A performance analysis model for the training and education of information security talents

被引:0
作者
Li L. [1 ,2 ]
Zhang K. [1 ,2 ]
Li T. [1 ,2 ]
机构
[1] Wuhan University of Science and Technology, Wuhan
[2] Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System, Wuhan
基金
中国国家自然科学基金;
关键词
Decision model; Higher education; Information security; Performance analysis; Talent training;
D O I
10.3991/IJET.V15I05.13329
中图分类号
学科分类号
摘要
There are many defects with the existing performance analysis system for the training and education (T&E) of information security talents in Chinese colleges, ranging from the difficulty in transforming fuzzy information to the lack of objectivity. To overcome these defects, this paper develops an improved performance analysis model for the T&E of information security talents. Firstly, the existing analysis strategies for the T&E performance of information security talents were fully analyzed, and a performance analysis indicator system was established through the analysis. Based on the established indicator system, the gray classification and fuzzy information transformation were discussed for the performance analysis. On this basis, a grey clustering model for the T&E of information security talents was constructed, and the realization of the corresponding algorithm was explained in details. The proposed model was proved feasible and effective through case analysis. In addition to theoretical innovation, our model also has a great potential in engineering, because the solving algorithm can effectively process fuzzy information with only a small sample set. © 2019 Kassel University Press GmbH.
引用
收藏
页码:140 / 155
页数:15
相关论文
共 26 条
  • [1] Saeidi P., Saeidi S.P., Sofian S., Saeidi S.P., Nilashi M., Mardani A., The impact of enterprise risk management on competitive advantage by moderating role of information technology, Computer Standards & Interfaces, 63, pp. 67-82, (2019)
  • [2] Melian-Alzola L., Fernandez-Monroy M., Hidalgo-Penate M., Information technology capability and organisational agility: A study in the Canary Islands hotel industry, Tourism Management Perspectives, 33, pp. 1-9, (2020)
  • [3] Deb K., Banerjee S., Chatterjee R.P., Das A., Bag R., Educational website ranking using fuzzy logic and k-means clustering based hybrid method, Ingénierie des Systèmes d'Information, 24, pp. 497-506, (2019)
  • [4] Angraini Alias R.A., Okfalisa, Information Security Policy Compliance: Systematic Literature Review, Procedia Computer Science, 161, pp. 1216-1224, (2019)
  • [5] Haqaf H., Koyuncu M., Understanding key skills for information security managers, International Journal of Information Management, 43, pp. 165-172, (2018)
  • [6] Melamed T., An active man-in-the-middle attack on bluetooth smart devices, International Journal of Safety and Security Engineering, 8, 2, pp. 200-211, (2018)
  • [7] Jacobs R.J., Caballero J., Parmar J., Kane M.N., The role of self-efficacy, flexibility, and gender in pharmacy students' health information technology readiness, Currents in Pharmacy Teaching and Learning, 11, 11, pp. 1103-1110, (2019)
  • [8] Bongiovanni I., The least secure places in the universe? A systematic literature review on information security management in higher education, Computers & Security, 86, pp. 350-357, (2019)
  • [9] Cao T.J., Guo Y., Teaching research and practice of new information security technology under the background of professional accreditation, China Modern Educational Equipmentn, 11, pp. 76-79, (2019)
  • [10] Rajab M., Eydgahi A., Evaluating the explanatory power of theoretical frameworks on intention to comply with information security policies in higher education, Computers & Security, 8, pp. 211-223, (2019)