{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T13:36:57Z","timestamp":1774445817066,"version":"3.50.1"},"reference-count":164,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2023,6,8]],"date-time":"2023-06-08T00:00:00Z","timestamp":1686182400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"crossref","award":["2019-1-LI01-KA203-000130"],"award-info":[{"award-number":["2019-1-LI01-KA203-000130"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Knowledge Foundation of Sweden","award":["20210026"],"award-info":[{"award-number":["20210026"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Comput. Educ."],"published-print":{"date-parts":[[2023,6,30]]},"abstract":"<jats:p>Competency models are widely adopted frameworks that are used to improve human resource functions and education. However, the characteristics of competency models related to the information security and cybersecurity domains are not well understood. To bridge this gap, this study investigates the current state of competency models related to the security domain through qualitative content analysis. Additionally, based on the competency model analysis, an evidence-based competency model is proposed. Examining the content of 27 models, we found that the models can benefit target groups in many different ways, ranging from policymaking to performance management. Owing to their many uses, competency models can arguably help to narrow the skills gap from which the profession is suffering. Nonetheless, the models have their shortcomings. First, the models do not cover all of the topics specified by the Cybersecurity Body of Knowledge (i.e., no model is complete). Second, by omitting social, personal, and methodological competencies, many models reduce the competency profile of a security expert to professional competencies. Addressing the limitations of previous work, the proposed competency model provides a holistic view of the competencies required by security professionals for job achievement and can potentially benefit both the education system and the labor market. To conclude, the implications of the competency model analysis and use cases of the proposed model are discussed.<\/jats:p>","DOI":"10.1145\/3573205","type":"journal-article","created":{"date-parts":[[2022,12,6]],"date-time":"2022-12-06T00:04:26Z","timestamp":1670285066000},"page":"1-33","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":25,"title":["Competency Models for Information Security and Cybersecurity Professionals: Analysis of Existing Work and a New Model"],"prefix":"10.1145","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8004-4243","authenticated-orcid":false,"given":"Daniel","family":"Bendler","sequence":"first","affiliation":[{"name":"University of Innsbruck, Innsbruck, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3818-4442","authenticated-orcid":false,"given":"Michael","family":"Felderer","sequence":"additional","affiliation":[{"name":"University of Innsbruck and Blekinge Institute of Technology, Karlskrona, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2023,6,8]]},"reference":[{"key":"e_1_3_2_2_2","first-page":"4068","volume-title":"Proceedings of the World Conference on Educational Multimedia, Hypermedia, and Telecommunications (ED-MEDIA\u201908).","author":"Adelsberger Heimo H.","year":"2008","unstructured":"Heimo H. Adelsberger, Ulf D. Ehlers, and Dirk Schneckenberg. 2008. Stepping up the ladder - competence development through e-learning?! In Proceedings of the World Conference on Educational Multimedia, Hypermedia, and Telecommunications (ED-MEDIA\u201908). 4068\u20134082."},{"key":"e_1_3_2_3_2","volume-title":"Foundations of Information Security: A Straightforward Introduction","author":"Andress Jason","year":"2019","unstructured":"Jason Andress. 2019. Foundations of Information Security: A Straightforward Introduction. No Starch Press, San Francisco, CA."},{"key":"e_1_3_2_4_2","volume-title":"Armstrong\u2019s Handbook of Human Resource Management Practice (13th ed.)","author":"Armstrong Michael","year":"2014","unstructured":"Michael Armstrong and Stephen Taylor. 2014. Armstrong\u2019s Handbook of Human Resource Management Practice (13th ed.). Kogan Page, London, UK."},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/3421254"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.edurev.2011.03.001"},{"key":"e_1_3_2_7_2","volume-title":"Proceedings of the 20th Koli Calling International Conference on Computing Education Research (Koli Calling\u201920).","author":"Barkmin Mike","year":"2020","unstructured":"Mike Barkmin and Torsten Brinda. 2020. Analysis of programming assessments\u2014Building an open repository for measuring competencies. In Proceedings of the 20th Koli Calling International Conference on Computing Education Research (Koli Calling\u201920).ACM, New York, NY, Article 31, 10 pages. 10.1145\/3428029.3428039"},{"key":"e_1_3_2_8_2","first-page":"528","volume-title":"Encyclopedia of Software Engineering","author":"Basili Victor R.","year":"1994","unstructured":"Victor R. Basili, Gianluigi Caldiera, and Dieter H. Rombach. 1994. The goal question metric approach. In Encyclopedia of Software Engineering, John J. Marciniak (Ed.). John Wiley & Sons, New York, NY, 528\u2013532."},{"key":"e_1_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.5281\/ZENODO.4765645"},{"key":"e_1_3_2_10_2","unstructured":"Daniel Bendler and Michael Felderer. 2022. Maintenance\/Replication Package . Zenodo. 10.5281\/ZENODO.5913477"},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2021.101769"},{"key":"e_1_3_2_12_2","volume-title":"SFIAplus - IT Skills Framework","author":"Society British Computer","year":"2020","unstructured":"British Computer Society. 2020. SFIAplus - IT Skills Framework. British Computer Society. https:\/\/www.bcs.org\/membership\/sfiaplus-it-skills-framework\/."},{"key":"e_1_3_2_13_2","doi-asserted-by":"crossref","first-page":"999","DOI":"10.1109\/EDUCON.2014.6826224","volume-title":"Proceedings of the 2014 IEEE Global Engineering Education Conference (EDUCON\u201914).","author":"Br\u00f6ker Kathrin","year":"2014","unstructured":"Kathrin Br\u00f6ker and Johannes Magenheim. 2014. Are there competences every computer scientist should have? In Proceedings of the 2014 IEEE Global Engineering Education Conference (EDUCON\u201914).IEEE, Los Alamitos, CA, 999\u20131002. 10.1109\/EDUCON.2014.6826224"},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1080\/08832323.2018.1446893"},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2019.102058"},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.22024\/UNIKENT\/03\/AJPP.506"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/2556936"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.01.015"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(13)70062-9"},{"key":"e_1_3_2_20_2","unstructured":"Anthony F. Camilleri. 2011. A Report on e-Competence Frameworks: For the Malta Information Technology Agency MITA. Retrieved March 23 2020 from https:\/\/knowledgeinnovation.eu\/wp-content\/uploads\/2015\/05\/MITA-eCompetences-Master-2.pdf."},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1111\/j.1744-6570.2010.01207.x"},{"key":"e_1_3_2_22_2","unstructured":"Careeronestop.org. 2015. Competency Models in Action: College Uses Cybersecurity Competency Model to Align and Create Curricula. Retrieved March 3 2021 from https:\/\/www.careeronestop.org\/CompetencyModel\/Info_Documents\/Excelsior-CaseSummary.pdf."},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/3467967"},{"key":"e_1_3_2_24_2","unstructured":"Committee on National Security Systems. 2010. National Information Assurance Glossary. Retrieved January 22 2021 from https:\/\/www.hsdl.org\/?view&did=7447."},{"key":"e_1_3_2_25_2","doi-asserted-by":"crossref","first-page":"2006","DOI":"10.1109\/HICSS.2014.254","volume-title":"Proceedings of the 2014 47th Hawaii International Conference on System Sciences.","author":"Conklin Wm. Arthur","year":"2014","unstructured":"Wm. Arthur Conklin, Raymond E. Cline, and Tiffany Roosa. 2014. Re-engineering cybersecurity education in the US: An analysis of the critical factors. In Proceedings of the 2014 47th Hawaii International Conference on System Sciences.IEEE, Los Alamitos, CA, 2006\u20132014. 10.1109\/HICSS.2014.254"},{"key":"e_1_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2017.07.010"},{"key":"e_1_3_2_27_2","volume-title":"The Cybersecurity Workforce Gap","author":"Crumpler William","year":"2019","unstructured":"William Crumpler and James A. Lewis. 2019. The Cybersecurity Workforce Gap. Center for Strategic and International Studies. Retrieved March 22, 2021 from https:\/\/www.csis.org\/analysis\/cybersecurity-workforce-gap."},{"key":"e_1_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2018.00744"},{"key":"e_1_3_2_29_2","volume-title":"Cybersecurity Skills Development in the EU: The Certification of Cybersecurity Degrees and ENISA\u2019s Higher Education Database","author":"Zan Tommaso De","year":"2019","unstructured":"Tommaso De Zan and Fabio Di Franco. 2019. Cybersecurity Skills Development in the EU: The Certification of Cybersecurity Degrees and ENISA\u2019s Higher Education Database. ENISA, Heraklion, Greek. https:\/\/www.enisa.europa.eu\/publications\/the-status-of-cyber-security-education-in-the-european-union."},{"key":"e_1_3_2_30_2","volume-title":"Cyber Security Skills: Business Perspectives and Government\u2019s Next Steps","author":"Skills Department of Business Innovation and","year":"2014","unstructured":"Department of Business Innovation and Skills. 2014. Cyber Security Skills: Business Perspectives and Government\u2019s Next Steps. HMSO, London, UK. https:\/\/assets.publishing.service.gov.uk\/government\/uploads\/system\/uploads\/attachment_data\/file\/289806\/bis-14-647-cyber-security-skills-business-perspectives-and-governments-next-steps.pdf."},{"key":"e_1_3_2_31_2","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1007\/978-3-319-41713-4_13","volume-title":"Competence-Based Vocational and Professional Education","author":"Boritz Efrim","year":"2017","unstructured":"Efrim Boritz and Carla Carnaghan. 2017. Competence-based education and assessment in the accounting profession in Canada and the USA. In Competence-Based Vocational and Professional Education, Martin Mulder (Ed.). Springer International, Cham, Switzerland, 273\u2013296."},{"key":"e_1_3_2_32_2","unstructured":"Enhancement of Cyber Educational System of Montenegro. 2013. Usable Cyber Security Competency Framework. Retrieved May 7 2020 from http:\/\/ecesm.net\/sites\/default\/files\/Dev%203.2%20-%20Usable%20cyber%20security%20competency%20framework%20%5Bdraft%202016.03.31%5D.pdf."},{"key":"e_1_3_2_33_2","unstructured":"Michelle R. Ennis. 2008. Competency Models: A Review of the Literature and the Role of the Employment and Training Administration (ETA). Retrieved April 29 2021 from https:\/\/wdr.doleta.gov\/research\/FullText_Documents\/Competency%20Models%20-%20A%20Review%20of%20Literature%20and%20the%20Role%20of%20the%20Employment%20and%20Training%20Administration.pdf."},{"key":"e_1_3_2_34_2","doi-asserted-by":"crossref","DOI":"10.34156\/9783791035123","volume-title":"Handbuch Kompetenzmessung: Erkennen, Verstehen und bewerten von Kompetenzen in der Betrieblichen, p\u00e4dagogischen und psychologischen Praxis (3rd ed.)","author":"Erpenbeck John","year":"2017","unstructured":"John Erpenbeck, Lutz von Rosenstiel, Sven Grote, and Werner Sauter (Eds.). 2017. Handbuch Kompetenzmessung: Erkennen, Verstehen und bewerten von Kompetenzen in der Betrieblichen, p\u00e4dagogischen und psychologischen Praxis (3rd ed.). Sch\u00e4ffer-Poeschel, Stuttgart, Germany."},{"key":"e_1_3_2_35_2","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1145\/1987875.1987898","volume-title":"Proceedings of the 2011 International Conference on Software and Systems Process (ICSSP\u201911)","author":"Espinosa-Curiel Ismael E.","year":"2011","unstructured":"Ismael E. Espinosa-Curiel, Josefina Rodr\u00edguez-Jacobo, and Alberto J. Fern\u00e1ndez-Zepeda. 2011. A competency framework for the stakeholders of a software process improvement initiative. In Proceedings of the 2011 International Conference on Software and Systems Process (ICSSP\u201911). ACM, New York, NY, 139\u2013148. 10.1145\/1987875.1987898"},{"key":"e_1_3_2_36_2","unstructured":"European Committee for Standardization. 2020. e-Competence Framework (e-CF): A Common European Framework for ICT Professionals in All Sectors: Version 4.0. Retrieved June 27 2020 from https:\/\/standards.cen.eu\/dyn\/www\/f?p=204:110:0::::FSP_PROJECT FSP_ORG_ID:67073 1218399&cs=1A148766F9EC80CBD3340728E3B8BB892."},{"key":"e_1_3_2_37_2","unstructured":"European Union Agency for Cybersecurity. 2020. Emerging Trends: ENISA Threat Landscape: From January 2019 to April 2020. Retrieved March 22 2021 from https:\/\/www.enisa.europa.eu\/publications\/emerging-trends."},{"key":"e_1_3_2_38_2","unstructured":"European Union Agency for Cybersecurity. 2020. Main Incidents in the EU and Worldwide: ENISA Threat Landscape: From January 2019 to April 2020. Retrieved April 20 2021 from https:\/\/www.enisa.europa.eu\/publications\/enisa-threat-landscape-2020-main-incidents."},{"key":"e_1_3_2_39_2","unstructured":"EY. 2018. Is Cybersecurity About More Than Protection? EY Global Information Security Survey 2018\u201319. Retrieved October 8 2020 from https:\/\/assets.ey.com\/content\/dam\/ey-sites\/ey-com\/en_ca\/topics\/advisory\/ey-global-information-security-survey-2018-19.pdf."},{"key":"e_1_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1016\/bs.adcom.2015.11.003"},{"key":"e_1_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-5297-0.ch012"},{"key":"e_1_3_2_42_2","first-page":"148","volume-title":"Proceedings Companion of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE\u201918 Companion)","author":"Frezza Stephen","year":"2018","unstructured":"Stephen Frezza, Charles Wallace, Mats Daniels, Arnold Pears, \u00c5sa Cajander, Amanpreet Kapoor, Roger McDermott, Anne-Kathrin Peters, and Mihaela Sabin. 2018. Modelling competencies for computing education beyond 2020: A research based approach to defining competencies in the computing disciplines. In Proceedings Companion of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE\u201918 Companion). ACM, New York, NY, 148\u2013174. 10.1145\/3293881.3295782"},{"key":"e_1_3_2_43_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102080"},{"key":"e_1_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2018.09.006"},{"key":"e_1_3_2_45_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.04.015"},{"key":"e_1_3_2_46_2","unstructured":"German Qualifcations Framework Working Group. 2011. The German Qualifications Framework for Lifelong Learning. Retrieved November 16 2021 from https:\/\/www.dqr.de\/media\/content\/Der_Deutsche_Qualifikationsrahmen_fue_lebenslanges_Lernen.pdf."},{"key":"e_1_3_2_47_2","doi-asserted-by":"crossref","DOI":"10.1201\/b18257","volume-title":"Official (ISC)2 Guide to the CISSP CBK","author":"Gordon Adam","year":"2015","unstructured":"Adam Gordon. 2015. Official (ISC)2 Guide to the CISSP CBK. CRC Press, Boca Raton, FL."},{"key":"e_1_3_2_48_2","first-page":"477","volume-title":"Proceedings of the 27th ACM Conference on Innovation and Technology in Computer Science Education Vol 1 (ITiCSE\u201922).","author":"Goupil Francois","year":"2022","unstructured":"Francois Goupil, Pavel Laskov, Irdin Pekaric, Michael Felderer, Alexander D\u00fcrr, and Frederic Thiesse. 2022. Towards understanding the skill gap in cybersecurity. In Proceedings of the 27th ACM Conference on Innovation and Technology in Computer Science Education Vol 1 (ITiCSE\u201922).ACM, New York, NY, 477\u2013483. 10.1145\/3502718.3524807"},{"key":"e_1_3_2_49_2","first-page":"1","volume-title":"Proceedings of the 2018 USENIX Workshop on Advances in Security Education (ASE\u201918)","author":"Hallett Joseph","year":"2018","unstructured":"Joseph Hallett, Robert Larson, and Awais Rashid. 2018. Mirror, mirror, on the wall: What are we teaching them all? Characterising the focus of cybersecurity curricular frameworks. In Proceedings of the 2018 USENIX Workshop on Advances in Security Education (ASE\u201918). 1\u20139."},{"key":"e_1_3_2_50_2","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/3-540-33020-8_9","volume-title":"Leistung und Leistungsdiagnostik","author":"Hartig Johannes","year":"2006","unstructured":"Johannes Hartig and Eckhard Klieme. 2006. Kompetenz und kompetenzdiagnostik. In Leistung und Leistungsdiagnostik, Karl Schweizer (Ed.). Springer, Berlin, Germany, 127\u2013143."},{"key":"e_1_3_2_51_2","volume-title":"M\u00f6glichkeiten und Voraussetzungen technologiebasierter Kompetenzdiagnostik: Eine Expertise im Auftrag des Bundesministeriums f\u00fcr Bildung und Forschung","author":"Hartig Johannes","year":"2007","unstructured":"Johannes Hartig and Eckhard Klieme. 2007. M\u00f6glichkeiten und Voraussetzungen technologiebasierter Kompetenzdiagnostik: Eine Expertise im Auftrag des Bundesministeriums f\u00fcr Bildung und Forschung. BMBF, Berlin, Germany."},{"key":"e_1_3_2_52_2","first-page":"21","volume-title":"Proceedings of the 16th Australasian Computing Education Conference.","author":"Herbert Nicole","year":"2014","unstructured":"Nicole Herbert, Kristy de Salas, Ian Lewis, Julian Dermoudy, and Leonie Ellis. 2014. ICT curriculum and course structure: The great balancing act. In Proceedings of the 16th Australasian Computing Education Conference.21\u201330."},{"key":"e_1_3_2_53_2","volume-title":"Kompetenztraining: Informations- und Trainingsprogramme (2nd ed.)","author":"Heyse Volker","year":"2010","unstructured":"Volker Heyse and John Erpenbeck. 2010. Kompetenztraining: Informations- und Trainingsprogramme (2nd ed.). Sch\u00e4ffer-Poeschel, Stuttgart, Germany."},{"key":"e_1_3_2_54_2","volume-title":"National Cyber Security Strategy 2016-2021","author":"Government HM","year":"2016","unstructured":"HM Government. 2016. National Cyber Security Strategy 2016-2021. HM Government, London, UK. https:\/\/assets.publishing.service.gov.uk\/government\/uploads\/system\/uploads\/attachment_data\/file\/567242\/national_cyber_security_strategy_2016.pdf."},{"key":"e_1_3_2_55_2","unstructured":"(ISC) 2 . 2018. Building a Resilient Cybersecurity Culture: A Dedicated Staff with a Clear Mission Helps Retain and Engage a Cybersecurity Workforce. https:\/\/www.isc2.org\/-\/media\/Files\/Reports\/Building-A-Resilient-Cybersecurity-Culture.ashx?la=en&hash=5BBBD1218138977BF7150E1593319F70B5670B6F."},{"key":"e_1_3_2_56_2","unstructured":"(ISC) 2 . 2018. Hiring and Retaining Top Cybersecurity Talent: What Employers Need to Know About Cybersecurity Jobseekers in 2018. Retrieved March 25 2021 from https:\/\/www.isc2.org\/-\/media\/Files\/Research\/ISC2-Hiring-and-Retaining-Top-Cybersecurity-Talent.ashx."},{"key":"e_1_3_2_57_2","unstructured":"(ISC) 2 . 2020. Cybersecurity Professionals Stand Up to a Pandemic: (ISC) 2 Cybersecurity Workforce Study 2020. Retrieved March 22 2021 from https:\/\/www.isc2.org\/Research\/Workforce-Study."},{"key":"e_1_3_2_58_2","series-title":"International standard","volume-title":"Information Technology, Security Techniques, Code of Practice for Information Security Management","year":"2005","unstructured":"ISO\/IEC. 2005. Information Technology, Security Techniques, Code of Practice for Information Security Management. International standard, Vol. ISO\/IEC 27002 (2005). ISO\/IEC, Genf, Schweiz."},{"key":"e_1_3_2_59_2","unstructured":"DOCPLAYER. n.d. Information Technology (IT) Specialist (GS-2210) IT Security Competency Model. Retrieved May 8 2020 from https:\/\/docplayer.net\/15738823-Information-technology-it-specialist-gs-2210-it-security-competency-model.html."},{"key":"e_1_3_2_60_2","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1007\/978-3-642-20072-4_7","volume-title":"Testtheorie und Fragebogenkonstruktion","author":"Hartig Johannes","year":"2012","unstructured":"Johannes Hartig, Andreas Frey, and Nina Jude. 2012. Validit\u00e4t. In Testtheorie und Fragebogenkonstruktion, Helfried Moosbrugger and Augustin Kelava (Eds.). Springer, Berlin, Germany, 143\u2013171."},{"key":"e_1_3_2_61_2","doi-asserted-by":"crossref","unstructured":"Joint Task Force on Cybersecurity Education. 2017. Cybersecurity Curricula 2017: Curriculum Guidelines for Post-Secondary Degree Programs in Cybersecurity. Version 1.0. Retrieved March 24 2020 from https:\/\/europe.acm.org\/binaries\/content\/assets\/education\/curricula-recommendations\/csec2017.pdf.","DOI":"10.1145\/3422808"},{"key":"e_1_3_2_62_2","doi-asserted-by":"publisher","DOI":"10.1145\/3152893"},{"key":"e_1_3_2_63_2","volume-title":"Zur Entwicklung Nationaler Bildungsstandards: Eine Expertise","author":"Klieme Eckhard","year":"2003","unstructured":"Eckhard Klieme, Hermann Avenarius, Werner Blum, Peter D\u00f6brich, Hans Gruber, Manfred Prenzel, Kristina Reiss, et\u00a0al. 2003. Zur Entwicklung Nationaler Bildungsstandards: Eine Expertise. BMBF, Berlin, Germany."},{"key":"e_1_3_2_64_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-531-90865-6_2"},{"issue":"6","key":"e_1_3_2_65_2","first-page":"876","article-title":"Kompetenzmodelle zur Erfassung individueller Lernergebnisse und zur Bilanzierung von Bildungsprozessen. Beschreibung eines neu eingerichteten Schwerpunktprogramms der DFG","volume":"52","author":"Klieme E.","year":"2006","unstructured":"E. Klieme and D. Leutner. 2006. Kompetenzmodelle zur Erfassung individueller Lernergebnisse und zur Bilanzierung von Bildungsprozessen. Beschreibung eines neu eingerichteten Schwerpunktprogramms der DFG. Zeitschrift f\u00fcr P\u00e4dagogik 52, 6 (2006), 876\u2013903.","journal-title":"Zeitschrift f\u00fcr P\u00e4dagogik"},{"issue":"2","key":"e_1_3_2_66_2","first-page":"101","article-title":"Maintaining a cybersecurity curriculum: Professional certifications as valuable guidance","volume":"28","author":"Knapp Kenneth J.","year":"2017","unstructured":"Kenneth J. Knapp, Christopher Maurer, and Miloslava Plachkinova. 2017. Maintaining a cybersecurity curriculum: Professional certifications as valuable guidance. Journal of Information Systems Education 28, 2 (2017), 101\u2013114.","journal-title":"Journal of Information Systems Education"},{"key":"e_1_3_2_67_2","first-page":"13","volume-title":"Proceedings of the 16th Australasian Computing Education Conference.","author":"Konsky Brian R. von","year":"2014","unstructured":"Brian R. von Konsky, Ashley Jones, and Charlynn Miller. 2014. Visualising career progression for ICT professionals and the implications for ICT curriculum design in higher education. In Proceedings of the 16th Australasian Computing Education Conference.13\u201320."},{"key":"e_1_3_2_68_2","first-page":"1","volume-title":"Proceedings of the 2016 International Conference on Learning and Teaching in Computing and Engineering (LaTICE\u201916).","author":"Kramer Matthias","year":"2016","unstructured":"Matthias Kramer, Peter Hubwieser, and Torsten Brinda. 2016. A competency structure model of object-oriented programming. In Proceedings of the 2016 International Conference on Learning and Teaching in Computing and Engineering (LaTICE\u201916).IEEE, Los Alamitos, CA, 1\u20138. 10.1109\/LaTiCE.2016.24"},{"key":"e_1_3_2_69_2","first-page":"37","volume-title":"Proceedings of the 1st International Conference on Stakeholders and Information Technology in Education (SAITE\u201916).","author":"Kramer Matthias","year":"2016","unstructured":"Matthias Kramer, David Tobinski, and Torsten Brinda. 2016. Modelling competency in the field of OOP: From investigating computer science curricula to developing test items. In Proceedings of the 1st International Conference on Stakeholders and Information Technology in Education (SAITE\u201916).37\u201346. 10.1007\/978-3-319-54687-2_4"},{"key":"e_1_3_2_70_2","volume-title":"Kompetenzmodelle","author":"Krumm Stefan","year":"2012","unstructured":"Stefan Krumm, Inga Mertin, and Christina Dries. 2012. Kompetenzmodelle. Hogrefe, G\u00f6ttingen, Germany."},{"key":"e_1_3_2_71_2","volume-title":"Qualitative Inhaltsanalyse: Methoden, Praxis, Computerunterst\u00fctzung (4th ed.)","author":"Kuckartz Udo","year":"2018","unstructured":"Udo Kuckartz. 2018. Qualitative Inhaltsanalyse: Methoden, Praxis, Computerunterst\u00fctzung (4th ed.). Beltz Juventa, Weinheim, Germany."},{"key":"e_1_3_2_72_2","doi-asserted-by":"publisher","DOI":"10.1080\/1367886042000338227"},{"key":"e_1_3_2_73_2","first-page":"6.1\u20136.46","volume-title":"Cochrane Handbook for Systematic Reviews of Interventions Version 5.1.0","author":"Lefebvre Carol","year":"2008","unstructured":"Carol Lefebvre, Eric Manheimer, and Julie Glanville. 2008. Searching for studies. In Cochrane Handbook for Systematic Reviews of Interventions Version 5.1.0, Julian Higgins and Sally Green (Eds.). Cochrane, 6.1\u20136.46. https:\/\/crtha.iums.ac.ir\/files\/crtha\/files\/cochrane.pdf."},{"key":"e_1_3_2_74_2","doi-asserted-by":"publisher","DOI":"10.28945\/479"},{"key":"e_1_3_2_75_2","first-page":"54","volume-title":"Proceedings of the ACM Turing Award Celebration Conference\u2014China (ACM TURC\u201921).","author":"Liu Qiang","year":"2021","unstructured":"Qiang Liu, Wentao Zhao, Ruijin Wang, and Jiangyong Shi. 2021. A competence-based three-layer cybersecurity education framework and its application. In Proceedings of the ACM Turing Award Celebration Conference\u2014China (ACM TURC\u201921).ACM, New York, NY, 54\u201360. 10.1145\/3472634.3472649"},{"key":"e_1_3_2_76_2","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1099-050X(199621)35:1<7::AID-HRM1>3.0.CO;2-2"},{"issue":"1","key":"e_1_3_2_77_2","first-page":"79","article-title":"A framework for improving information assurance education","volume":"9","author":"Manson Daniel P.","year":"2009","unstructured":"Daniel P. Manson, Steven S. Curl, and Javier Torner. 2009. A framework for improving information assurance education. Communications of the IIMA 9, 1 (2009), 79\u201390.","journal-title":"Communications of the IIMA"},{"key":"e_1_3_2_78_2","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/978-3-8349-6384-0_2","volume-title":"Praxishandbuch Personalentwicklung","author":"Marc Solga","year":"2011","unstructured":"Solga Marc, Ryschka Jurij, and Mattenklott Axel. 2011. Personalentwicklung: Gegenstand, prozessmodell, erfolgsfaktoren. In Praxishandbuch Personalentwicklung, J. Ryschka, M. Solga, and A. Mattenklot (Eds.). Springer Gabler, Wiesbaden, Germany, 19\u201334."},{"issue":"2","key":"e_1_3_2_79_2","first-page":"117","article-title":"Confounded by competencies? An evaluation of the evolution and use of competency models","volume":"34","author":"Markus Leanne H.","year":"2005","unstructured":"Leanne H. Markus, Helena D. Cooper-Thomas, and Keith N. Allpress. 2005. Confounded by competencies? An evaluation of the evolution and use of competency models. New Zealand Journal of Psychology 34, 2 (2005), 117\u2013127.","journal-title":"New Zealand Journal of Psychology"},{"key":"e_1_3_2_80_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10488-005-3264-0"},{"key":"e_1_3_2_81_2","volume-title":"Qualitative Inhaltsanalyse: Grundlagen und Techniken (12. ed.)","author":"Mayring Philipp","year":"2015","unstructured":"Philipp Mayring. 2015. Qualitative Inhaltsanalyse: Grundlagen und Techniken (12. ed.). Beltz Verlag, Weinheim, Germany."},{"issue":"1","key":"e_1_3_2_82_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1037\/h0034092","article-title":"Testing for competence rather than for \u201cintelligence.\u201d","volume":"28","author":"McClealland David C.","year":"1973","unstructured":"David C. McClealland. 1973. Testing for competence rather than for \u201cintelligence.\u201d American Psychologist 28, 1 (1973), 1\u201314.","journal-title":"American Psychologist"},{"key":"e_1_3_2_83_2","first-page":"83","volume-title":"Proceedings of the 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW\u201916).","author":"Miloslavskaya Natalia","year":"2016","unstructured":"Natalia Miloslavskaya and Alexander Tolstoy. 2016. State-level views on professional competencies in the field of IoT and cloud information security. In Proceedings of the 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW\u201916).IEEE, Los Alamitos, CA, 83\u201390. 10.1109\/W-FiCloud.2016.31"},{"key":"e_1_3_2_84_2","volume-title":"The Art of Deception: Controlling the Human Element of Security","author":"Mitnick Kevin D.","year":"2002","unstructured":"Kevin D. Mitnick and William L. Simon. 2002. The Art of Deception: Controlling the Human Element of Security. Wiley Publishing, Indianapolis, IN."},{"issue":"11","key":"e_1_3_2_85_2","first-page":"132","article-title":"An analysis of the horizontal and vertical consistency of ICT skill standards in selected countries and regions","volume":"11","author":"Nur Raduan A.","year":"2020","unstructured":"Raduan A. Nur, Nab Seung-Il, Kim Young-Heung, and Oh Chun-Sik. 2020. An analysis of the horizontal and vertical consistency of ICT skill standards in selected countries and regions. International Journal of Innovation, Creativity and Change. 11, 11 (2020), 132\u2013146.","journal-title":"International Journal of Innovation, Creativity and Change."},{"key":"e_1_3_2_86_2","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1109\/UKSim.2013.101","volume-title":"Proceedings of the 2013 UKSim 15th International Conference on Computer Modelling and Simulation.","author":"Orsoni Alessandra","year":"2013","unstructured":"Alessandra Orsoni and Brian Colaco. 2013. A competency framework for software development organizations. In Proceedings of the 2013 UKSim 15th International Conference on Computer Modelling and Simulation.IEEE, Los Alamitos, CA, 507\u2013511. 10.1109\/UKSim.2013.101"},{"key":"e_1_3_2_87_2","doi-asserted-by":"publisher","DOI":"10.1109\/TE.2017.2715174"},{"key":"e_1_3_2_88_2","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1007\/978-3-030-11407-7_13","volume-title":"Information Security: 17th International Conference","author":"Parker Amaanullah","year":"2019","unstructured":"Amaanullah Parker and Irwin Brown. 2019. Skills requirements for cyber security professionals: A content analysis of job descriptions in South Africa. In Information Security: 17th International Conference (Pretoria, South Africa, August 15\u201316, 2019), Hein Venter, Marianne Loock, Marijke Coetzee, Mariki Eloff, and Jan Eloff (Eds.). Springer International Publishing, Cham, Switzerland, 176\u2013192."},{"key":"e_1_3_2_89_2","first-page":"36","volume-title":"Proceedings Companion of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE\u201918 Companion).","author":"Parrish Allen","year":"2018","unstructured":"Allen Parrish, John Impagliazzo, Rajendra K. Raj, Henrique Santos, Muhammad R. Asghar, Audun J\u00f8sang, Teresa Pereira, and Eliana Stavrou. 2018. Global perspectives on cybersecurity education for 2030: A case for a meta-discipline. In Proceedings Companion of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE\u201918 Companion).ACM, New York, NY, 36\u201354. 10.1145\/3293881.3295778"},{"issue":"1","key":"e_1_3_2_90_2","first-page":"1","article-title":"Beyond abilities: A dispositional theory of thinking","volume":"39","author":"Perkins David N.","year":"1993","unstructured":"David N. Perkins, Eileen Jay, and Shari Tishman. 1993. Beyond abilities: A dispositional theory of thinking. Merrill-Palmer Quarterly 39, 1 (1993), 1\u201321.","journal-title":"Merrill-Palmer Quarterly"},{"key":"e_1_3_2_91_2","doi-asserted-by":"publisher","DOI":"10.1111\/1467-9752.12080"},{"key":"e_1_3_2_92_2","first-page":"1","volume-title":"BLED 2016 Proceedings.","author":"Plessius Henk","year":"2016","unstructured":"Henk Plessius and Pascal Ravesteyn. 2016. Mapping the European e-Competence Framework on the domain of information technology: A comparative study. In BLED 2016 Proceedings.1\u201313."},{"key":"e_1_3_2_93_2","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1145\/2751957.2751967","volume-title":"Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research (SIGMIS-CPR\u201915).","author":"Potter Leigh E.","year":"2015","unstructured":"Leigh E. Potter and Gregory Vickers. 2015. What skills do you need to work in cyber security? In Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research (SIGMIS-CPR\u201915). ACM, New York, NY, 67\u201372. 10.1145\/2751957.2751967"},{"key":"e_1_3_2_94_2","doi-asserted-by":"crossref","first-page":"535","DOI":"10.1109\/EDUCON.2019.8725033","volume-title":"Proceedings of the 2019 IEEE Global Engineering Education Conference (EDUCON\u201919).","author":"Rahhal Ibrahim","year":"2019","unstructured":"Ibrahim Rahhal, Ibtissam Makdoun, Ghita Mezzour, Imane Khaouja, Kathleen Carley, and Ismail Kassou. 2019. Analyzing cybersecurity job market needs in Morocco by mining job ads. In Proceedings of the 2019 IEEE Global Engineering Education Conference (EDUCON\u201919).IEEE, Los Alamitos, CA, 535\u2013543. 10.1109\/EDUCON.2019.8725033"},{"key":"e_1_3_2_95_2","volume-title":"CyBOK: The Cyber Security Body of Knowledge: Version 1.0","author":"Rashid Awais","year":"2019","unstructured":"Awais Rashid, Howard Chivers, George Danezis, Emil Lupu, and Andrew Martin (Eds.). 2019. CyBOK: The Cyber Security Body of Knowledge: Version 1.0. Retrieved March 23, 2020 from https:\/\/www.cybok.org\/media\/downloads\/CyBOK-version-1.0.pdf. Accessed April 4, 2023."},{"key":"e_1_3_2_96_2","volume-title":"Software Assurance: A Guide to the Common Body of Knowledge to Produce, Acquire and Sustain Secure Software: Version 1.1","author":"Redwine Samuel T.","year":"2006","unstructured":"Samuel T. Redwine (Ed.). 2006. Software Assurance: A Guide to the Common Body of Knowledge to Produce, Acquire and Sustain Secure Software: Version 1.1. U.S. Department of Homeland Security."},{"key":"e_1_3_2_97_2","unstructured":"Gerhard R\u00f6hner Torsten Brinda Volker Denke Lutz Hellmig Theo Heu\u00dfer Arno Pasternak Andreas Schwill and Monika Seiffert. 2016. Bildungsstandards Informatik f\u00fcr die Sekundarstufe II: Beilage zu LOG IN 36. Jg. (2016) Heft Nr. 183\/184. Retrieved April 1 2020 from https:\/\/informatikstandards.de\/standards\/bildungsstandards-informatik-fuer-die-sekundarstufe-ii."},{"key":"e_1_3_2_98_2","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-658-11294-3","volume-title":"Strategisches Kompetenzmanagement 2.0: Potenziale nutzen\u2014Performance steigern","author":"Sauter Werner","year":"2016","unstructured":"Werner Sauter and Franz-Peter Staudt. 2016. Strategisches Kompetenzmanagement 2.0: Potenziale nutzen\u2014Performance steigern. Springer Gabler, Wiesbaden, Germany."},{"key":"e_1_3_2_99_2","first-page":"223","volume-title":"Entwicklungsquadrat\u2014Theoretische Fundierung und praktische Anwendungen","author":"Scheffer David","year":"2007","unstructured":"David Scheffer, Harald Schmitz, and Werner Sarges. 2007. Das kompetenzmodell auf basis des wertequadrats: Motor von Ver\u00e4nderungen in Unternehmen. In Entwicklungsquadrat\u2014Theoretische Fundierung und praktische Anwendungen, Fritz Westermann (Ed.). Hogrefe, G\u00f6ttingen, Germany, 223\u2013244."},{"issue":"3","key":"e_1_3_2_100_2","doi-asserted-by":"crossref","first-page":"703","DOI":"10.1111\/j.1744-6570.2000.tb00220.x","article-title":"The practice of competency modeling","volume":"53","author":"Schippmann Jeffery S.","year":"2000","unstructured":"Jeffery S. Schippmann, Ronald A. Ash, Mariangela Battista, Linda Carr, Lorraine D. Eyde, Beryl Hesketh, Jerry Kehoe, Kenneth Pearlman, Erich P. Prien, and Juan I. Sanchez. 2000. The practice of competency modeling. Personnel Psychology 53, 3 (2000), 703\u2013740.","journal-title":"Personnel Psychology"},{"key":"e_1_3_2_101_2","first-page":"11","volume-title":"Proceedings of the 12th International Conference on Grey Literature: Transparency in Grey Literature.","author":"Sch\u00f6pfel Joachim","year":"2010","unstructured":"Joachim Sch\u00f6pfel. 2010. Towards a prague definition of grey literature. In Proceedings of the 12th International Conference on Grey Literature: Transparency in Grey Literature.11\u201326."},{"key":"e_1_3_2_102_2","doi-asserted-by":"crossref","DOI":"10.4135\/9781529682571","volume-title":"Qualitative Content Analysis in Practice","author":"Schreier Margrit","year":"2012","unstructured":"Margrit Schreier. 2012. Qualitative Content Analysis in Practice. SAGE, London, UK."},{"key":"e_1_3_2_103_2","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1109\/EDUCON.2014.6826125","volume-title":"Proceedings of the 2014 IEEE Global Engineering Education Conference (EDUCON\u201914).","author":"Sedelmaier Yvonne","year":"2014","unstructured":"Yvonne Sedelmaier and Dieter Landes. 2014. Software engineering body of skills (SWEBOS). In Proceedings of the 2014 IEEE Global Engineering Education Conference (EDUCON\u201914).IEEE, Los Alamitos, CA, 395\u2013401. 10.1109\/EDUCON.2014.6826125"},{"key":"e_1_3_2_104_2","first-page":"193","volume-title":"Proceedings of the Annual ADFSL Conference on Digital Forensics, Security, and Law.","author":"Shumba Rose","year":"2015","unstructured":"Rose Shumba. 2015. Towards a digital forensics competency-based program: Making assessment count. In Proceedings of the Annual ADFSL Conference on Digital Forensics, Security, and Law.193\u2013204."},{"key":"e_1_3_2_105_2","doi-asserted-by":"publisher","DOI":"10.1108\/00483481011030520"},{"key":"e_1_3_2_106_2","first-page":"10.1\u201310.33","volume-title":"Cochrane Handbook for Systematic Reviews of Interventions Version 5.1.0","author":"Sterne Jonathan","year":"2008","unstructured":"Jonathan Sterne, Matthias Egger, and David Moher. 2008. Addressing reporting biases. In Cochrane Handbook for Systematic Reviews of Interventions Version 5.1.0, Julian Higgins and Sally Green (Eds.). Cochrane, 10.1\u201310.33."},{"key":"e_1_3_2_107_2","doi-asserted-by":"publisher","DOI":"10.1177\/1534484312456690"},{"key":"e_1_3_2_108_2","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1145\/3328778.3366816","volume-title":"Proceedings of the 51st ACM Technical Symposium on Computer Science Education.","author":"\u0160v\u00e1bensk\u00fd Valdemar","year":"2020","unstructured":"Valdemar \u0160v\u00e1bensk\u00fd, Jan Vykopal, and Pavel \u010celeda. 2020. What are cybersecurity education papers about? In Proceedings of the 51st ACM Technical Symposium on Computer Science Education.ACM, New York, NY, 2\u20138. 10.1145\/3328778.3366816"},{"key":"e_1_3_2_109_2","unstructured":"U. S. Department of Labor. 2017. Renewable Energy Competency Model. Retrieved September 02 2022 from https:\/\/www.careeronestop.org\/CompetencyModel\/competency-models\/renewable-energy.aspx."},{"key":"e_1_3_2_110_2","doi-asserted-by":"publisher","DOI":"10.1504\/IJHRDM.2003. 002415"},{"issue":"1","key":"e_1_3_2_111_2","first-page":"67","article-title":"Competences and vocational higher education: Now and in future","volume":"40","author":"Klink Marcel van der","year":"2007","unstructured":"Marcel van der Klink, Jo Boon, and Kathleen Schlusmans. 2007. Competences and vocational higher education: Now and in future. European Journal of Vocational Training 40, 1 (2007), 67\u201382.","journal-title":"European Journal of Vocational Training"},{"key":"e_1_3_2_112_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10566-010-9116-4"},{"key":"e_1_3_2_113_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.04.004"},{"key":"e_1_3_2_114_2","doi-asserted-by":"publisher","DOI":"10.1080\/00220272.2012.668938"},{"key":"e_1_3_2_115_2","volume-title":"Defintion and Selection of Competencies: Concepts of Competence","author":"Weinert Franz E.","year":"1999","unstructured":"Franz E. Weinert. 1999. Defintion and Selection of Competencies: Concepts of Competence. OECD, Paris, Frankreich."},{"key":"e_1_3_2_116_2","first-page":"45","volume-title":"Defining and Selecting Key Competencies","author":"Weinert Franz E.","year":"2001","unstructured":"Franz E. Weinert. 2001. Concept of competence: A conceptual clarification. In Defining and Selecting Key Competencies, Dominique S. Rychen and Laura H. Salganik (Eds.). Hogrefe & Huber, Seattle, WA, 45\u201365."},{"key":"e_1_3_2_117_2","first-page":"17","volume-title":"Leistungsmessung in Schulen","author":"Weinert Franz E.","year":"2001","unstructured":"Franz E. Weinert. 2001. Vergleichende leistungsmessung in schulen\u2014Eine umstrittene Selbstverst\u00e4ndlichkeit. In Leistungsmessung in Schulen, Franz E. Weinert (Ed.). Beltz, Weinheim, Germany, 17\u201332."},{"key":"e_1_3_2_118_2","doi-asserted-by":"publisher","DOI":"10.1002\/j.2334-5837.2016.00266.x"},{"issue":"1","key":"e_1_3_2_119_2","first-page":"1","article-title":"Industry priorities for cybersecurity competencies","volume":"6","author":"Whitman Michael E.","year":"2018","unstructured":"Michael E. Whitman. 2018. Industry priorities for cybersecurity competencies. Journal of the Colloquium for Information System Security Education 6, 1 (2018), 1\u201321.","journal-title":"Journal of the Colloquium for Information System Security Education"},{"key":"e_1_3_2_120_2","volume-title":"Principles of Information Security (3rd ed.)","author":"Whitman Michael E.","year":"2009","unstructured":"Michael E. Whitman and Herbert J. Mattord. 2009. Principles of Information Security (3rd ed.). Course Technology, Boston, MA."},{"key":"e_1_3_2_121_2","volume-title":"Typology of Knowledge, Skills and Competences: Clarification of the Concept and Prototype","author":"Winterton Jonathan","year":"2006","unstructured":"Jonathan Winterton, Fran\u00e7oise Delamare-Le Deist, and Emma Stringfellow. 2006. Typology of Knowledge, Skills and Competences: Clarification of the Concept and Prototype. Office for Official Publications of the European Communities, Luxembourg."},{"key":"e_1_3_2_122_2","volume-title":"The Future of Jobs Report 2018","author":"Forum World Economic","year":"2018","unstructured":"World Economic Forum. 2018. The Future of Jobs Report 2018. World Economic Forum, Geneva, Switzerland. https:\/\/www.weforum.org\/reports\/the-future-of-jobs-report-2018."},{"key":"e_1_3_2_123_2","doi-asserted-by":"publisher","DOI":"10.1177\/0739456X17723971"},{"key":"e_1_3_2_124_2","first-page":"1","volume-title":"Proceedings of the 14th International Conference on Availability, Reliability, and Security (ARES\u201919).","author":"Yamin Muhammad M.","year":"2019","unstructured":"Muhammad M. Yamin and Basel Katt. 2019. Cyber security skill set analysis for common curricula development. In Proceedings of the 14th International Conference on Availability, Reliability, and Security (ARES\u201919).ACM, New York, NY, 1\u20138. 10.1145\/3339252.3340527"},{"key":"e_1_3_2_125_2","doi-asserted-by":"publisher","DOI":"10.1080\/08832323.2020.1757594"},{"key":"e_1_3_3_2_2","volume-title":"Software Engineering Competency Model: SWECOM: A Project of the IEEE Computer Society","author":"Ardis Mark","year":"2014","unstructured":"Mark Ardis, Dick Fairley, Thomas Hilburn, Ken Nidiffer, Massood Towhidnejad, Mary J. Willshire, and Kate Guillemette. 2014. Software Engineering Competency Model: SWECOM: A Project of the IEEE Computer Society. IEEE, Los Alamitos, CA. https:\/\/www.computer.org\/volunteering\/boards-and-committees\/professional-educational-activities\/software-engineering-competency-model. Accessed April 4, 2023."},{"key":"e_1_3_3_3_2","unstructured":"AXELOS. 2016. Skills Framework. Retrieved May 5 2020 from https:\/\/de.scribd.com\/document\/538786458\/axelos-skills-framework-light. Accessed April 4 2023."},{"key":"e_1_3_3_4_2","unstructured":"Chief Human Capital Officers Council. 2011. Competency Model for Cybersecurity. Retrieved April 22 2020 from https:\/\/www.chcoc.gov\/content\/competency-model-cybersecurity."},{"key":"e_1_3_3_5_2","unstructured":"CIO Council. 2012. 2012 Clinger-Cohen Core Competencies & Learning Objectives. Retrieved April 19 2020 from https:\/\/s3.amazonaws.com\/sitesusa\/wp-content\/uploads\/sites\/1151\/2016\/10\/2012-Learning-Objectives-Final.pdf."},{"key":"e_1_3_3_6_2","unstructured":"Club Informatique des Grandes Entreprises Francaises. 2011. Information Systems Roles in Large Companies: HR Nomenclature\u20142011. Retrieved March 24 2020 from https:\/\/www.cigref.fr\/cigref_publications\/RapportsContainer\/Parus2011\/2011_IS_roles_in_large_companies_HR_nomenclature_CIGREF_EN.pdf."},{"key":"e_1_3_3_7_2","unstructured":"Department of Labor and Industry. 2014. Competency Model for Information Technology Occupation: Security Analyst. Retrieved April 2 2020 from https:\/\/dli.mn.gov\/sites\/default\/files\/pdf\/it-sec-analyst.pdf. Accessed April 4 2023."},{"key":"e_1_3_3_8_2","unstructured":"European Committee for Standardization. 2014. Case Studies for the Application of the e-CF 3.0: A Common European Framework for ICT Professionals in All Industry Sectors. Retrieved March 25 2020 from https:\/\/www.myecole.it\/biblio\/wp-content\/uploads\/2020\/11\/Case_studies_e-CF_3.0_CEN_CWA_16234-4_2014.pdf. Accessed April 4 2023."},{"key":"e_1_3_3_9_2","unstructured":"European Committee for Standardization. 2014. European e-Competence Framework 3.0: A Common European Framework for ICT Professionals in All Industry Sectors. Retrieved March 25 2020 from https:\/\/www.aicanet.it\/documents\/10776\/141330\/European-e-Competence-Framework-3.0_CEN_CWA_16234-1_2014.pdf\/408848f2-a045-4c88-999f-1d7280d12ee8. Accessed April 4 2023."},{"key":"e_1_3_3_10_2","unstructured":"European Committee for Standardization. 2014. User Guide for the Application of the European e-Competence Framework 3.0: A Common European Framework for ICT Professionals in All Industry Sectors. Retrieved March 25 2020 from https:\/\/www.myecole.it\/biblio\/wp-content\/uploads\/2020\/11\/User-guide-for-the-application-of-the-e-CF-3.0_CEN_CWA_16234-2_2014.pdf. Accessed April 4 2023."},{"key":"e_1_3_3_11_2","volume-title":"Information Technology Competency Model of Core Learning Outcomes and Assessment for Associate-Degree Curriculum: Technical Report","author":"Hawthorne Elizabeth K.","year":"2014","unstructured":"Elizabeth K. Hawthorne, Robert D. Campbell, Cara Tang, Cindy S. Tucker, and Jim Nichols. 2014. Information Technology Competency Model of Core Learning Outcomes and Assessment for Associate-Degree Curriculum: Technical Report. ACM, New York, NY. http:\/\/ccecc.acm.org\/files\/publications\/ACMITCompetencyModel14October201420150114T180322.pdf."},{"key":"e_1_3_3_12_2","doi-asserted-by":"crossref","unstructured":"Thomas Hilburn Mark Ardis Glenn Johnson Andrew J. Kornecki and Nancy R. Mead. 2013. Software Assurance Competency Model. Retrieved May 5 2020 from https:\/\/resources.sei.cmu.edu\/asset_files\/TechnicalNote\/2013_004_001_47965.pdf.","DOI":"10.21236\/ADA610368"},{"key":"e_1_3_3_13_2","unstructured":"Hong Kong Monetary Authority. 2019. Update on Enhanced Competency Framework on Cybersecurity. Retrieved May 10 2020 from https:\/\/www.hkma.gov.hk\/media\/eng\/doc\/key-information\/guidelines-and-circular\/2019\/20190110e1.pdf."},{"key":"e_1_3_3_14_2","unstructured":"Information-Technology Promotion Agency. 2016. IT Human Resources Development: i Competency Dictionary (iCD). Retrieved May 2 2020 from https:\/\/www.ipa.go.jp\/english\/humandev\/icd.html."},{"key":"e_1_3_3_15_2","unstructured":"Institute of Information Security Professionals. 2018. IISP Skills Framework. Retrieved March 31 2020 from https:\/\/www.ciisec.org\/."},{"key":"e_1_3_3_16_2","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1145\/2801948.2801960","volume-title":"Proceedings of the 19th Panhellenic Conference on Informatics.","author":"Moustroufas Evangelos","year":"2015","unstructured":"Evangelos Moustroufas, Ioannis Stamelos, and Lefteris Angelis. 2015. Competency profiling for software engineers: Literature Review and a New Model. In Proceedings of the 19th Panhellenic Conference on Informatics.ACM, New York, NY, 235\u2013240. 10.1145\/2801948.2801960"},{"key":"e_1_3_3_17_2","doi-asserted-by":"crossref","unstructured":"William Newhouse Stephanie Keith Benjamin Scribner and Greg Witte. 2017. National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework. Retrieved April 6 2020 from https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-181.pdf.","DOI":"10.6028\/NIST.SP.800-181"},{"key":"e_1_3_3_18_2","unstructured":"Personal Data Protection Commission. 2020. DPO Competency Framework and Training Roadmap. Retrieved April 30 2020 from https:\/\/www.pdpc.gov.sg\/dp-competency#competencies."},{"key":"e_1_3_3_19_2","first-page":"46","volume-title":"Proceedings der 13 Internationalen Tagung Wirtschaftsinformatik (WI\u201917)","author":"Prifti Loina","year":"2017","unstructured":"Loina Prifti, Marlene Knigge, Harald Kienegger, and Helmut Krcmar. 2017. A competency model for \u201cIndustrie 4.0\u201d employees. In Proceedings der 13 Internationalen Tagung Wirtschaftsinformatik (WI\u201917). 46\u201360."},{"key":"e_1_3_3_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173161"},{"key":"e_1_3_3_21_2","doi-asserted-by":"publisher","DOI":"10.17485\/ijst\/2015\/v8i21\/79119"},{"key":"e_1_3_3_22_2","unstructured":"SFIA Foundation. 2018. Skills Framework for the Information Age: SFIA 7: The Complete Reference. Retrieved April 3 2020 from https:\/\/www.sfia-online.org\/en\/framework\/sfia-7\/documentation\/sfia-7-the-complete-reference."},{"key":"e_1_3_3_23_2","volume-title":"Skills Framework for Infocomm Technology","year":"2019","unstructured":"SkillsFuture. 2019. Skills Framework for Infocomm Technology. Retrieved May 13, 2020 from https:\/\/www.skillsfuture.gov.sg\/skills-framework\/ict. Accessed April 4, 2023."},{"key":"e_1_3_3_24_2","first-page":"MSIS-i\u2013MSIS-107","article-title":"MSIS 2016: Global competency model for graduate degree programs in information systems","volume":"40","author":"Topi Heikki","year":"2017","unstructured":"Heikki Topi, Helena Karsten, Sue Brown, Jo\u00e3o A. Carvalho, Brian Donnellan, Jun Shen, Bernard C. Y. Tan, and Mark F. Thouin. 2017. MSIS 2016: Global competency model for graduate degree programs in information systems. Communications of the Association for Information Systems 40 (2017), MSIS-i\u2013MSIS-107.","journal-title":"Communications of the Association for Information Systems"},{"key":"e_1_3_3_25_2","unstructured":"Janet Tweedie and Julie West. 2010. Cyber Security Capability Framework & Mapping of ISM Roles: Final Report. Retrieved April 23 2020 from https:\/\/www.yumpu.com\/en\/document\/read\/43006585\/cyber-security-capability-framework-mapping-of-ism-roles-agimo."},{"key":"e_1_3_3_26_2","unstructured":"U.S. Department of Energy. 2013. Essential Body of Knowledge (EBK): A Competency and Functional Framework for Cyber Security Workforce Development. Retrieved May 2 2020 from https:\/\/www.energy.gov\/sites\/prod\/files\/2014\/04\/f15\/DOEEBK_1-2013Revision_NICEv01_SCRM_clean_v04.pdf."},{"key":"#cr-split#-e_1_3_3_27_2.1","unstructured":"U.S. Department of Homeland Security. 2008. Information Technology"},{"key":"#cr-split#-e_1_3_3_27_2.2","unstructured":"(IT) Security Essential Body of Knowledge (EBK): A Competency and Functional Framework for IT Security Workforce Development. Retrieved April 10 2020 from https:\/\/www.hsdl.org\/?view&did=234220."},{"key":"e_1_3_3_28_2","unstructured":"U.S. Department of Homeland Security. 2012. Software Assurance Professional Competency Model. Retrieved April 1 2020 from https:\/\/docplayer.net\/22397688-Software-assurance-professional-competency-model.html."},{"key":"e_1_3_3_29_2","unstructured":"U.S. Department of Labor. 2012. Information Technology Competency Model. Retrieved March 24 2020 from https:\/\/www.careeronestop.org\/competencymodel\/competency-models\/pyramid-download.aspx?industry=information-technology."},{"key":"e_1_3_3_30_2","unstructured":"U.S. Department of Labor. 2019. Cybersecurity Competency Model. Retrieved April 24 2020 from https:\/\/www.careeronestop.org\/CompetencyModel\/competency-models\/pyramid-download.aspx?industry=cybersecurity."},{"key":"e_1_3_4_2_2","volume-title":"Masterstudium: IT-Security","author":"Wien FH Campus","year":"2020","unstructured":"FH Campus Wien. 2020. Masterstudium: IT-Security. FH Campus Wien. https:\/\/www.fh-campuswien.ac.at\/studium-weiterbildung\/studien-und-lehrgangsangebot\/detail\/it-security-master.html."},{"key":"e_1_3_4_3_2","volume-title":"IT & Mobile Security: Master","author":"Joanneum FH","year":"2020","unstructured":"FH Joanneum. 2020. IT & Mobile Security: Master. FH Joanneum. https:\/\/www.fh-joanneum.at\/it-und-mobile-security\/master\/."},{"key":"e_1_3_4_4_2","volume-title":"Information Security Management: Masterstudiengang","author":"Ober\u00f6sterreich FH","year":"2020","unstructured":"FH Ober\u00f6sterreich. 2020. Information Security Management: Masterstudiengang. FH Ober\u00f6sterreich. https:\/\/www.fh-ooe.at\/campus-hagenberg\/studiengaenge\/master\/information-security-management\/."},{"key":"e_1_3_4_5_2","volume-title":"Sichere Informationssysteme: Bachelorstudium","author":"Ober\u00f6sterreich FH","year":"2020","unstructured":"FH Ober\u00f6sterreich. 2020. Sichere Informationssysteme: Bachelorstudium. FH Ober\u00f6sterreich. https:\/\/www.fh-ooe.at\/campus-hagenberg\/studiengaenge\/bachelor\/sichere-informationssysteme\/."},{"key":"e_1_3_4_6_2","volume-title":"Sichere Informationssysteme: Masterstudium","author":"Ober\u00f6sterreich FH","year":"2020","unstructured":"FH Ober\u00f6sterreich. 2020. Sichere Informationssysteme: Masterstudium. FH Ober\u00f6sterreich. https:\/\/www.fh-ooe.at\/campus-hagenberg\/studiengaenge\/master\/sichere-informationssysteme\/."},{"key":"e_1_3_4_7_2","volume-title":"Cyber Security and Resilience: Master Studiengang","author":"P\u00f6lten FH St.","year":"2020","unstructured":"FH St. P\u00f6lten. 2020. Cyber Security and Resilience: Master Studiengang. FH St. P\u00f6lten. https:\/\/www.fhstp.ac.at\/de\/studium-weiterbildung\/informatik-security\/cyber-security-and-resilience."},{"key":"e_1_3_4_8_2","volume-title":"Information Security: Master Studiengang","author":"P\u00f6lten FH St.","year":"2020","unstructured":"FH St. P\u00f6lten. 2020. Information Security: Master Studiengang. FH St. P\u00f6lten. https:\/\/www.fhstp.ac.at\/de\/studium-weiterbildung\/informatik-security\/information-security."},{"key":"e_1_3_4_9_2","volume-title":"IT-Security: Bachelor Studiengang","author":"P\u00f6lten FH St.","year":"2020","unstructured":"FH St. P\u00f6lten. 2020. IT-Security: Bachelor Studiengang. FH St. P\u00f6lten. https:\/\/www.fhstp.ac.at\/de\/studium-weiterbildung\/informatik-security\/it-security?gclid=EAIaIQobChMIoIzc5be-7AIVh7LVCh3d2woPEAAYAyAAEgJyIvD_BwE."},{"key":"e_1_3_4_10_2","volume-title":"Masterstudiengang: IT-Security","author":"Wien FH Technikum","year":"2020","unstructured":"FH Technikum Wien. 2020. Masterstudiengang: IT-Security. FH Technikum Wien. https:\/\/www.technikum-wien.at\/studium\/master\/it-security\/."},{"key":"e_1_3_4_11_2","volume-title":"Master: Artificial Intelligence and Cyber Security","author":"Klagenfurt Universit\u00e4t","year":"2020","unstructured":"Universit\u00e4t Klagenfurt. 2020. Master: Artificial Intelligence and Cyber Security. Universit\u00e4t Klagenfurt. https:\/\/www.aau.at\/studien\/master-artificial-intelligence-and-cybersecurity\/."}],"container-title":["ACM Transactions on Computing Education"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3573205","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3573205","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:37:25Z","timestamp":1750178245000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3573205"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,8]]},"references-count":164,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,6,30]]}},"alternative-id":["10.1145\/3573205"],"URL":"https:\/\/doi.org\/10.1145\/3573205","relation":{},"ISSN":["1946-6226","1946-6226"],"issn-type":[{"value":"1946-6226","type":"print"},{"value":"1946-6226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,8]]},"assertion":[{"value":"2021-05-27","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-11-18","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-06-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}