Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (10)

Search Parameters:
Keywords = cybersecurity skill gaps

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
26 pages, 736 KB  
Review
Review of Advances in Renewable Energy-Based Microgrid Systems: Control Strategies, Emerging Trends, and Future Possibilities
by Kayode Ebenezer Ojo, Akshay Kumar Saha and Viranjay Mohan Srivastava
Energies 2025, 18(14), 3704; https://doi.org/10.3390/en18143704 - 14 Jul 2025
Cited by 1 | Viewed by 2124
Abstract
This paper gives a thorough overview of the technological advancements in microgrid systems, focusing on the Internet of Things (IoT), predictive analytics, real-time monitoring, architectures, control strategies, benefits, and drawbacks. It highlights their importance in boosting system security, guaranteeing real-time control, and increasing [...] Read more.
This paper gives a thorough overview of the technological advancements in microgrid systems, focusing on the Internet of Things (IoT), predictive analytics, real-time monitoring, architectures, control strategies, benefits, and drawbacks. It highlights their importance in boosting system security, guaranteeing real-time control, and increasing energy efficiency. Accordingly, researchers have embraced the involvement of many control capacities through voltage and frequency stability, optimal power sharing, and system optimization in response to the progressively complex and expanding power systems in recent years. Advanced control techniques have garnered significant interest among these management strategies because of their high accuracy and efficiency, flexibility and adaptability, scalability, and real-time predictive skills to manage non-linear systems. This study provides insight into various facets of microgrids (MGs), literature review, and research gaps, particularly concerning their control layers. Additionally, the study discusses new developments like Supervisory Control and Data Acquisition (SCADA), blockchain-based cybersecurity, smart monitoring systems, and AI-driven control for MGs optimization. The study concludes with recommendations for future research, emphasizing the necessity of stronger control systems, cutting-edge storage systems, and improved cybersecurity to guarantee that MGs continue to be essential to the shift to a decentralized, low-carbon energy future. Full article
(This article belongs to the Section A1: Smart Grids and Microgrids)
Show Figures

Figure 1

16 pages, 260 KB  
Article
Mapping Cybersecurity in SMEs: The Role of Ownership and Firm Characteristics in the Silesian Region of Poland
by Leoš Šafár, Marek Pekarčik, Patryk Morawiec, Paulina Rutecka and Monika Wieczorek-Kosmala
Information 2025, 16(7), 590; https://doi.org/10.3390/info16070590 - 8 Jul 2025
Viewed by 839
Abstract
As we move toward a more digitalized and interconnected world, new cybersecurity challenges emerge. While most related research has focused on large companies, this study aims to fill a gap in the literature by exploring cybersecurity issues in small and medium-sized enterprises (SMEs), [...] Read more.
As we move toward a more digitalized and interconnected world, new cybersecurity challenges emerge. While most related research has focused on large companies, this study aims to fill a gap in the literature by exploring cybersecurity issues in small and medium-sized enterprises (SMEs), particularly in relation to nontechnical, soft-skill, and intellectual capital aspects. This study examines the interplay between cybersecurity awareness and perception and ownership structure in SMEs in the Silesian region of Poland. Unlike the majority of cybersecurity literature, our focus is on how ownership structure influences cybersecurity perception. We surveyed 200 SMEs at random within the respective region and utilized hierarchical and simple linear regression analyses to assess the relationships between these factors and financial performance. Our results indicate that larger enterprises and those without a family-owned structure exhibit significantly greater levels of cybersecurity. Additionally, we found a positive correlation between cybersecurity and a firm’s financial performance and overall health. These findings underscore the importance of cybersecurity awareness and practices for the growth and stability of SMEs. Full article
(This article belongs to the Special Issue Information Sharing and Knowledge Management)
28 pages, 2981 KB  
Article
From Security Frameworks to Sustainable Municipal Cybersecurity Capabilities
by Arnstein Vestad and Bian Yang
J. Cybersecur. Priv. 2025, 5(2), 19; https://doi.org/10.3390/jcp5020019 - 28 Apr 2025
Cited by 1 | Viewed by 1757
Abstract
While security frameworks like the NIST CSF and ISO 27001 provide organizations with standardized best practices for cybersecurity, these practices must be implemented in organizations by people with the necessary skills and knowledge and be supported by effective technological solutions. This article explores [...] Read more.
While security frameworks like the NIST CSF and ISO 27001 provide organizations with standardized best practices for cybersecurity, these practices must be implemented in organizations by people with the necessary skills and knowledge and be supported by effective technological solutions. This article explores the challenges and opportunities of building sustainable cybersecurity capabilities in resource-constrained organizations, specifically Norwegian municipalities. The research introduces the concept of sustainable cybersecurity capabilities, emphasizing the importance of a socio-technical approach that integrates technology, people, and organizational structure. A mixed-methods study was employed, combining document analysis of relevant cybersecurity frameworks with a modified Delphi study and semi-structured interviews with municipal cybersecurity practitioners. Findings highlight six core cybersecurity capabilities within municipalities, along with key challenges in implementing and sustaining these capabilities. These challenges include ambiguities in role formalization, skills gaps, difficulties in deploying advanced security technologies, and communication barriers between central IT and functional areas. Furthermore, the potential of artificial intelligence and cooperative strategies to enhance municipal cybersecurity is considered. Ultimately, the study highlights the need for a holistic perspective in developing sustainable cybersecurity capabilities, offering implications for both research and practice within municipalities and local government. Full article
Show Figures

Figure 1

17 pages, 2794 KB  
Article
Security Operations Centers: Use Case Best Practices, Coverage, and Gap Analysis Based on MITRE Adversarial Tactics, Techniques, and Common Knowledge
by Samir Achraf Chamkar, Yassine Maleh and Noreddine Gherabi
J. Cybersecur. Priv. 2024, 4(4), 777-793; https://doi.org/10.3390/jcp4040036 - 25 Sep 2024
Cited by 2 | Viewed by 8403
Abstract
The rising frequency and complexity of cybersecurity threats necessitate robust monitoring and rapid response capabilities to safeguard digital assets effectively. As a result, many organizations are increasingly establishing Security Operations Centers (SOCs) to actively detect and respond to cybersecurity incidents. This paper addresses [...] Read more.
The rising frequency and complexity of cybersecurity threats necessitate robust monitoring and rapid response capabilities to safeguard digital assets effectively. As a result, many organizations are increasingly establishing Security Operations Centers (SOCs) to actively detect and respond to cybersecurity incidents. This paper addresses the intricate process of setting up a SOC, emphasizing the need for careful planning, substantial resources, and a strategic approach. This study outlines the essential steps involved in defining the SOC’s objectives and scope, selecting appropriate technologies, recruiting skilled cybersecurity professionals, and developing processes throughout the SOC lifecycle. This paper aims to provide a comprehensive understanding of the SOC’s threat detection capabilities and use cases. It also highlights the importance of choosing technologies that integrate seamlessly with existing IT infrastructure to ensure broad coverage of SOC activities. Furthermore, this study offers actionable insights for organizations looking to enhance their SOC capabilities, including a technical overview of SOC use case coverage and a gap assessment of detection rules. This assessment is based on an alignment with the MITRE ATT&CK framework and an analysis of events generated by the company’s existing IT devices and products. The findings from this research elucidate the indispensable role that SOCs play in bolstering organizational cybersecurity and resilience. Full article
(This article belongs to the Special Issue Cybersecurity Risk Prediction, Assessment and Management)
Show Figures

Figure 1

16 pages, 1941 KB  
Systematic Review
Exploring the Architectural Composition of Cyber Ranges: A Systematic Review
by Dionysios Stamatopoulos, Menelaos Katsantonis, Panagiotis Fouliras and Ioannis Mavridis
Future Internet 2024, 16(7), 231; https://doi.org/10.3390/fi16070231 - 28 Jun 2024
Cited by 3 | Viewed by 2536
Abstract
In light of the ever-increasing complexity of cyber–physical systems (CPSs) and information technology networking systems (ITNs), cyber ranges (CRs) have emerged as a promising solution by providing theoretical and practical cybersecurity knowledge for participants’ skill improvement toward a safe work environment. This research [...] Read more.
In light of the ever-increasing complexity of cyber–physical systems (CPSs) and information technology networking systems (ITNs), cyber ranges (CRs) have emerged as a promising solution by providing theoretical and practical cybersecurity knowledge for participants’ skill improvement toward a safe work environment. This research adds to the extant respective literature, exploring the architectural composition of CRs. It aims to improve the understanding of their design and how they are deployed, expanding skill levels in constructing better CRs. Our research follows the PRISMA methodology guidelines for transparency, which includes a search flow of articles based on specific criteria and quality valuation of selected articles. To extract valuable research datasets, we identify keyword co-occurrences that selected articles are concentrated on. In the context of literature evidence, we identify key attributes and trends, providing details of CRs concerning their architectural composition and underlying infrastructure, along with today’s challenges and future research directions. A total of 102 research articles’ qualitative analyses reveal a lack of adequate architecture examination when CR elements and services interoperate with other CR elements and services participating, leading to gaps that increase the administration burden. We posit that the results of this study can be leveraged as a baseline for future enhancements toward the development of CRs. Full article
Show Figures

Figure 1

24 pages, 3449 KB  
Article
Enhancing Smart Grid Resilience: An Educational Approach to Smart Grid Cybersecurity Skill Gap Mitigation
by Rūta Pirta-Dreimane, Andrejs Romanovs, Jana Bikovska, Jānis Pekša, Tero Vartiainen, Maria Valliou, Jirapa Kamsamrong and Bahaa Eltahawy
Energies 2024, 17(8), 1876; https://doi.org/10.3390/en17081876 - 15 Apr 2024
Cited by 7 | Viewed by 2591
Abstract
Cybersecurity competencies are critical in the smart grid ecosystem, considering its growing complexity and expanding utilization. The smart grid environment integrates different sensors, control systems, and communication networks, thus augmenting the potential attack vectors for cyber criminals. Therefore, interdisciplinary competencies are required from [...] Read more.
Cybersecurity competencies are critical in the smart grid ecosystem, considering its growing complexity and expanding utilization. The smart grid environment integrates different sensors, control systems, and communication networks, thus augmenting the potential attack vectors for cyber criminals. Therefore, interdisciplinary competencies are required from smart grid cybersecurity specialists. In the meantime, there is a lack of competence models that define the required skills, considering smart grid job profiles and the technological landscape. This paper aims to investigate the skill gaps and trends in smart grid cybersecurity and propose an educational approach to mitigate these gaps. The educational approach aims to provide guidance for competence-driven cybersecurity education programs for the design, execution, and evaluation of smart grids. Full article
(This article belongs to the Special Issue Cyber Security in Microgrids and Smart Grids)
Show Figures

Figure 1

23 pages, 1045 KB  
Review
Strategic Approaches to Cybersecurity Learning: A Study of Educational Models and Outcomes
by Madhav Mukherjee, Ngoc Thuy Le, Yang-Wai Chow and Willy Susilo
Information 2024, 15(2), 117; https://doi.org/10.3390/info15020117 - 18 Feb 2024
Cited by 22 | Viewed by 10562
Abstract
As the demand for cybersecurity experts in the industry grows, we face a widening shortage of skilled professionals. This pressing concern has spurred extensive research within academia and national bodies, who are striving to bridge this skills gap through refined educational frameworks, including [...] Read more.
As the demand for cybersecurity experts in the industry grows, we face a widening shortage of skilled professionals. This pressing concern has spurred extensive research within academia and national bodies, who are striving to bridge this skills gap through refined educational frameworks, including the integration of innovative information applications like remote laboratories and virtual classrooms. Despite these initiatives, current higher education models for cybersecurity, while effective in some areas, fail to provide a holistic solution to the root causes of the skills gap. Our study conducts a thorough examination of established cybersecurity educational frameworks, with the goal of identifying crucial learning outcomes that can mitigate the factors contributing to this skills gap. Furthermore, by analyzing six different educational models, for each one that can uniquely leverage technology like virtual classrooms and online platforms and is suited to various learning contexts, we categorize these contexts into four distinct categories. This categorization introduces a holistic dimension of context awareness enriched by digital learning tools into the process, enhancing the alignment with desired learning outcomes, a consideration sparsely addressed in the existing literature. This thorough analysis further strengthens the framework for guiding education providers in selecting models that most effectively align with their targeted learning outcomes and implies practical uses for technologically enhanced environments. This review presents a roadmap for educators and institutions, offering insights into relevant teaching models, including the opportunities for the utilization of remote laboratories and virtual classrooms, and their contextual applications, thereby aiding curriculum designers in making strategic decisions. Full article
Show Figures

Figure 1

18 pages, 1173 KB  
Article
Analysis of the Barriers to Smart City Development Using DEMATEL
by Anas A. Makki and Ammar Y. Alqahtani
Urban Sci. 2024, 8(1), 10; https://doi.org/10.3390/urbansci8010010 - 1 Feb 2024
Cited by 10 | Viewed by 3756
Abstract
This study analyzes the barriers to developing smart cities (SCs) using the decision-making trial and evaluation laboratory (DEMATEL) approach. The primary objective is to identify, classify, and assess the main barriers hindering the progress of SCs. Through an extensive literature review, twelve main [...] Read more.
This study analyzes the barriers to developing smart cities (SCs) using the decision-making trial and evaluation laboratory (DEMATEL) approach. The primary objective is to identify, classify, and assess the main barriers hindering the progress of SCs. Through an extensive literature review, twelve main barriers were identified. The DEMATEL approach models and analyzes the relationships among these barriers based on expert input. The results reveal that technical problems, a lack of infrastructure, and high costs are classified as cause barriers. Security and privacy concerns and the absence of coordinated planning are classified as effect barriers. This study emphasizes the need for established criteria and iterative development requirements. Although the influence of knowledge and skills gaps and a lack of awareness is less significant, these aspects still require attention. The findings suggest that a comprehensive approach focusing on technical solutions, infrastructure development, strategic planning, and cybersecurity measures can effectively overcome barriers. Regular evaluation of barrier dynamics is crucial for implementing adaptive measures. The results provide decision-makers with a valuable model to address the challenges and foster the efforts of SC stakeholders. Full article
(This article belongs to the Special Issue Smart City and Well-Being)
Show Figures

Figure 1

18 pages, 2440 KB  
Article
Exploring IoT Vulnerabilities in a Comprehensive Remote Cybersecurity Laboratory
by Ismael Delgado, Elio Sancristobal, Sergio Martin and Antonio Robles-Gómez
Sensors 2023, 23(22), 9279; https://doi.org/10.3390/s23229279 - 20 Nov 2023
Cited by 1 | Viewed by 2907
Abstract
With the rapid proliferation of Internet of things (IoT) devices across various sectors, ensuring robust cybersecurity practices has become paramount. The complexity and diversity of IoT ecosystems pose unique security challenges that traditional educational approaches often fail to address comprehensively. Current curricula may [...] Read more.
With the rapid proliferation of Internet of things (IoT) devices across various sectors, ensuring robust cybersecurity practices has become paramount. The complexity and diversity of IoT ecosystems pose unique security challenges that traditional educational approaches often fail to address comprehensively. Current curricula may provide theoretical knowledge but typically lack the practical components necessary for students to engage with real-world cybersecurity scenarios. This gap hinders the development of proficient cybersecurity professionals capable of securing complex IoT infrastructures. To bridge this educational divide, a remote online laboratory was developed, allowing students to gain hands-on experience in identifying and mitigating cybersecurity threats in an IoT context. This virtual environment simulates real IoT ecosystems, enabling students to interact with actual devices and protocols while practicing various security techniques. The laboratory is designed to be accessible, scalable, and versatile, offering a range of modules from basic protocol analysis to advanced threat management. The implementation of this remote laboratory demonstrated significant benefits, equipping students with the necessary skills to confront and resolve IoT security issues effectively. Our results show an improvement in practical cybersecurity abilities among students, highlighting the laboratory’s efficacy in enhancing IoT security education. Full article
(This article belongs to the Special Issue Industrial Internet of Things (IIoT) Platforms and Applications)
Show Figures

Figure 1

23 pages, 2022 KB  
Review
Education 4.0 in Developing Economies: A Systematic Literature Review of Implementation Barriers and Future Research Agenda
by Emily Costan, Gamaliel Gonzales, Roselyn Gonzales, Lynne Enriquez, Felix Costan, Decem Suladay, Nadine May Atibing, Joerabell Lourdes Aro, Samantha Shane Evangelista, Fatima Maturan, Egberto Selerio and Lanndon Ocampo
Sustainability 2021, 13(22), 12763; https://doi.org/10.3390/su132212763 - 18 Nov 2021
Cited by 59 | Viewed by 10482
Abstract
Education 4.0 (EDUC4) was driven by the onset of the Fourth Industrial Revolution (4IR) to meet labor market requirements resulting from learning that is customized, flexible, accessible, and skills-based. As the concept of EDUC4 develops popularity in the education and innovation research domains, [...] Read more.
Education 4.0 (EDUC4) was driven by the onset of the Fourth Industrial Revolution (4IR) to meet labor market requirements resulting from learning that is customized, flexible, accessible, and skills-based. As the concept of EDUC4 develops popularity in the education and innovation research domains, various challenges about its implementation have emerged, especially in developing economies. Thus, there is a need to investigate the existing barriers to EDUC4 implementation. Using the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) statement, a systematic literature review of journal articles in the Scopus database was conducted. Of the 299 journal articles generated from the initial search on Scopus, 30 met the inclusion criteria and were included in the review. The content analysis yielded 12 barriers which include cybersecurity threat, costly, skills gap of human capital, apprehensive stakeholders, lack of training resources, lack of collaboration, knowledge gap for the customization of curriculum design, insufficient available technologies, health issues, time constraint for material preparation, complexity of learning platforms, and insufficient foundation of basic education. They were then associated with seven themes for better operationalization in Higher Education Institutions (HEIs): (1) human resources, (2) infrastructure, (3) financial, (4) linkages, (5) educational management, (6) learners, and (7) health and environment. Finally, a theoretical predictive model was constructed to present the causal relationships in modeling the problems associated with implementing EDUC4. The insights generated from this work offer both theoretical and practical perspectives for stakeholders of HEIs in the implementation of EDUC4 in developing economies. Full article
(This article belongs to the Special Issue Education 4.0: Mobilizing for Sustainable Development)
Show Figures

Figure 1

Back to TopTop