<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Harri Ruoslahti</style></author><author><style face="normal" font="default" size="100%">Janel Coburn</style></author><author><style face="normal" font="default" size="100%">Amir Trent</style></author><author><style face="normal" font="default" size="100%">Ilkka Tikanmäki</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cyber Skills Gaps – A Systematic Review of the Academic Literature</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cyber skills</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber training</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">e-learning</style></keyword><keyword><style  face="normal" font="default" size="100%">society</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2021</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Spring 2021</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">20</style></volume><pages><style face="normal" font="default" size="100%">33-45</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This literature review is part of research on the roles of and training for e-skills in modern society, specifically, the role of cyber skills. This article explores how the academic literature discusses cyber skills and identifies e-skills that can be determined as necessary for the functioning of society today. First, the introduction provides an explanation of the overall impact of cyber skills in our modern-day society. Next, the body presents the method used to conduct the review and a concise summary of the findings to answer our research questions. Finally, based on the research findings, the conclusions address the feasibility, impact, strengths, weaknesses, and possible ethical concerns.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">33</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Aleksandar Klaic</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Method for the Development of Cyber Security Strategies</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">action plan</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber security</style></keyword><keyword><style  face="normal" font="default" size="100%">cyberspace</style></keyword><keyword><style  face="normal" font="default" size="100%">goals</style></keyword><keyword><style  face="normal" font="default" size="100%">method</style></keyword><keyword><style  face="normal" font="default" size="100%">scope</style></keyword><keyword><style  face="normal" font="default" size="100%">society</style></keyword><keyword><style  face="normal" font="default" size="100%">strategy</style></keyword><keyword><style  face="normal" font="default" size="100%">vision</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2016</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2016</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">34</style></volume><pages><style face="normal" font="default" size="100%">37-55</style></pages><abstract><style face="normal" font="default" size="100%">Cyberspace has become an intrinsic part of today’s society by creating a distinct virtual dimension in its functioning. Nations and the international community invest significant efforts to assure certain terms and responsibilities in this virtual dimension. The elaboration of national, NATO and EU cyber security strategies in a very short time received a high priority. The questions about the responsible institutions assigned in the strategies, guiding principles to follow, and the way of implementation are approached differently by different nations. The goal of this article is to propose a method that offers a more consistent approach to the development of cyber security strategies. The key research question is whether the proposed approach results in a more consistent national cyber security strategy that covers all the necessary national requirements and expectations, and thus makes it easier to harmonise with the variety of international requirements. In order to verify the proposed method, the article presents a brief overview of the results achieved in the case of the development process of Croatia’s National Cyber Security Strategy.
</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">37</style></section></record></records></xml>