Document Type : research Artichel
Authors
1 PhD Student in Public Administration, Faculty of Management and Economics, Science and Research Branch, Islamic Azad University, Tehran, Iran
2 Professor of Public Administration, Faculty of Management and Economics, Science and Research Branch, Islamic Azad University, Tehran, Iran
3 Associate Professor of Public Administration, Faculty of Management and Economics, Science and Research Branch, Islamic Azad University, Tehran, Iran
Abstract
Keywords
الف. منابع فارسی
ب. منابع انگلیسی
1. Alagaraja, Meera, (2013), Mobilizing organizational alignment through strategic human resource development, Human Resource Development International, No. 16.
2. Alfred, Bauer & Mohseni ,Ahooei, (2018), Rearticulating Internet Literacy, Journal of Cyberspace Studies, No. 2.
3. Allen, Julia, Crabb Gregory, D.Curtis Pamela, Nader Mehravari Brendan, & Tobar David, (2015), Structuring the Chief Information Security Officer Organization, Carnegie Mellon University.
4. Ameli, Reza & Ahooei Mohseni, (2018), Internet (Information/Skill) Literacy in Iran. Journal of Cyberspace Studies, No. 2.
5. Bamberger, Peter A, Biron Michal & Meshoulam Ilan, (2014), Human Resource Strategy Formulation, Implementation, and Impact, Second Edition published by Routledge.
6. Brilingaite, Agne, Bukauskas Linas & Juozapavicius Aušrius, (2020), A framework for competence development and assessment in hybrid cybersecurity exercises. Computers & Security.
7. Caulkins Bruce, Bockelman Patricia, Badillo-Urquiola Karla & Leis Rebecca, (2016), Cyber Workforce Development Using a Behavioral Cybersecurity Paradigm, International Conference on Cyber Conflict (CyCon U.S.).
8. Commission on enhancing national cybersecurity, (2016), Report on securing and growing the digital economy, available at: www.iapp.org
9. Cornish, Paul, David Livingstone, Dave Clemente, & York Claire, (2011), Cyber security and UK s critical national infrastructure, Chatham House. available at: www.chathamhouse.org
10. Department of Homeland, (2016), Cybersecurity workforce development toolkit How to Build a Strong Cybersecurity Workforce, at: www.niccs.uscert.gov
11. Garavan, Thomas N & McGuire David, (2010), Human Resource Development and Society: Human Resource Development's Role in Embedding Corporate Social Responsibility, Sustainability, and Ethics in Organizations, Advances in Developing Human Resources, No.12.
12. Hoffman, Lance, Burley Diana & Toregas Costis, (2012), Holistically Building the Cybersecurity Workforce, IEEE Security and Privacy Magazine, No. 10.
13. Hu, Po, (2007), Theorizing Strategic Human Resource Development: Linking Financial Performance and Sustainable Competitive Advantage, Paper presented at the International Research Conference in the Americas of the Academy of Human Resource Development ,Indianapolis.
14. Hyland, Paul, Lee Di Milia, & Karen Becker, (2005), The Role of Human Resource Development in Continuous Improvement: Facilitating Learning and Change. In Proceedings Australia and New Zealand Academy of Management (ANZAM) Operations Management Conference, at available: www.eprints.qut.edu.au
15. International Telecommunication Union, (2018), ITU/BDT Cyber Security Programme Global Cybersecurity Index (GCI), www.itu.int
16. Joseph, Lakatos & Bethany ,Davidson, (2016), The Dynamic Organizational Model: Its Principles, Implementation Methods and Impact on Corporate Culture, The Journal of Global Business Management, No. 12.
17. Khalil, M & Dirani, Christine, (2017), Human resource education in the Middle East region, European Journal of Training and Development, No. 41.
18. Kovacich, Gerald L, (2016), The information systems security officer’s guide Establishing and Managing a Cyber Security Program, Third edition, Published by Elsevier.
19. Koong, Kai, Mohammad Merhi & Jun Sun, (2013), Push and pull effects of homeland information security incentives, Information Management & Computer Security, No. 21.
20. McCracken Martin & Mary Wallace, (2000), Towards a redefinition of strategic HRD, Journal of European Industrial Training, 24 (5), 281-290
21. Mc Goldrick, J. Stewart & S Watson, (2001), Theorizing human resource development, Human resource development international, No. 4.
22. Mercedes, Úbeda, Enrique García, Claver Bartolome & Z Patrocinio, (2016), Toward organizational ambidexterity in the hotel industry: the role of human resources, Cornell Hospitality Quarterly, No. 57.
23. Nadler Leonard, (1992), HRD:Where has it been, where is it going, Studies in Continuing Education, No.14.
24. National center of incident readiness and strategy for cybersecurity, (2011), Information Security Human Resource Development Program, available at: www.nisc.go.jp
25. National Cyber Resilience Leaders’ Board, (2018), A cyber resilience strategy for Scotland, available at: www.gov.scot
26. Peterson, S (2008), Creating and sustaining a strategic partnership: a model for human resource development, Journal of Leadership Studies, No. 2.
27. Sambrook Sally, (2000),Talking of HRD, Human Resource Development International, No. 3.
28. Sambrook Sally, (2001), HRD as an Emergent and Negotiated Evolution: An Ethnographic Case Study in the British National Health Service, Human resource development quarterly, No. 12.
29. Shim, Woohyun, (2015), Agency Problems in Information Security :Theory and Application to Korean Business.
30. Simmonds, David & Cec, Pedersen (2006), HRD: the shapes and things to come, Journal of Workplace Learning, No. 18.
31. Šiugždinien Jurgita, (2008), Enabling characteristics of the strategic human resource development system, Filosofija sociologija, No.19.
32. Tara, Fenwick & Laura, Bierema, (2008), Corporate social responsibility: issues for human resource development professionals, International Journal of Training and Development, No. 12.
33. Tu, Zhiling & Yufei ,Yuan, (2014), Critical Success Factors Analysis on Effective Information Security Management: A Literature Review, Twentieth Americas Conference on Information Systems, Savannah.
34. United Nations Development Programme, (2018), Human Development Indices and Indicators 2018 Statistical Update, available at: www.hdr.undp.org
35. University of Phoenix, (2018), Competency Models for Enterprise Security and Cybersecurity, at available: www.apollo.edu
36. William Newhouse, Keith Stephanie, Scribner Benjamin & Greg Witte, (2017), National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework, publication at: www.doi.org
37. Zeng, Kui, (2016), Exploring cybersecurity requirements in the defense acquisition process, A Dissertation Presented in Partial Fulfillment of the Requirements for the Degree Doctor of Science Capitol technology university.