A MODEL OF TECHNOLOGICALLY CHOOSING EMPLOYEES IN AN AEROSPACE INDUSTRY PROJECT
The challenges of interviewing candidates for positions in cybersecure communications of aerospace industry. Data and experiments conducted as evidence that the improvements to the current model of selecting employees are needed in the real-world applications. A proposal of a newly developed method of selecting job candidates using information technology.
2. Parsons, Kathryn, and Agata McCormac. “Human Factors and Information Security: Individual, Culture and Security En-vironment.” Australian Government Department of Defense, Oct. 2010, apps.dtic.mil/dtic/tr/fulltext/u2/a535944.pdf
3. James Pierce. 2012. Undesigning technology: considering the negation of design by design. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '12). Association for Computing Machinery, New York, NY, USA, 957–966. DOI: https://doi.org/10.1145/2207676.2208540
4. Matthew S. Eastin, Carroll J. Glynn, and Robert P. Grif-fiths.CyberPsychology & Behavior.Jun 2007.436-443. http://doi.org/10.1089/cpb.2006.9935
5. Stanton, J.M., Stam, K.R., Mastrangelo, P. & Jolton, J.. Analysis of end user security behaviours. Computers and Secu-rity, 2005, 24, 124-133. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.90.9412&rep=rep1&type=pdf
6. T. Gundu and S. V. Flowerday, "Ignorance to Awareness: Towards an Information Security Awareness Process," in SAI-EE Africa Research Journal, vol. 104, no. 2, pp. 69-79, June 2013, doi: 10.23919/SAIEE.2013.8531867
7. Rachenko, Yelyzaveta. “A Working Prototype of a Smart Cybersecure Home.” Fairleigh Dickinson University - Metro-politan Campus Journal, 2019, p. 1, doi:10.6084/m9.figshare.13237883.
8. Rachenko, Y., Dotsenko, N., Enhancing the Efficiency of the Current Method of Establishing Team Members in Aero-space Communications Page 69-72 https://sci-conf.com.ua/wp-content/uploads/2020/11/FUNDAMENTAL-AND-APPLIED-RESEARCH-IN-THE-MODERN-WORLD-18-20.11.20.pdf
9. Danford, Andy, and Michael Richardson. “Capital Mobility, Job Loss, and Union Strategy The Case of the UK Aerospace Industry.” Labor Studies Journal, vol. 32, no. 3, 2007, p. 17., doi:10.1177/0160449X07299705
10. Popping, Roel. “Analyzing Open-Ended Questions by Means of Text Analysis Procedures.” Bulletin De Méthodologie Sociologique, Sept. 2015, p. 3., doi:10.1177/0759106315597389
11. Williams, Shannon. “How to Build a Recruitment Process.” Lucidchart, 2019, www.lucidchart.com/blog/creating-a-recruitment-process.
12. JONES, KEITH S. “The Core Cyber-Defense Knowledge, Skills, and Abilities That Cybersecurity Students Should Learn in School: Results from Interviews with Cybersecurity Profes-sionals.” ACM Trans. Comput. Educ., Aug. 2018, pp. 4–5., doi: https://doi.org/10.1145/3152893.
13. Rachenko, Yelyzaveta. “The Struggles of Establishing a Secure Connection Over a Network of Satellites.” National University Journal, 2018, p. 1, doi:10.6084/m9.figshare.13237886.
14. Dotsenko, Nataliia, et al. “PROJECT-ORIENTED MAN-AGEMENT OF ADAPTIVE TEAMS' FORMATION RE-SOURCES IN MULTI-PROJECT ENVIRONMENT.” CEUR Workshop Proceedings, 2019, p. 6., https://www.elibrary.ru/item.asp?id=38698392.
15. Guion, Lisa A. “Conducting an In-Depth Interview.” Uni-versity of Florida, Aug. 2011, pp. 2–3., http://greenmedicine.ie/school/images/Library/Conducting%20An%20In%20Depth%20Interview.pdf
The authors who publish in this collection agree with the following terms:
• The authors reserve the right to authorship of their work and give the magazine the right to first publish this work under the terms of license CC BY-NC-ND 4.0 (with the Designation of Authorship - Non-Commercial - Without Derivatives 4.0 International), which allows others to freely distribute the published work with a mandatory reference to the authors of the original work and the first publication of the work in this magazine.
• Authors have the right to make independent extra-exclusive work agreements in the form in which they were published by this magazine (for example, posting work in an electronic repository of an institution or publishing as part of a monograph), provided that the link to the first publication of the work in this journal is maintained. .
• Journal policy allows and encourages the publication of manuscripts on the Internet (for example, in institutions' repositories or on personal websites), both before the publication of this manuscript and during its editorial work, as it contributes to the emergence of productive scientific discussion and positively affects the efficiency and dynamics of the citation of the published work (see The Effect of Open Access).