نوع مقاله : پژوهشی
نویسندگان
1 دانشجوی دکتری مدیریت دولتی، دانشکدة مدیریت و اقتصاد، واحد علوم و تحقیقات، دانشگاه آزاد اسلامی، تهران، ایران
2 استاد مدیریت دولتی، دانشکده مدیریت و اقتصاد، واحد علوم و تحقیقات، دانشگاه آزاد اسلامی، تهران، ایران
3 دانشیار مدیریت دولتی، دانشکده مدیریت و اقتصاد، واحد علوم و تحقیقات، دانشگاه آزاد اسلامی، تهران، ایران
چکیده
کلیدواژهها
عنوان مقاله [English]
نویسندگان [English]
The realization of cyber security along with the technical and equipment dimensions is in need of expansion and development of competent and efficient human resources. Thus, the main purpose of this research is to design a model for strategic human resource development in the field of cyber security of the Armed Forces of Islamic Republic of Iran. Regarding its purpose and data collection and analysis, this study is applied-developmental and quantitative. In order to attain its goal in the first stage, by extracting 140 indicators, 50 components and 15 dimensions of exploratory studies, a conceptual model was designed. In the second stage, a questionnaire was prepared based on the components of the model. The validity (face and content) and reliability of this instrument were examined by surveying opinions of 8 experts. In the third stage, based on the views of 43 scientific and executive experts in the field of cyber security of the country, using SPSS and PLS software the desirability and relationships of the model components were evaluated. The results of this phase showed that at the level of p ≤ 0.05 out of 20 regulatory hypotheses, except for three hypotheses, i.e. the relationship between staff development apparatuses and jihadi culture; the mediating role of maturity, stakeholders' participation and cooperation in the relationship between their development instruments and enhancement of cyber security governance; and the mediating role of the mentioned mediating variable in the relationship between stakeholders' development apparatuses and the promotion of global indicators of cyber security readiness, other assumptions have been significant. In conclusion, based on the research results, some suggestions have been presented on how to achieve strategic development of human resources in the field of cyber security of the Armed Forces.
کلیدواژهها [English]
الف. منابع فارسی
ب. منابع انگلیسی
1. Alagaraja, Meera, (2013), Mobilizing organizational alignment through strategic human resource development, Human Resource Development International, No. 16.
2. Alfred, Bauer & Mohseni ,Ahooei, (2018), Rearticulating Internet Literacy, Journal of Cyberspace Studies, No. 2.
3. Allen, Julia, Crabb Gregory, D.Curtis Pamela, Nader Mehravari Brendan, & Tobar David, (2015), Structuring the Chief Information Security Officer Organization, Carnegie Mellon University.
4. Ameli, Reza & Ahooei Mohseni, (2018), Internet (Information/Skill) Literacy in Iran. Journal of Cyberspace Studies, No. 2.
5. Bamberger, Peter A, Biron Michal & Meshoulam Ilan, (2014), Human Resource Strategy Formulation, Implementation, and Impact, Second Edition published by Routledge.
6. Brilingaite, Agne, Bukauskas Linas & Juozapavicius Aušrius, (2020), A framework for competence development and assessment in hybrid cybersecurity exercises. Computers & Security.
7. Caulkins Bruce, Bockelman Patricia, Badillo-Urquiola Karla & Leis Rebecca, (2016), Cyber Workforce Development Using a Behavioral Cybersecurity Paradigm, International Conference on Cyber Conflict (CyCon U.S.).
8. Commission on enhancing national cybersecurity, (2016), Report on securing and growing the digital economy, available at: www.iapp.org
9. Cornish, Paul, David Livingstone, Dave Clemente, & York Claire, (2011), Cyber security and UK s critical national infrastructure, Chatham House. available at: www.chathamhouse.org
10. Department of Homeland, (2016), Cybersecurity workforce development toolkit How to Build a Strong Cybersecurity Workforce, at: www.niccs.uscert.gov
11. Garavan, Thomas N & McGuire David, (2010), Human Resource Development and Society: Human Resource Development's Role in Embedding Corporate Social Responsibility, Sustainability, and Ethics in Organizations, Advances in Developing Human Resources, No.12.
12. Hoffman, Lance, Burley Diana & Toregas Costis, (2012), Holistically Building the Cybersecurity Workforce, IEEE Security and Privacy Magazine, No. 10.
13. Hu, Po, (2007), Theorizing Strategic Human Resource Development: Linking Financial Performance and Sustainable Competitive Advantage, Paper presented at the International Research Conference in the Americas of the Academy of Human Resource Development ,Indianapolis.
14. Hyland, Paul, Lee Di Milia, & Karen Becker, (2005), The Role of Human Resource Development in Continuous Improvement: Facilitating Learning and Change. In Proceedings Australia and New Zealand Academy of Management (ANZAM) Operations Management Conference, at available: www.eprints.qut.edu.au
15. International Telecommunication Union, (2018), ITU/BDT Cyber Security Programme Global Cybersecurity Index (GCI), www.itu.int
16. Joseph, Lakatos & Bethany ,Davidson, (2016), The Dynamic Organizational Model: Its Principles, Implementation Methods and Impact on Corporate Culture, The Journal of Global Business Management, No. 12.
17. Khalil, M & Dirani, Christine, (2017), Human resource education in the Middle East region, European Journal of Training and Development, No. 41.
18. Kovacich, Gerald L, (2016), The information systems security officer’s guide Establishing and Managing a Cyber Security Program, Third edition, Published by Elsevier.
19. Koong, Kai, Mohammad Merhi & Jun Sun, (2013), Push and pull effects of homeland information security incentives, Information Management & Computer Security, No. 21.
20. McCracken Martin & Mary Wallace, (2000), Towards a redefinition of strategic HRD, Journal of European Industrial Training, 24 (5), 281-290
21. Mc Goldrick, J. Stewart & S Watson, (2001), Theorizing human resource development, Human resource development international, No. 4.
22. Mercedes, Úbeda, Enrique García, Claver Bartolome & Z Patrocinio, (2016), Toward organizational ambidexterity in the hotel industry: the role of human resources, Cornell Hospitality Quarterly, No. 57.
23. Nadler Leonard, (1992), HRD:Where has it been, where is it going, Studies in Continuing Education, No.14.
24. National center of incident readiness and strategy for cybersecurity, (2011), Information Security Human Resource Development Program, available at: www.nisc.go.jp
25. National Cyber Resilience Leaders’ Board, (2018), A cyber resilience strategy for Scotland, available at: www.gov.scot
26. Peterson, S (2008), Creating and sustaining a strategic partnership: a model for human resource development, Journal of Leadership Studies, No. 2.
27. Sambrook Sally, (2000),Talking of HRD, Human Resource Development International, No. 3.
28. Sambrook Sally, (2001), HRD as an Emergent and Negotiated Evolution: An Ethnographic Case Study in the British National Health Service, Human resource development quarterly, No. 12.
29. Shim, Woohyun, (2015), Agency Problems in Information Security :Theory and Application to Korean Business.
30. Simmonds, David & Cec, Pedersen (2006), HRD: the shapes and things to come, Journal of Workplace Learning, No. 18.
31. Šiugždinien Jurgita, (2008), Enabling characteristics of the strategic human resource development system, Filosofija sociologija, No.19.
32. Tara, Fenwick & Laura, Bierema, (2008), Corporate social responsibility: issues for human resource development professionals, International Journal of Training and Development, No. 12.
33. Tu, Zhiling & Yufei ,Yuan, (2014), Critical Success Factors Analysis on Effective Information Security Management: A Literature Review, Twentieth Americas Conference on Information Systems, Savannah.
34. United Nations Development Programme, (2018), Human Development Indices and Indicators 2018 Statistical Update, available at: www.hdr.undp.org
35. University of Phoenix, (2018), Competency Models for Enterprise Security and Cybersecurity, at available: www.apollo.edu
36. William Newhouse, Keith Stephanie, Scribner Benjamin & Greg Witte, (2017), National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework, publication at: www.doi.org
37. Zeng, Kui, (2016), Exploring cybersecurity requirements in the defense acquisition process, A Dissertation Presented in Partial Fulfillment of the Requirements for the Degree Doctor of Science Capitol technology university.