This database system integrates cybersecurity job postings published by A-share listed companies and their affiliated entities (including subsidiaries and associated companies), covering three major recruitment platforms (sources B, C, E).
The dataset is constructed through a dual screening mechanism:
- Topic Identification: Extracts cybersecurity-related positions from full recruitment data across sources B/C/E based on 200+ cybersecurity keywords (e.g., "information security", "network security", "data security", "firewall").
- Corporate Affiliation: Performs fuzzy matching between recruiting company names and the list of listed companies and their affiliates to ensure comprehensive mapping of corporate hierarchies (e.g., subsidiaries/associated companies).
The database encompasses 40+ fields including stock codes, corporate affiliation relationships, job function descriptions, skill tags, salary information, and geographic distribution (detailed in the form structure). Spanning 2014-2024, it provides structured microdata support for researching corporate cybersecurity human capital investment.
Key Features:
- Corporate Hierarchy Penetration: Maps equity relationships between listed companies and recruiting entities (e.g., "subsidiaries/associated companies of listed companies"), revealing cybersecurity resource allocation strategies within conglomerates and filling the research gap in traditional corporate organizational structure data.
- Multi-dimensional Coverage:
- Spatial dimension: Work locations refined to provincial/municipal/district levels.
- Temporal dimension: Posting dates precise to daily granularity, enabling longitudinal trend analysis.
- Functional dimension: Covers full-chain positions including technical (penetration testing), managerial (Security Operations Director), and compliance (Classified Protection Engineer) roles.
- Complementary Affiliation Fields: Bidirectional verification between "Recruiting Company Name" and "Affiliated Company Name", supplemented by "Fuzzy Matched Name" to enhance fault tolerance in entity identification and ensure linkage accuracy.
- Dynamic Quality Control: The "Tag" field indicates matching quality (e.g., "1-Position Match", "2-Skill Tag Match"), enabling researchers to filter high-confidence samples and reduce noise interference.
Potential Applications:
- Academic Research: Correlates job skill requirements with corporate patents/R&D investment to validate technology implementation pathways; analyzes cybersecurity talent agglomeration effects by geographic distribution.
- Business Services: Benchmarks peer recruitment strategies; enables risk early-warning by inferring security incident response needs through anomalous high-salary recruitment patterns.
The CnOpenData Cybersecurity Job Posting Dataset of A-Share Listed Companies provides the first systematic integration of panoramic dynamics in cybersecurity human capital among China's A-share listed firms. Leveraging advantages such as corporate hierarchy penetration and multi-dimensional coverage, it fills the microdata gap in cybersecurity economics research. This dataset offers granular evidence for academia to investigate corporate digital security investment logic and for industries to optimize talent strategies, facilitating multidimensional analysis of China's cybersecurity capacity building.
Data Scale
Time Coverage
2014-2024 (updatable upon request)
Field Display
Sample Data
Cybersecurity Job Postings of A-Share Listed Companies - Source B
Cybersecurity Job Postings of A-Share Listed Companies - Source C
Cybersecurity Job Postings of A-Share Listed Companies - Source E
Relevant Literature
- Sun Kunpeng, Luo Ting, Xiao Xing, 2021: "Talent Policies, R&D Personnel Recruitment, and Corporate Innovation", Economic Research Journal, No. 8.
Data Update Frequency
Annual updates