Peace. Washington DC (2004).

References

  • Awan, I.: Cyber-extremism: isis and the power of social media. Society 54(2), 138–149 (2017). https://doi.org/10.1007/s12115-017-0114-0

    Article  Google Scholar 

  • Brunst, P.W.: Terrorism and the internet: new threats posed by cyberterrorism and terrorist use of the internet. In: Wade, M., Maljević (eds.) A War on Terror?: The European Stance on a New Threat, Changing Laws and Human Rights Implications. Springer Science + Business Media, LLC (2010). https://doi.org/10.1007/978-0-387-89291-7_2

    Google Scholar 

  • Canadian Psychological Association. The pre-employment clinical assessment of police candidates: principles and guidelines for Canadian Psychologists (2013). http://www.cpa.ca/docs/File/News/2013-07/Police%20assess%20guidelines%20April2013final.pdf. Accessed 15 May 2015

  • Carlton, M., Levy, Y.: Cybersecurity skills: foundational theory and the cornerstone of advanced persistent threats (APTs) mitigation. Online J. Appl. Knowl. Manag. 5(2) (2017). A Publication of the International Institute for Applied Knowledge Management

    Google Scholar 

  • Carter, D.L.: Law enforcement intelligence: a guide for state, local, and tribal law enforcement agencies. COPS Program (2006). http://www.cops.usdoj.gov/pdf/e09042536.pdf. Accessed 15 May 2015

  • Chenoweth, J.H.: Situational tests – a new attempt at assessing police candidates. J. Crim. Law Criminol. Police 52(2) (1961)

    Article  Google Scholar 

  • College of Policing: Fast track national assessment centre for serving constables. Overview for candidates. College of Policing Limited, UK (2015)

    Google Scholar 

  • Oxford Dictionary. https://en.oxforddictionaries.com/definition/cyberterrorism. Accessed 20 June 2018

  • Deloitte Center for Industry Insights: The cybersecurity talent shortage. an emerging challenge for consumer products companies. Deloitte Development LLC (2018)

    Google Scholar 

  • Denning, D.E.: Activism, hacktivism, and cyberterrorism: the internet as a tool for influencing foreign policy. In: Arquilla, J., Ronfeldt, D.F. (eds.) Networks and Netwars: The Future of Terror, Crime, and Militancy, pp. 239–288 (2001)

    Google Scholar 

  • Dessler, G.: Human Resources Management. Global Edition, Pearson (2013)

    Google Scholar 

  • EUROPOL: Europol internet referral unit to combat terrorist and violent extremist propaganda, 2015 (2011). https://www.europol.europa.eu/content/europol%E2%80%99s-internetreferral-unit-combat-terrorist-and-violent-extremist-propaganda. Accessed 25 June 2018

  • Harvard Business Review: Hiring and Keeping the Best People. Harvard Business School Press, Boston, MA (2003)

    Google Scholar 

  • HM Government: Cyber security skills: A guide for business. Getting involved with skills and research initiatives. London, UK (2014)

    Google Scholar 

  • House of Lords House of Commons. Joint Committee on the National Security Strategy: Cyber Security Skills and the UK’s Critical National Infrastructure. Second Report of Session 2017–19 (2018)

    Google Scholar 

  • Jerman-Blažic, B., Klobucar, T.: Missing solutions in the fight against cybercrime and cyberterrorism – the new EU research agenda. In: 2016 European Intelligence and Security Informatics Conference. IEEE (2016)

    Google Scholar 

  • Keith, S.: Fear-mongering or fact: the construction of ‘cyber-terrorism’ in U.S., U.K, and Canadian news media. A paper presented at Safety and Security in a Networked World: Balancing Cyber-Rights and Responsibilities sponsored by the Oxford Internet Institute, 8–10 Sept 2005. Oxford, England (2005)

    Google Scholar 

  • Lutz, J.M., Lutz, B.J.: Definitions, classifications, and causes. In: Terrorism. Palgrave Macmillan, New York (2005)

    Google Scholar 

  • Matusitz, J.: Social network theory: a comparative analysis of the Jewish revolt in antiquity and the cyber terrorism incident over Kosovo. Inf. Secur. J. Glob. Perspect. 20, 34–44 (2011). https://doi.org/10.1080/19393555.2010.544702

    Article  Google Scholar 

  • Moteff, J.D.: Critical Infrastructures: Background, Policy, and Implementation. Congressional Research Service, Washington, DC (2015)

    Google Scholar 

  • Özeren, S.: Cyberterrorism and international cooperation: general overview of the available mechanisms to facilitate an overwhelming task. In: Responses to Cyber Terrorism Centre of Excellence Defence Against Terrorism, Ankara, Turkey (ed.). IOS Press (2008)

    Google Scholar 

  • Parks, R.C., Duggan, D.P.: Principle of cyber-warfare. In: Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, West Point, NY (2001)

    Google Scholar 

  • Rollins, J., Wilson, C.: Terrorist Capabilities for Cyberattack: Overview and Policy Issues. Washington, DC (2007)

    Google Scholar 

  • Tomić, D., Ilić-Kosanović, T., Ilić, D.: Selekcija kadrova i njihova uloga u inženjeringu protivterorističke odbrane. Zbornik radova. Beograd: Visoka škola strukovnih studija za ekonomiju i upravu, Centar za ekonomska istraživanja (CEIB), 2015, str. 137-142. (Selection of candidates and its role in engineering antiterrorist defence. College for economics and management. Centre for economic research)

    Google Scholar 

  • United Nations Counter-Terrorism Implementation Task Force: Countering the use of the internet for terrorist purposes - legal and technical aspects. United Nations Department of Political Affairs Counter-Terrorism Implementation Task Office Working Group Compendium (2011)

    Google Scholar 

  • United Nations: Measures to eliminate international terrorism. A/RES/51/210 88th plenary meeting, 17 Dec 1996 (1996)

    Google Scholar 

  • United States Department of Justice, Federal Bureau of Investigation: Report to the National Commission on Terrorist Attacks upon the United States: The FBI’s Counterterrorism Program Since September 2001. United States Department of Justice, Federal Bureau of Investigation, Washington DC (2004)

    Google Scholar 

  • Workforce Intelligence Network for Southeast Michigan: Cybersecurity skills gap analysis. National and Advance Michigan Regional Data. Workforce Intelligence Network, Michigan (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vladimir Tomašević .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tomašević, V., Ilić-Kosanović, T., Ilić, D. (2020). Skills Engineering in Sustainable Counter Defense Against Cyber Extremism. In: Al-Masri, A., Al-Assaf, Y. (eds) Sustainable Development and Social Responsibility—Volume 2. Advances in Science, Technology & Innovation. Springer, Cham. https://doi.org/10.1007/978-3-030-32902-0_25

Download citation

Publish with us

Policies and ethics