{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T19:05:10Z","timestamp":1771614310582,"version":"3.50.1"},"reference-count":60,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,9,6]],"date-time":"2021-09-06T00:00:00Z","timestamp":1630886400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,9,6]],"date-time":"2021-09-06T00:00:00Z","timestamp":1630886400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100004329","name":"Javna Agencija za Raziskovalno Dejavnost RS","doi-asserted-by":"publisher","award":["P2-0037-0106-2020"],"award-info":[{"award-number":["P2-0037-0106-2020"]}],"id":[{"id":"10.13039\/501100004329","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Educ Inf Technol"],"published-print":{"date-parts":[[2022,4]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Recruiting, retaining, and maintaining sufficient numbers of cybersecurity professionals in the workplace is a constant battle, not only for the technical side of cybersecurity, but also for the overlooked area of non-technical, managerial-related jobs in the cyber sector. The problem is the lack of cybersecurity skills in the European labour force. This paper presents the results of a study carried out with the aim to identify how much the cybersecurity education system within the high-level educational institutions and the industrial sector meets the needs for graduate students to gain the required cybersecurity skills. The method applied in the study is based on data collected from surveys carried out by the European competence centres on cybersecurity and the European Cybersecurity organisation. The problem of common educational program accreditation in Europe is highlighted and discussed. The actions undertaken to improve the education in both sectors are described and the emerging educational landscape is commented. The main cybersecurity knowledge specified by the industrial needs is presented in the form of five knowledge pillars. The study\u2019s findings show that there are missing topics in high-level institution\u2019s cybersecurity programs and that that there is a need to re-shape the content of the courses provided by the professional education providers.<\/jats:p>","DOI":"10.1007\/s10639-021-10704-y","type":"journal-article","created":{"date-parts":[[2021,9,6]],"date-time":"2021-09-06T12:02:56Z","timestamp":1630929776000},"page":"3011-3036","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":44,"title":["Changing the landscape of cybersecurity education in the EU: Will the new approach produce the required cybersecurity skills?"],"prefix":"10.1007","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9002-4548","authenticated-orcid":false,"given":"Borka Jerman","family":"Bla\u017ei\u010d","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,6]]},"reference":[{"key":"10704_CR1","unstructured":"Ackerman, A., (2019). Too few cybersecurity professionals is a gigantic problem. Retrieved July 2020 from https:\/\/www.techcrunch.com\/2019\/01\/27\/too-few-cybersecurity-professionals-is-a-gigantic-problem-for-2019\/"},{"key":"10704_CR2","unstructured":"ACM \/IEEE-CS. (2013). Joint Task Force on Computing Curricula. Computer Science Curricula 2013. Retrieved July 2020 from https:\/\/www.acm.org\/binaries\/content\/assets\/education\/cs2013_web_final.pdf"},{"key":"10704_CR3","unstructured":"AUG. (2017). Australian government, Update, Innovation, growth & prosperity. Retrieved September 2019 from https:\/\/cybersecuritystrategy.pmc.gov.au\/assets\/img\/PMC-Cyber-Strategy.pdf"},{"key":"10704_CR4","unstructured":"BCS. (2018). The Chartered Institute for IT. Guidelines on course accreditation. Retrieved September 2017 from http:\/\/www.bcs.org\/content\/ConMediaFile\/30202"},{"key":"10704_CR5","unstructured":"British Airways. (2019). Customer data theft. Retrieved January 2020 from https:\/\/www.bbc.com\/news\/business-48905907"},{"key":"10704_CR6","unstructured":"CCN \u2013 Concordia. (2019). Cyber competence network\u2013 about. Retrieved July 2020 from https:\/\/cybercompetencenetwork.eu\/about"},{"key":"10704_CR7","doi-asserted-by":"crossref","unstructured":"Cabaj, l., Domingos, D., Kotulski, Z., Resp\u00edcio, A., (2018). Cybersecurity education: Evolution of the discipline and analysis of master programs. Computers & Security, (75), June 2018, pp.\u00a024\u201335. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167404818300373","DOI":"10.1016\/j.cose.2018.01.015"},{"key":"10704_CR8","doi-asserted-by":"crossref","unstructured":"Carlton, M. & Levy, Y., (2015). Expert assessment of the top platform independent cybersecurity skills for non-IT professionals, Proceedings of IEEE Southeast conference on Privacy, Fort Lauderdale, FL, USA. https:\/\/ieeexplore.ieee.org\/abstract\/document\/7132932","DOI":"10.1109\/SECON.2015.7132932"},{"key":"10704_CR9","doi-asserted-by":"publisher","unstructured":"Carlton, M. & Levy, Y., (2017). Cybersecurity skills: Foundational theory and the cornerstone of advanced persistent threats (APTs) mitigation. Online Journal of Applied Knowledge Management - iiakm.org. https:\/\/doi.org\/10.36965\/OJAKM.2017.5(2)16-28","DOI":"10.36965\/OJAKM.2017.5(2)16-28"},{"key":"10704_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1093\/cybsec\/tyz001","volume":"2","author":"M Catota","year":"2019","unstructured":"Catota, M., Granger, M., Sicker, D., & C., . (2019). Cybersecurity education in a developing nation: The Ecuadorian environment. Journal of Cybersecurity, 2, 1\u201319. https:\/\/doi.org\/10.1093\/cybsec\/tyz001","journal-title":"Journal of Cybersecurity"},{"key":"10704_CR11","doi-asserted-by":"publisher","unstructured":"Caulkins B., Marlowe T. & Reardon A., (2018). Cybersecurity skills to address Today`s Threats, in Ahram T. & Nicholson D., (Eds) , Advances in Human factors in Cybersecurity, AHFE 2018. Advances in Intelligent Systems and Computing, pp.\u00a0782\u2013788. Springer. https:\/\/doi.org\/10.1007\/978-3-319-94782-2-2_18","DOI":"10.1007\/978-3-319-94782-2-2_18"},{"key":"10704_CR12","unstructured":"Concordia competence centre, (2019). Retrieved in February 2021 from https:\/\/www.concordia-h2020.eu\/"},{"key":"10704_CR13","unstructured":"Concordia report on Cybersecurity education (2020). Deliverable 3.4, Establishing a European Education Ecosystem for Cybersecurity. Retrieved in September 2020 from https:\/\/www.concordia-h2020.eu\/"},{"key":"10704_CR14","doi-asserted-by":"publisher","unstructured":"Conklin, W.A, Cline R.E. & Roosa, T., (2014). Re-engineering Cybersecurity Education in the US: An Analysis of the Critical Factors. 47th Hawaii International Conference on System Sciences, Waikoloa, HI, 2006\u20132014, https:\/\/doi.org\/10.1109\/HICSS.2014.254.","DOI":"10.1109\/HICSS.2014.254"},{"key":"10704_CR15","unstructured":"CPHC (2015). Cybersecurity principles and learning outcomes for computer science and IT related degrees, Retrieved in June 2019 from https:\/\/cphcuk.files.wordpress.com\/2015\/06\/j0028-isc2-white-paper-a4-v5-260515lr.pdf"},{"key":"10704_CR16","unstructured":"Cybersecurity Ventures Report. (2018). - https:\/\/cybersecurityventures.com\/cybersecurity-market-report-2018\/"},{"key":"10704_CR17","unstructured":"Cybersec4Europe. (2020). Report on the EU HEI education in Cybersecurity. Retrieved in June 2020 from https:\/\/cybersec4europe.eu\/"},{"key":"10704_CR18","doi-asserted-by":"publisher","unstructured":"Davenport, J.,H., Crick, T., Hayes, A., R. & Hourizi, R., (2019). The Institute of Coding: Addressing the UK Digital Skills Crisis. In Proc. of 3rd Computing Education Practice Conf. CEP '19: Article No.: 10, (1\u20134). https:\/\/doi.org\/10.1145\/3294016.3298736","DOI":"10.1145\/3294016.3298736"},{"key":"10704_CR19","doi-asserted-by":"publisher","unstructured":"Dawson, J. & Thomson, R., (2018). The Future Cybersecurity Workforce: Going Beyond Technical Skills for Successful Cyber Performance. Frontiers in Psychology, 12. | https:\/\/doi.org\/10.3389\/fpsyg.2018.00744","DOI":"10.3389\/fpsyg.2018.00744"},{"issue":"1","key":"10704_CR20","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/MSEC.2020.3037446","volume":"19","author":"N Dragoni","year":"2021","unstructured":"Dragoni, N., Lafuente, A. L., Massacci, F., & Schlichkrull, A. (2021). Are we preparing students to build security in? A Survey of European Cybersecurity Education Programs, IEEE on Security and Privacy, IEEE Security and Privacy, 19(1), 81\u201388. https:\/\/doi.org\/10.1109\/MSEC.2020.3037446","journal-title":"A Survey of European Cybersecurity Education Programs, IEEE on Security and Privacy, IEEE Security and Privacy"},{"key":"10704_CR21","unstructured":"ECHO. (2020). Retrieved January 2021 from https:\/\/echonetwork.eu"},{"key":"10704_CR22","unstructured":"ECSO. (2020). Gaps in European Cyber Education and professional training. Retrieved in December 2020 from https:\/\/www.ecs-org.eu\/documents\/publications\/5bf7e01bf3ed0.pdf"},{"key":"10704_CR23","unstructured":"ENISA, (2019). Cybersecurity eHEI database. https:\/\/www.enisa.europa.eu\/topics\/cybersecurity-education\/education-map"},{"key":"10704_CR24","unstructured":"ENISA, (2020). Cybersecurity skills development in the EU, 2020. https:\/\/www.enisa.europa.eu\/publications\/the-status-of-cyber-security-education-in-the-european-union"},{"key":"10704_CR25","unstructured":"ESG, (2018). Cybersecurity pending trends. Retrieved June 2019 from https:\/\/www.esg-global.com\/research\/esg-brief-2018-cybersecurity-spending-trend"},{"key":"10704_CR26","unstructured":"EU, (2017). Resilience, Deterrence and Defence: Building strong cybersecurity for the EU. https:\/\/eur-lex.europa.eu\/legal-content\/en\/TXT\/?uri=CELEX%3A52017JC0450"},{"key":"10704_CR27","unstructured":"EU, European Commission. (2013). Policy, Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace. https:\/\/ec.europa.eu\/digital-single-market\/en\/cyber-security"},{"key":"10704_CR28","doi-asserted-by":"publisher","unstructured":"Furnell, S. (2021). Computer and Security, The Cybersecurity workforce and skills, Computer and Security, February 2021, https:\/\/doi.org\/10.1016\/j.cose.2020.102080","DOI":"10.1016\/j.cose.2020.102080"},{"key":"10704_CR29","doi-asserted-by":"crossref","unstructured":"Furnell, S. & Bishop, M. (2020). Addressing Cyber Security skills: the spectrum, not the silo, Computer fraud & security, pp.\u00a06\u201311","DOI":"10.1016\/S1361-3723(20)30017-8"},{"key":"10704_CR30","unstructured":"Galliano, J. S. (2017). Improved matching of cybersecurity professionals skills to job-related competence: an exploratory study, PhD University of Fairfax. Retrieved from https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=3076897"},{"key":"10704_CR31","doi-asserted-by":"crossref","unstructured":"Hentea, M. & Dhillon, H.S. (2006). Towards changes in information security education. Journal of Information Technology. (5) No. 1, pp.\u00a0221\u2013233","DOI":"10.28945\/244"},{"key":"10704_CR32","unstructured":"IFIP (2017) ACM\/IEEE\/AIS\/IFIP Joint Task Force on Cybersecurity Education. Cybersecurity Curricula. https:\/\/cybered.hosting.acm.org\/wp\/"},{"key":"10704_CR33","unstructured":"ISC2. (2018). Cybersecurity workforce study. Retrieved in July 20202 from https:\/\/www.isc2.org\/-\/media\/ISC2\/Research\/2018-ISC2-Cybersecurity-Workforce-Study.ashx?la=en&hash=4E09681D0FB51698D9BA6BF13EEABFA48BD17DB0"},{"key":"10704_CR34","doi-asserted-by":"crossref","unstructured":"Libicki, C.M, Senty, D. & Pollak, J. (2014). An Examination of the Cybersecurity Labour Market, RANDcorp, Retrieved in July 2020 from https:\/\/www.rand.org\/content\/dam\/rand\/pubs\/research_reports\/RR400\/RR430\/RAND_RR430.pdf","DOI":"10.7249\/RR430"},{"issue":"4","key":"10704_CR35","doi-asserted-by":"publisher","first-page":"985","DOI":"10.1111\/joes.12254","volume":"32","author":"J Malan","year":"2018","unstructured":"Malan, J., Lale-Demoz, E., & Rampton, J. (2018). Identifying the role of further and higher education in cyber security skills development skills mismatch: Concepts, measurement and policy, approaches. Journal of Economic Surveys, 32(4), 985\u2013992.","journal-title":"Journal of Economic Surveys"},{"key":"10704_CR36","doi-asserted-by":"crossref","unstructured":"Martin, A. & Collier, J. (2019). Beyond Awareness: The Breadth and Depth of the Cyber Skills Demand, Centre for technology and global affairs, Oxford University. Retrieved in July 2020 from https:\/\/www.ctga.ox.ac.uk\/article\/beyond-awareness-breadth-and-depth-cyber-skills-demand","DOI":"10.4324\/9780367822576-3"},{"issue":"6","key":"10704_CR37","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/MSP.2013.155","volume":"11","author":"A McGettrick","year":"2013","unstructured":"McGettrick, A. (2013). Towards effective cybersecurity education. IEEE Security and Privacy, 11(6), 66\u201368.","journal-title":"IEEE Security and Privacy"},{"key":"10704_CR38","unstructured":"McDonald, C. (2020). Computer weekly, Retrieved October 12th, 2020 from https:\/\/www.computerweekly.com\/news\/252488544\/Only-10-of-tech-talent-have-cyber-skills-to-fill-skills-gap"},{"key":"10704_CR39","unstructured":"Michael, P. (2018). Closing the information security skill gap. Retrieved in September 2020 from https:\/\/www.michaelpage.co.uk\/our-expertise\/technology\/closing-information-security-skills-gap"},{"key":"10704_CR40","unstructured":"Mirza, S. & Brown, M. (2020). Computer Weekly in April 2020. Retrieved in September 2020 from https:\/\/www.computerweekly.com"},{"key":"10704_CR41","doi-asserted-by":"crossref","unstructured":"Moller, F. & Crick, T. (2018). A University-Based Model for Supporting Computer Science Curriculum Reform. Journal of Computers in Education, 5(4), pp. 415{434)","DOI":"10.1007\/s40692-018-0117-x"},{"key":"10704_CR42","unstructured":"NCSC. (2017). UK National Cyber Security Centre. NCSC-certified degrees. https:\/\/www.ncsc.gov.uk\/information\/ncsc-certified-degrees"},{"key":"10704_CR43","doi-asserted-by":"crossref","unstructured":"Newhouse, W., Keith, S., Scribner, B., & Witte, G. (2017) National Initiative for Cybersecurity Education (NICE). https:\/\/doi.org\/10.6028\/NIST.SP.800-181","DOI":"10.6028\/NIST.SP.800-181"},{"key":"10704_CR44","unstructured":"NICE. (2013). National Initiative for Cybersecurity Education . Cybersecurity Workforce Framework. https:\/\/www.nist.gov\/itl\/applied-cybersecurity\/nice\/resources\/nice-cybersecurity-workforce-framework"},{"key":"10704_CR45","unstructured":"NIST, National Institute for Standard and Technology. (2016) .https:\/\/www.nist.gov\/sites\/default\/files\/documents\/2017\/08\/04\/t-mobile.pdf"},{"key":"10704_CR46","unstructured":"NSA-DHS. (2019). National Centres of Academic Excellence in Cyber Defence Education Program (CAE-CDE) - Criteria for Measurement Bachelor, Master, and Doctoral Level. https:\/\/www.ncyte.net\/cae-program"},{"key":"10704_CR47","unstructured":"Parr, C. (2014). Cybersecurity skills need boost in computer science degrees. Retrieved in April 2020 from https:\/\/www.timeshighereducation.com\/news\/cybersecurity-skills-need-boost-in-computer-science-degrees\/2016933:article"},{"key":"10704_CR48","unstructured":"Parrish, A., Impagliazzo, J., Rajendra K. R, Santos, H. & Rizwan, M., (2017). Curriculum Guidelines for Post-Secondary Degree Programs in Cybersecurity, in A Report in the Computing Curricula Series, Joint Task Force on Cybersecurity Education. https:\/\/www.acm.org\/binaries\/content\/assets\/education\/curricula-recommendations\/csec2017.pdf"},{"key":"10704_CR49","doi-asserted-by":"crossref","unstructured":"Parrish J., Impagliazzo, A., Rajendra K. Rj, Santos, H., Rizwan, M., Asghar, Jsang, A., Pereira, T. & Stavrou E. (2018). Global perspectives on cybersecurity education for 2030: a case for a meta-discipline. In Proc. of ITiCSE 2018, pp. 36\u201354. ACM.","DOI":"10.1145\/3293881.3295778"},{"key":"10704_CR50","doi-asserted-by":"crossref","unstructured":"Ricci, S., Hajny, J., Piesarkas, E.,Parker, S.,Janaut, C. (2020). International journal of cybersecurity and Cybercrime, No.2, pp.\u00a07\u201311","DOI":"10.19107\/IJISC.2020.02.01"},{"key":"10704_CR51","doi-asserted-by":"crossref","unstructured":"Rowe, D., Lunt, B., & Ekstrom, J. (2011). The role of cyber-security in information technology education. Proceedings of the 2011 conference on Information technology education - SIGITE '11, pp. 113\u2013121. New York, New York, USA: ACM Press","DOI":"10.1145\/2047594.2047628"},{"key":"10704_CR52","doi-asserted-by":"crossref","unstructured":"Ruiz, R., (2019). A Study of the UK Undergraduate Computer Science Curriculum: A Vision of Cybersecurity, IEEE International Conference on Global Security, Safety and Sustainability (ICGS3), In Proc. of 12th IEEE Int. Conf. on Global Security, Safety and Sustainability. IEEE, pp.\u00a01\u20138","DOI":"10.1109\/ICGS3.2019.8688137"},{"key":"10704_CR53","unstructured":"SAGM, (2019). Seoul accord, https:\/\/www.seoulaccord.org\/"},{"key":"10704_CR54","unstructured":"Sharkey, S., Morin, D., & Hunter, J. (2013). Comments of T-Mobile USA. National Institute for Standard and Technology), The national cybersecurity workforce framework. https:\/\/nist.gov\/itl\/applied-cybersecurity\/nice-cybersecurity-workforce-framework"},{"key":"10704_CR55","unstructured":"Secnumedu. (2020). https:\/\/www.ssi.gouv.fr\/en\/cybersecurity-in-france\/formations\/secnumedu-labelidegrees"},{"issue":"2","key":"10704_CR56","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1145\/2766457","volume":"6","author":"A Siraj","year":"2015","unstructured":"Siraj, A., Taylor, B., Kaza, S., & Ghafoor, S. (2015). Integrating security in the computer science curriculum. ACM Inroads, 6(2), 77\u201381.","journal-title":"ACM Inroads"},{"key":"10704_CR57","doi-asserted-by":"crossref","unstructured":"\u0160vabensky, V., \u010celeda, P., Vykopal, J.,Bri\u0161akova, S., (2021). Cybersecurity knowledge and skills taught in capture the flag challenges, Computer and Security, 102, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167404820304272","DOI":"10.1016\/j.cose.2020.102154"},{"key":"10704_CR58","unstructured":"Tripwire (2020). The experts\u2019 guide on tackling the cybersecurity skills gap. Retrieved in August 2020 from https:\/\/www.tripwire.com\/state-of-security\/featured\/expert-guide-tackling-cybersecurity-skillsgap\/#:~:text=The%20skills%20gap%20is%20weighing,they%20did%20a%20year%20earlier."},{"key":"10704_CR59","unstructured":"UK Cabinet Office. (2011). The UK Cybersecurity strategy Protecting and Promoting the UK in the digital world. Retrieved in September 2019 from https:\/\/www.gov.uk\/government\/publications\/cyber-security-strategy\/"},{"key":"10704_CR60","unstructured":"USA accord (2019). The international Washington accord https:\/\/www.ieagreements.org\/accords\/washington\/"}],"container-title":["Education and Information Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10639-021-10704-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10639-021-10704-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10639-021-10704-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,12]],"date-time":"2022-04-12T10:17:42Z","timestamp":1649758662000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10639-021-10704-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,6]]},"references-count":60,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,4]]}},"alternative-id":["10704"],"URL":"https:\/\/doi.org\/10.1007\/s10639-021-10704-y","relation":{},"ISSN":["1360-2357","1573-7608"],"issn-type":[{"value":"1360-2357","type":"print"},{"value":"1573-7608","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9,6]]},"assertion":[{"value":"31 March 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 August 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 September 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}