A Career Interest Inventory for Cybersecurity: Development and Initial Validation
APA Citation
Page, R. & Ivanova, O. (2023). A Career Interest Inventory for Cybersecurity: Development and Initial Validation. *Journal of Cybersecurity*.
View source →What Did This Cybersecurity Research Find?
This cybersecurity career assessment study developed a career interest inventory specific to security work roles and validated it across 2,000 participants. The cybersecurity career interest inventory identified six distinct interest clusters that mapped to NICE Framework work role categories with good convergent validity.
Key Findings
- 1Six interest clusters emerged: Defend, Investigate, Build, Govern, Analyze, and Test
- 2Interest clusters aligned with NICE Framework categories with good convergent validity (r = 0.45-0.62)
- 3Interest-role fit predicted job satisfaction at 2-year follow-up (r = 0.38)
- 4The inventory reliably differentiated between security specialization preferences
- 5Students who chose roles aligned with their interest profile reported 27% higher job satisfaction
How Does This Apply to Cybersecurity Careers?
Career explorers can use interest inventories to identify which cybersecurity specialization aligns with their preferences. This supports more informed career decisions.
Who Should Read This?
entry level · researcher
Frequently Asked Questions
What did this cybersecurity research find?
This cybersecurity career assessment study developed a career interest inventory specific to security work roles and validated it across 2,000 participants. The cybersecurity career interest inventory identified six distinct interest clusters that mapped to NICE Framework work role categories with good convergent validity.
How is this research relevant to cybersecurity careers?
Career explorers can use interest inventories to identify which cybersecurity specialization aligns with their preferences. This supports more informed career decisions.
Where was this cybersecurity research published?
This study was published in Journal of Cybersecurity in 2023. Access the original paper through the publisher link above.
Sources
Explore Related Cybersecurity Resources
Was this page helpful?
Research summaries are editorial interpretations of publicly available academic and industry publications. DecipherU is not affiliated with the authors or publishers cited. Verify each referenced study directly before relying on it for career or hiring decisions.
Get cybersecurity career insights delivered weekly
Join cybersecurity professionals receiving weekly intelligence on threats, job market trends, salary data, and career growth strategies.
By subscribing you agree to our privacy policy. Unsubscribe anytime.