{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T13:08:28Z","timestamp":1777381708487,"version":"3.51.4"},"reference-count":128,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T00:00:00Z","timestamp":1771977600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100024370","name":"Ministero dell'Istruzione dell'Universit\u00e0 e della Ricerca","doi-asserted-by":"publisher","award":["PE00000014"],"award-info":[{"award-number":["PE00000014"]}],"id":[{"id":"10.13039\/501100024370","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100019103","name":"Digital Health and Care Innovation Centre","doi-asserted-by":"publisher","award":["101189712"],"award-info":[{"award-number":["101189712"]}],"id":[{"id":"10.13039\/100019103","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100020655","name":"European Health and Digital Executive Agency","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100020655","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100031478","name":"NextGenerationEU","doi-asserted-by":"publisher","award":["PE00000014"],"award-info":[{"award-number":["PE00000014"]}],"id":[{"id":"10.13039\/100031478","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Array"],"published-print":{"date-parts":[[2026,7]]},"DOI":"10.1016\/j.array.2026.100728","type":"journal-article","created":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T16:00:38Z","timestamp":1774108838000},"page":"100728","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Towards a unified European Cybersecurity Skills Framework: Structural insights from expert elicitation and international standards"],"prefix":"10.1016","volume":"30","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8238-6426","authenticated-orcid":false,"given":"Gaetano","family":"Perrone","sequence":"first","affiliation":[]},{"given":"Nicola","family":"d\u2019Ambrosio","sequence":"additional","affiliation":[]},{"given":"Roberto","family":"D\u2019Isanto","sequence":"additional","affiliation":[]},{"given":"Massimiliano","family":"Rak","sequence":"additional","affiliation":[]},{"given":"Lavinia","family":"Russo","sequence":"additional","affiliation":[]},{"given":"Simon Pietro","family":"Romano","sequence":"additional","affiliation":[]},{"given":"Mario","family":"Varlese","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.array.2026.100728_b1","series-title":"ENISA threat landscape: Finance sector","author":"Theocharidou","year":"2024"},{"key":"10.1016\/j.array.2026.100728_b2","series-title":"European cybersecurity skills framework (ECSF)","author":"European Union Agency for Cybersecurity (ENISA)","year":"2024"},{"key":"10.1016\/j.array.2026.100728_b3","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2025.104329","article-title":"Comparative analysis of EU-based cybersecurity skills frameworks","volume":"151","author":"Almeida","year":"2025","journal-title":"Comput Secur"},{"key":"10.1016\/j.array.2026.100728_b4","series-title":"Proceedings of the 2024 European interdisciplinary cybersecurity conference","first-page":"225","article-title":"Cybersecurity awareness and training: The cybersecpro and nero approaches","author":"Douligeris","year":"2024"},{"key":"10.1016\/j.array.2026.100728_b5","series-title":"2024 IEEE global engineering education conference","first-page":"1","article-title":"Leveraging the European cybersecurity skills framework(ecsf) in eu innovation projects: Workforce development through skilling, upskilling, and reskilling","author":"Rathod","year":"2024"},{"key":"10.1016\/j.array.2026.100728_b6","series-title":"Cybersecpro - cybersecurity skills professionalization","author":"CyberSecPro Project","year":"2025"},{"key":"10.1016\/j.array.2026.100728_b7","doi-asserted-by":"crossref","first-page":"16997","DOI":"10.1007\/s10639-024-12463-y","article-title":"Taxonomy of competence models based on an integrative literature review","volume":"29","author":"Mikhridinova","year":"2024","journal-title":"Educ Inf Technol"},{"key":"10.1016\/j.array.2026.100728_b8","doi-asserted-by":"crossref","first-page":"559","DOI":"10.1007\/s10270-024-01151-7","article-title":"Modeling competences in enterprise architecture: from knowledge, skills, and attitudes to organizational capabilities","volume":"23","author":"Calhau","year":"2024","journal-title":"Softw Syst Model"},{"key":"10.1016\/j.array.2026.100728_b9","series-title":"A unified conceptual framework of tasks, skills and competences","author":"Rodrigues","year":"2021"},{"key":"10.1016\/j.array.2026.100728_b10","series-title":"SFIA 9: All skills A\u2013Z","author":"SFIA Foundation","year":"2024"},{"key":"10.1016\/j.array.2026.100728_b11","first-page":"346","article-title":"Embedding technical, personal and professional competencies in computing degree programmes","volume":"vol. 1","author":"Prickett","year":"2024"},{"key":"10.1016\/j.array.2026.100728_b12","series-title":"European e-competence framework (e-cf)","author":"European Commission, ESCO","year":"2025"},{"key":"10.1016\/j.array.2026.100728_b13","series-title":"Nice workforce framework for cybersecurity (nice framework)","author":"National Institute of Standards and Technology","year":"2025"},{"key":"10.1016\/j.array.2026.100728_b14","series-title":"The cyber security body of knowledge","author":"CyBOK","year":"2024"},{"key":"10.1016\/j.array.2026.100728_b15","series-title":"About ESCO: European skills, competences, qualifications and occupations","author":"D.G. Employment, Social Affairs and Inclusion of the European Commission","year":"2024"},{"key":"10.1016\/j.array.2026.100728_b16","series-title":"Security and privacy controls for information systems and organizations","author":"Joint Task Force","year":"2020"},{"key":"10.1016\/j.array.2026.100728_b17","article-title":"International comparison of professional competency frameworks for advanced practice nurses","volume":"33","author":"Policies","year":"2023","journal-title":"Eur J Pub Health"},{"key":"10.1016\/j.array.2026.100728_b18","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1080\/0142159X.2022.2126758","article-title":"Competency domains of educators in medical, nursing, and health sciences education: An integrative review","volume":"45","author":"Sidhu","year":"2022","journal-title":"Med Teach"},{"key":"10.1016\/j.array.2026.100728_b19","doi-asserted-by":"crossref","DOI":"10.1186\/s12912-023-01514-3","article-title":"International comparison of professional competency frameworks for nurses: a document analysis","volume":"22","author":"Wit","year":"2023","journal-title":"BMC Nurs"},{"key":"10.1016\/j.array.2026.100728_b20","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1007\/s10459-019-09910-8","article-title":"From prescription to guidance: a European framework for generic competencies","volume":"25","author":"Van Der Aa","year":"2019","journal-title":"Adv Health Sci Educ"},{"key":"10.1016\/j.array.2026.100728_b21","article-title":"Competency framework development for effective human resource management","volume":"11","author":"Ali","year":"2021","journal-title":"SAGE Open"},{"key":"10.1016\/j.array.2026.100728_b22","doi-asserted-by":"crossref","DOI":"10.3389\/fmed.2021.789828","article-title":"A six-step model for developing competency frameworks in the healthcare professions","volume":"8","author":"Batt","year":"2021","journal-title":"Front Med"},{"key":"10.1016\/j.array.2026.100728_b23","doi-asserted-by":"crossref","DOI":"10.1111\/ejed.12345","article-title":"Aligning teacher competence frameworks to 21st century challenges: The case for digcompedu","author":"Caena","year":"2019","journal-title":"Eur J Educ"},{"key":"10.1016\/j.array.2026.100728_b24","doi-asserted-by":"crossref","DOI":"10.1038\/ncomms3484","article-title":"Group performance is maximized by hierarchical competence distribution","volume":"4","author":"Zafeiris","year":"2013","journal-title":"Nat Commun"},{"key":"10.1016\/j.array.2026.100728_b25","doi-asserted-by":"crossref","DOI":"10.1186\/1472-6920-6-59","article-title":"A hierarchy of effective teaching and learning to acquire competence in evidenced-based medicine","volume":"6","author":"Khan","year":"2006","journal-title":"BMC Med Educ"},{"key":"10.1016\/j.array.2026.100728_b26","doi-asserted-by":"crossref","first-page":"3478","DOI":"10.3390\/app9173478","article-title":"Hierarchy-based competency structure and its application in e-evaluation","volume":"9","author":"Ramanauskait\u0117","year":"2019","journal-title":"Appl Sci"},{"key":"10.1016\/j.array.2026.100728_b27","series-title":"NICE framework mapping tool","author":"Cybersecurity","year":"2025"},{"key":"10.1016\/j.array.2026.100728_b28","series-title":"Taxonomy of educational objectives: The classification of educational goals","author":"Bloom","year":"1956"},{"key":"10.1016\/j.array.2026.100728_b29","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1207\/s15430421tip4104_2","article-title":"A revision of bloom\u2019s taxonomy: An overview","volume":"41","author":"Krathwohl","year":"2002","journal-title":"Theory Into Pr"},{"key":"10.1016\/j.array.2026.100728_b30","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1007\/BF00138871","article-title":"Enhancing teaching through constructive alignment","volume":"32","author":"Biggs","year":"1996","journal-title":"High Educ"},{"key":"10.1016\/j.array.2026.100728_b31","doi-asserted-by":"crossref","DOI":"10.1111\/1753-6405.13253","article-title":"Mapping competency frameworks: implications for public health curricula design","volume":"46","author":"Coombe","year":"2022","journal-title":"Aust N Z J Public Health"},{"key":"10.1016\/j.array.2026.100728_b32","doi-asserted-by":"crossref","DOI":"10.1186\/s12909-023-05010-9","article-title":"Mapping competency in public health training \u2013 experience of the Europubhealth consortium","volume":"24","author":"Grimaud","year":"2024","journal-title":"BMC Med Educ"},{"key":"10.1016\/j.array.2026.100728_b33","doi-asserted-by":"crossref","first-page":"324","DOI":"10.1097\/ACM.0000000000001141","article-title":"Building a framework of entrustable professional activities, supported by competencies and milestones","volume":"92","author":"Carraccio","year":"2017","journal-title":"Acad Med"},{"key":"10.1016\/j.array.2026.100728_b34","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1109\/TE.2023.3347273","article-title":"A pragmatic framework for assessing learning outcomes in competency-based courses","volume":"67","author":"Vargas","year":"2024","journal-title":"IEEE Trans Educ"},{"key":"10.1016\/j.array.2026.100728_b35","article-title":"Cultivating key disciplinary competencies among university students","volume":"20","author":"Zheng","year":"2025","journal-title":"PLoS ONE"},{"key":"10.1016\/j.array.2026.100728_b36","doi-asserted-by":"crossref","DOI":"10.4236\/ojapps.2023.135061","article-title":"A certification framework for e-commerce digital competencies","author":"Stefani","year":"2023","journal-title":"Open J Appl Sci"},{"key":"10.1016\/j.array.2026.100728_b37","doi-asserted-by":"crossref","unstructured":"Ngambeki I, Rogers M, Bates S, Piper M. Curricular improvement through course mapping: An application of the nice framework. In: 2021 ASEE virtual annual conference content access proceedings. ASEE Conferences, http:\/\/dx.doi.org\/10.18260\/1-2--36889.","DOI":"10.18260\/1-2--36889"},{"key":"10.1016\/j.array.2026.100728_b38","doi-asserted-by":"crossref","first-page":"448","DOI":"10.1007\/s10956-018-9735-3","article-title":"Competency maps: an effective model to integrate professional competencies across a stem curriculum","volume":"27","author":"Carracedo","year":"2018","journal-title":"J Sci Educ Technol"},{"key":"10.1016\/j.array.2026.100728_b39","doi-asserted-by":"crossref","first-page":"1799","DOI":"10.1080\/13501763.2018.1551415","article-title":"The political economy of high skills: higher education in knowledge-based labour markets","volume":"26","author":"Durazzi","year":"2018","journal-title":"J Eur Public Policy"},{"key":"10.1016\/j.array.2026.100728_b40","doi-asserted-by":"crossref","DOI":"10.58631\/jtus.v3i6.97","article-title":"Integration model of occupational certification scheme into instructional design to close the gap of learning outcomes and industry needs","author":"Aziz","year":"2024","journal-title":"J Transnatl Univers Stud"},{"key":"10.1016\/j.array.2026.100728_b41","series-title":"Skill-driven certification pathways: Measuring industry training impact on graduate employability","author":"Kovalev","year":"2025"},{"key":"10.1016\/j.array.2026.100728_b42","doi-asserted-by":"crossref","DOI":"10.54097\/5b5z8n70","article-title":"Research on the cultivation system of digital new-quality skilled talents based on the integration of industry, education, and research","author":"Ni","year":"2025","journal-title":"Int J Educ Humanit"},{"key":"10.1016\/j.array.2026.100728_b43","series-title":"A cybersecurity sector skills alliance","author":"Rewire","year":"2024"},{"key":"10.1016\/j.array.2026.100728_b44","series-title":"Strategic programs for advanced research and technology in Europe","author":"SPARTA","year":"2024"},{"key":"10.1016\/j.array.2026.100728_b45","series-title":"Consortium : Concordia","author":"Concordia Project","year":"2025"},{"key":"10.1016\/j.array.2026.100728_b46","series-title":"The European cyber security organisation (ECSO)","author":"ECSO","year":"2024"},{"key":"10.1016\/j.array.2026.100728_b47","doi-asserted-by":"crossref","DOI":"10.34190\/eccws.24.1.3369","article-title":"Implementing the European cybersecurity skills framework (ecsf): A case study of eu innovation projects","author":"Rathod","year":"2025","journal-title":"Eur Conf Cyber Warf Secur"},{"key":"10.1016\/j.array.2026.100728_b48","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1016\/j.npls.2016.01.001","article-title":"How to plan and perform a qualitative study using content analysis","volume":"2","author":"Bengtsson","year":"2016","journal-title":"NursingPlus Open"},{"key":"10.1016\/j.array.2026.100728_b49","first-page":"111","article-title":"Inductive content analysis: A guide for beginning qualitative researchers","volume":"23","author":"Vears","year":"2022","journal-title":"Focus Health Prof Educ: A Multi-Professional J"},{"key":"10.1016\/j.array.2026.100728_b50","series-title":"Education and Training Review","author":"CyberSec4Europe Consortium","year":"2020"},{"key":"10.1016\/j.array.2026.100728_b51","doi-asserted-by":"crossref","first-page":"61741","DOI":"10.1109\/ACCESS.2024.3392970","article-title":"Cybersecurity education in universities: A comprehensive guide to curriculum development","volume":"12","author":"Ramezanian","year":"2024","journal-title":"IEEE Access"},{"key":"10.1016\/j.array.2026.100728_b52","doi-asserted-by":"crossref","first-page":"94723","DOI":"10.1109\/ACCESS.2021.3093952","article-title":"Framework, tools and good practices for cybersecurity curricula","volume":"9","author":"Hajny","year":"2021","journal-title":"IEEE Access"},{"key":"10.1016\/j.array.2026.100728_b53","doi-asserted-by":"crossref","DOI":"10.3390\/su17156988","article-title":"Strategic human resource development for industry 4.0 readiness: A sustainable transformation framework for emerging economies","volume":"17","author":"Vong","year":"2025","journal-title":"Sustainability"},{"key":"10.1016\/j.array.2026.100728_b54","series-title":"Cybersecurity curricular guidelines","author":"JTF","year":"2020"},{"key":"10.1016\/j.array.2026.100728_b55","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1145\/3410471","article-title":"Automated analysis with apriori algorithm: deriving guidance for working-level cybersecurity curricula","volume":"11","author":"Kang","year":"2020","journal-title":"ACM Inroads"},{"key":"10.1016\/j.array.2026.100728_b56","doi-asserted-by":"crossref","DOI":"10.1016\/j.dib.2023.109285","article-title":"Csec+ framework assessment dataset: Expert evaluations of cybersecurity skills for job profiles in Europe","volume":"48","author":"Budde","year":"2023","journal-title":"Data Brief"},{"key":"10.1016\/j.array.2026.100728_b57","doi-asserted-by":"crossref","first-page":"539","DOI":"10.3390\/jcp1040027","article-title":"Assessing competencies using scenario-based learning in cybersecurity","volume":"1","author":"Ghosh","year":"2021","journal-title":"J Cybersecur Priv"},{"key":"10.1016\/j.array.2026.100728_b58","doi-asserted-by":"crossref","DOI":"10.1145\/3421254","article-title":"Knowledge, skills, and abilities for specialized curricula in cyber defense: Results from interviews with cyber professionals","volume":"20","author":"Armstrong","year":"2020","journal-title":"ACM Trans Comput Educ"},{"key":"10.1016\/j.array.2026.100728_b59","first-page":"1","article-title":"Why soft skills matter for women in cybersecurity","author":"Benson","year":"2025","journal-title":"J Comput Inf Syst"},{"key":"10.1016\/j.array.2026.100728_b60","doi-asserted-by":"crossref","first-page":"78878","DOI":"10.1109\/ACCESS.2024.3408685","article-title":"Tcofelet: Conceptual framework for team-centric e-learning and training","volume":"12","author":"Katsantonis","year":"2024","journal-title":"IEEE Access"},{"key":"10.1016\/j.array.2026.100728_b61","doi-asserted-by":"crossref","first-page":"133994","DOI":"10.1109\/ACCESS.2025.3592301","article-title":"Strategic human resource development for emerging technologies: A scoping review in ICT, robotics, data science, and CPS","volume":"13","author":"Nnadi","year":"2025","journal-title":"IEEE Access"},{"key":"10.1016\/j.array.2026.100728_b62","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1109\/TE.2023.3340868","article-title":"Understanding cybersecurity education gaps in Europe","volume":"67","author":"Ricci","year":"2024","journal-title":"IEEE Trans Educ"},{"key":"10.1016\/j.array.2026.100728_b63","series-title":"Experts in uncertainty: Opinion and subjective probability in science","author":"Cooke","year":"1991"},{"key":"10.1016\/j.array.2026.100728_b64","doi-asserted-by":"crossref","DOI":"10.1186\/1471-2288-13-117","article-title":"Using the framework method for the analysis of qualitative data in multi-disciplinary health research","volume":"13","author":"Gale","year":"2013","journal-title":"BMC Med Res Methodol"},{"key":"10.1016\/j.array.2026.100728_b65","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1111\/2041-210X.12857","article-title":"A practical guide to structured expert elicitation using the idea protocol","volume":"9","author":"Hemming","year":"2018","journal-title":"Methods Ecol Evol"},{"key":"10.1016\/j.array.2026.100728_b66","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1080\/13669877.2016.1215346","article-title":"Classical meets modern in the idea protocol for structured expert judgement","volume":"21","author":"Hanea","year":"2018","journal-title":"J Risk Res"},{"key":"10.1016\/j.array.2026.100728_b67","first-page":"1","article-title":"A technique for the measurement of attitudes","volume":"22","author":"Likert","year":"1932","journal-title":"Arch Psychol"},{"key":"10.1016\/j.array.2026.100728_b68","series-title":"Offensive security certified professional (oscp) certification","author":"Offensive Security","year":"2024"},{"key":"10.1016\/j.array.2026.100728_b69","first-page":"101","article-title":"Maintaining a cybersecurity curriculum: Professional certifications as valuable guidance","volume":"28","author":"Knapp","year":"2017","journal-title":"J Inf Syst Educ"},{"key":"10.1016\/j.array.2026.100728_b70","series-title":"CISSP - certified information systems security professional","author":"ISC2","year":"2025"},{"key":"10.1016\/j.array.2026.100728_b71","series-title":"CyBOK Mapping framework \u2013 academic and professional programmes","author":"Rashid","year":"2021"},{"key":"10.1016\/j.array.2026.100728_b72","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1109\/MSEC.2024.3428892","article-title":"Bridging the cybersecurity skills gap: Knowledge framework comparative study","volume":"22","author":"Dkaidek","year":"2024","journal-title":"IEEE Secur Priv"},{"key":"10.1016\/j.array.2026.100728_b73","series-title":"Skills and expertise in large organizations: An enterprise knowledge graph approach","author":"Chen","year":"2022"},{"key":"10.1016\/j.array.2026.100728_b74","series-title":"Proceedings of the 17th international conference on availability, reliability and security","first-page":"1","article-title":"Adding European cybersecurity skills framework into curricula designer","author":"Hajny","year":"2022"},{"key":"10.1016\/j.array.2026.100728_b75","series-title":"E-competence framework (e-cf)","author":"Commission, E","year":"2024"},{"key":"10.1016\/j.array.2026.100728_b76","article-title":"Securing ai-driven infrastructure: Advanced cybersecurity frameworks for cloud and edge computing environments","author":"Pasupuleti","year":"2025","journal-title":"Int J Acad Ind Res Innov(IJAIRI)"},{"key":"10.1016\/j.array.2026.100728_b77","doi-asserted-by":"crossref","DOI":"10.3390\/electronics14071394","article-title":"Iot\u2013cloud integration security: A survey of challenges, solutions, and directions","author":"Almutairi","year":"2025","journal-title":"Electronics"},{"key":"10.1016\/j.array.2026.100728_b78","doi-asserted-by":"crossref","DOI":"10.3390\/app15158704","article-title":"Security and privacy in the internet of everything (ioe): A review on blockchain, edge computing, ai, and quantum-resilient solutions","author":"Eren","year":"2025","journal-title":"Appl Sci"},{"key":"10.1016\/j.array.2026.100728_b79","doi-asserted-by":"crossref","DOI":"10.58496\/ADSA\/2025\/004","article-title":"Integration of artificial intelligence, blockchain, and quantum cryptography for securing the industrial internet of things (iiot): Recent advancements and future trends","author":"Ali","year":"2025","journal-title":"Appl Data Sci Anal"},{"key":"10.1016\/j.array.2026.100728_b80","article-title":"Post-quantum cryptography for ai-driven cloud security solutions","author":"Sreerangapuri","year":"2024","journal-title":"Int J Multidiscip Res"},{"key":"10.1016\/j.array.2026.100728_b81","series-title":"Certifications-mapped-to-the-ecsf","author":"ENISA","year":"2025"},{"key":"10.1016\/j.array.2026.100728_b82","series-title":"Proceedings of the online, open and flexible higher education conference, 25-27 October 2017, Milton Keynes","first-page":"411","article-title":"The systemic implications of constructive alignment of higher education level learning outcomes and employer or professional body based competency frameworks","author":"Lane","year":"2017"},{"key":"10.1016\/j.array.2026.100728_b83","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1016\/0306-4573(88)90021-0","article-title":"Term-weighting approaches in automatic text retrieval","volume":"24","author":"Salton","year":"1988","journal-title":"Inf Process Manage"},{"key":"10.1016\/j.array.2026.100728_b84","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1002\/(SICI)1097-4571(199009)41:6<391::AID-ASI1>3.0.CO;2-9","article-title":"Indexing by latent semantic analysis","volume":"41","author":"Deerwester","year":"1990","journal-title":"J Am Soc Inf Sci"},{"key":"10.1016\/j.array.2026.100728_b85","article-title":"Efficient estimation of word representations in vector space","volume":"vol. 2013","author":"Mikolov","year":"2013"},{"key":"10.1016\/j.array.2026.100728_b86","series-title":"Proceedings of the 2019 conference on empirical methods in natural language processing and the 9th international joint conference on natural language processing","first-page":"3982","article-title":"Sentence-BERT: Sentence embeddings using siamese BERT-networks","author":"Reimers","year":"2019"},{"key":"10.1016\/j.array.2026.100728_b87","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2024.103968","article-title":"Exploring gender dynamics in cybersecurity education: A self-determination theory and social cognitive theory perspective","volume":"144","author":"Francis","year":"2024","journal-title":"Comput Secur"},{"key":"10.1016\/j.array.2026.100728_b88","series-title":"European conference on cyber warfare and security","article-title":"Evaluating cybersecurity class activities based on the cognitive continuum theory: An exploratory case study","author":"Heverin","year":"2024"},{"key":"10.1016\/j.array.2026.100728_b89","doi-asserted-by":"crossref","first-page":"152","DOI":"10.3163\/1536-5050.103.3.010","article-title":"Bloom\u2019s taxonomy of cognitive learning objectives","volume":"103 3","author":"Adams","year":"2015","journal-title":"J Med Libr Assoc : JMLA"},{"key":"10.1016\/j.array.2026.100728_b90","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1080\/1367886042000338227","article-title":"What is competence?","volume":"8","author":"Deist","year":"2005","journal-title":"Hum Resour Dev Int"},{"key":"10.1016\/j.array.2026.100728_b91","doi-asserted-by":"crossref","DOI":"10.1016\/j.stueduc.2022.101151","article-title":"Unpacking piaac\u2019s cognitive skills measurements through engagement with bloom\u2019s taxonomy","author":"Boeren","year":"2022","journal-title":"Stud Educ Eval"},{"key":"10.1016\/j.array.2026.100728_b92","doi-asserted-by":"crossref","DOI":"10.5937\/AndStud2202091Z","article-title":"Taxonomies from a cognitive to a digital revolution, focusing on transferable skills","author":"Zer\u00e9nyi","year":"2022","journal-title":"Andragoske Stud"},{"key":"10.1016\/j.array.2026.100728_b93","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2716325","article-title":"Computer science (cs) education in indian schools: Situation analysis using darmstadt model","volume":"15","author":"Raman","year":"2015","journal-title":"ACM Trans Comput Educ"},{"key":"10.1016\/j.array.2026.100728_b94","series-title":"Proceedings of the 19th international conference on availability, reliability and security","first-page":"1","article-title":"Nero: Advanced cybersecurity awareness ecosystem for smes","author":"Klitis","year":"2024"},{"key":"10.1016\/j.array.2026.100728_b95","doi-asserted-by":"crossref","first-page":"71","DOI":"10.29070\/by8v4h97","article-title":"An analysis on challenges faced by cyber security on the latest technologies","volume":"20","author":"Aarjav Jain","year":"2024","journal-title":"J Adv Sci Technol"},{"key":"10.1016\/j.array.2026.100728_b96","doi-asserted-by":"crossref","first-page":"57","DOI":"10.58496\/MJCS\/2023\/010","article-title":"Exploring the top five evolving threats in cybersecurity: An in-depth overview","volume":"2023","author":"Mijwil","year":"2023","journal-title":"Mesopotamian J CyberSecurity"},{"key":"10.1016\/j.array.2026.100728_b97","series-title":"Proceedings of the 10th international conference on information systems security and privacy","first-page":"242","article-title":"An automated adaptive security framework for cyber-physical systems","author":"Seid","year":"2024"},{"key":"10.1016\/j.array.2026.100728_b98","doi-asserted-by":"crossref","DOI":"10.1007\/s10922-021-09607-7","article-title":"An autonomous cybersecurity framework for next-generation digital service chains","volume":"29","author":"Repetto","year":"2021","journal-title":"J Netw Syst Manage"},{"key":"10.1016\/j.array.2026.100728_b99","doi-asserted-by":"crossref","first-page":"673","DOI":"10.1108\/ICS-09-2024-0235","article-title":"Ai skills in cybersecurity: global job trends analysis","volume":"33","author":"Graham","year":"2025","journal-title":"Inf Comput Secur"},{"key":"10.1016\/j.array.2026.100728_b100","doi-asserted-by":"crossref","unstructured":"Di Mary A. Meyer, J.M.B.. Eliciting and Analyzing Expert Judgment. URL: https:\/\/epubs.siam.org\/doi\/abs\/10.1137\/1.9780898718485.fm. arXiv:https:\/\/epubs.siam.org\/doi\/pdf\/10.1137\/1.9780898718485.fm. http:\/\/dx.doi.org\/10.1137\/1.9780898718485.fm.","DOI":"10.1137\/1.9780898718485.fm"},{"key":"10.1016\/j.array.2026.100728_b101","doi-asserted-by":"crossref","first-page":"128235","DOI":"10.1109\/ACCESS.2024.3457025","article-title":"Optimal job role allocation for compliance with nca-ecc controls using the Saudi cybersecurity workforce framework","volume":"12","author":"Mosli","year":"2024","journal-title":"IEEE Access"},{"key":"10.1016\/j.array.2026.100728_b102","article-title":"Navigating the cyber landscape: Saudi Arabia\u2019s cybersecurity standards and implementation barriers","author":"Gambo","year":"2025","journal-title":"Arab J Sci Eng"},{"key":"10.1016\/j.array.2026.100728_b103","doi-asserted-by":"crossref","DOI":"10.1007\/s10207-025-01032-0","article-title":"Human factors in cybersecurity: an interdisciplinary review and framework proposal","volume":"24","author":"Khadka","year":"2025","journal-title":"Int J Inf Secur"},{"key":"10.1016\/j.array.2026.100728_b104","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3573205","article-title":"Competency models for information security and cybersecurity professionals: Analysis of existing work and a new model","volume":"23","author":"Bendler","year":"2023","journal-title":"ACM Trans Comput Educ"},{"key":"10.1016\/j.array.2026.100728_b105","article-title":"Skill oriented certification & value-addition courses for employability, sustainability & lifelong learning","author":"Shokeen","year":"2025","journal-title":"Soc Sci Rev A Multidiscip J"},{"key":"10.1016\/j.array.2026.100728_b106","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.infsof.2015.03.007","article-title":"Guidelines for conducting systematic mapping studies in software engineering: An update","volume":"64","author":"Petersen","year":"2015","journal-title":"Inf Softw Technol"},{"key":"10.1016\/j.array.2026.100728_b107","doi-asserted-by":"crossref","first-page":"2049","DOI":"10.1016\/j.infsof.2013.07.010","article-title":"A systematic review of systematic review process research in software engineering","volume":"55","author":"Kitchenham","year":"2013","journal-title":"Inf Softw Technol"},{"key":"10.1016\/j.array.2026.100728_b108","series-title":"Proceedings of the 2023 5th international conference on management science and industrial engineering","first-page":"1","article-title":"Responsibility assignment matrix in responding to critical outages: A case study of it incident management activity process design","author":"Aguilar","year":"2023"},{"key":"10.1016\/j.array.2026.100728_b109","doi-asserted-by":"crossref","DOI":"10.59613\/29qypw51","article-title":"The legal implications of data privacy laws, cybersecurity regulations, and ai ethics in a digital society","volume":"1","author":"Zubaedah","year":"2024","journal-title":"J Acad Sci"},{"key":"10.1016\/j.array.2026.100728_b110","doi-asserted-by":"crossref","first-page":"7173","DOI":"10.1109\/ACCESS.2017.2682323","article-title":"A systematic mapping study of software development with github","volume":"5","author":"Cosentino","year":"2017","journal-title":"IEEE Access"},{"key":"10.1016\/j.array.2026.100728_b111","series-title":"2020 international conference on computational science and computational intelligence","first-page":"93","article-title":"Optimizing cyber security education: Implementation of bloom\u2019s taxonomy for future cyber security workforce","author":"Ramsoonder","year":"2020"},{"key":"10.1016\/j.array.2026.100728_b112","doi-asserted-by":"crossref","first-page":"725","DOI":"10.1007\/s11277-021-08921-2","article-title":"Pedagogical transformation of bloom taxonomy\u2019s lots into hots: An investigation in context with it education","volume":"122","author":"Prakash","year":"2021","journal-title":"Wirel Pers Commun"},{"key":"10.1016\/j.array.2026.100728_b113","doi-asserted-by":"crossref","DOI":"10.61292\/cognoscere.260","article-title":"Membangun kompetensi berpikir tinggi dan keterampilan kerja: Analisis perbandingan taksonomi bloom revisi dan taksonomi simpson\/harrow dalam konteks pendidikan sma dan smk","author":"Ali","year":"2025","journal-title":"Cognoscere: J Komun Dan Media Pendidik"},{"key":"10.1016\/j.array.2026.100728_b114","article-title":"Redefining the blooms taxonomy - developing a framework for cognitive competence acquisition","author":"Ligale","year":"2025","journal-title":"Afr J Tech Vocat Educ Train"},{"key":"10.1016\/j.array.2026.100728_b115","series-title":"A taxonomy of the psychomotor domain: A guide for developing behavioral objectives","author":"Harrow","year":"1972"},{"key":"10.1016\/j.array.2026.100728_b116","series-title":"The architecture of complexity","first-page":"457","author":"Simon","year":"1991"},{"key":"10.1016\/j.array.2026.100728_b117","doi-asserted-by":"crossref","first-page":"1053","DOI":"10.1145\/361598.361623","article-title":"On the criteria to be used in decomposing systems into modules","volume":"15","author":"Parnas","year":"1972","journal-title":"Commun ACM"},{"key":"10.1016\/j.array.2026.100728_b118","series-title":"Proceedings of the 5th international conference on aspect-oriented software development","first-page":"1","article-title":"The power of modularity: the financial consequences of computer and code architecture","author":"Baldwin","year":"2006"},{"key":"10.1016\/j.array.2026.100728_b119","series-title":"2017 IEEE international conference on software quality, reliability and security","first-page":"263","article-title":"The effect of gang-of-four design patterns usage on design quality attributes","author":"Hussain","year":"2017"},{"key":"10.1016\/j.array.2026.100728_b120","series-title":"Fuzzy sets and fuzzy logic: Theory and applications","author":"Klir","year":"1994"},{"key":"10.1016\/j.array.2026.100728_b121","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1016\/j.cie.2014.09.015","article-title":"Talent management in manufacturing system using fuzzy logic approach","volume":"86","author":"Karatop","year":"2015","journal-title":"Comput Ind Eng"},{"key":"10.1016\/j.array.2026.100728_b122","doi-asserted-by":"crossref","first-page":"280","DOI":"10.3390\/axioms10040280","article-title":"Smart competence management using business analytics with fuzzy predicates","volume":"10","author":"Luna","year":"2021","journal-title":"Axioms"},{"key":"10.1016\/j.array.2026.100728_b123","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2024.103804","article-title":"Chatgpt or bard: Who is a better certified ethical hacker?","volume":"140","author":"Raman","year":"2024","journal-title":"Comput Secur"},{"key":"10.1016\/j.array.2026.100728_b124","article-title":"Open or closing doors? The influence of \u2018digital sovereignty\u2019 in the EU\u2019s Cybersecurity Strategy on cybersecurity of open-source software","volume":"56","author":"Tridgell","year":"2025","journal-title":"Comput Law Secur Rev"},{"key":"10.1016\/j.array.2026.100728_b125","doi-asserted-by":"crossref","DOI":"10.3390\/systems13060424","article-title":"Open source as the foundation of safety and security in logistics digital transformation","volume":"13","author":"Plevnik","year":"2025","journal-title":"Systems"},{"key":"10.1016\/j.array.2026.100728_b126","doi-asserted-by":"crossref","first-page":"849","DOI":"10.1109\/TSE.2022.3165056","article-title":"Pull request decisions explained: An empirical overview","volume":"49","author":"Zhang","year":"2023","journal-title":"IEEE Trans Softw Eng"},{"key":"10.1016\/j.array.2026.100728_b127","doi-asserted-by":"crossref","first-page":"907","DOI":"10.1006\/ijhc.1995.1081","article-title":"Toward principles for the design of ontologies used for knowledge sharing?","volume":"43","author":"Gruber","year":"1995","journal-title":"Int J Hum-Comput Stud"},{"key":"10.1016\/j.array.2026.100728_b128","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1016\/j.aei.2007.04.001","article-title":"Investigating ontology development for engineering design support","volume":"22","author":"Darlington","year":"2008","journal-title":"Adv Eng Inform"}],"container-title":["Array"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2590005626000512?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2590005626000512?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T09:21:33Z","timestamp":1777368093000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2590005626000512"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,7]]},"references-count":128,"alternative-id":["S2590005626000512"],"URL":"https:\/\/doi.org\/10.1016\/j.array.2026.100728","relation":{},"ISSN":["2590-0056"],"issn-type":[{"value":"2590-0056","type":"print"}],"subject":[],"published":{"date-parts":[[2026,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Towards a unified European Cybersecurity Skills Framework: Structural insights from expert elicitation and international standards","name":"articletitle","label":"Article Title"},{"value":"Array","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.array.2026.100728","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 The Author(s). Published by Elsevier Inc.","name":"copyright","label":"Copyright"}],"article-number":"100728"}}