References
Attwood, Sam, and Ashley Williams. 2023. “Exploring the UK Cyber
Skills Gap Through a Mapping of Active Job Listings to the Cyber
Security Body of Knowledge (CyBOK).” In Proceedings of the
27th International Conference on Evaluation and Assessment in Software
Engineering, 273–78.
Bowker, Geoffrey, and Susan Leigh Star. 1999. “Sorting Things
Out.” Classification and Its Consequences 4.
Cabinet Office, ed. 2022. “Government Cyber Security
Strategy: 2022 to 2030.” https://assets.publishing.service.gov.uk/media/61f0169de90e070375c230a8/government-cyber-security-strategy.pdf.
Cámara-Menoyo, Carlos, Matt Spencer, and Timothy Monteath. 2025.
“The Cyber Expertise Diversity Survey
Dataset.”
https://github.com/WarwickCIM/cyberexpertisediversity_survey_data. https://doi.org/10.17605/OSF.IO/GX7ME.
Daniel, CarolAnn. 2007. “Outsiders-Within: Critical Race Theory,
Graduate Education and Barriers to Professionalization.” J.
Soc. & Soc. Welfare 34: 25.
Dekker, Sidney, and Shawn Pruchnicki. 2014. “Drifting into
Failure: Theorising the Dynamics of Disaster Incubation.”
Theoretical Issues in Ergonomics Science 15 (6): 534–44.
DSIT. 2025. Cyber Security Skills in the UK Labour Market 2025.
Department for Science, Innovation & Technology. https://www.gov.uk/government/publications/cyber-security-skills-in-the-uk-labour-market-2025/cyber-security-skills-in-the-uk-labour-market-2025#contents.
Evetts, Julia. 2012. “Similarities in Contexts and Theorizing:
Professionalism and Inequality.” Professions and
Professionalism 2 (2).
Grabher, Gernot, and David Stark. 1997. “Organizing Diversity:
Evolutionary Theory, Network Analysis and Postsocialism.”
Regional Studies 31 (5): 533–44.
Herring, Cedric. 2009. “Does Diversity Pay?: Race, Gender, and the
Business Case for Diversity.” American Sociological
Review 74 (2): 208–24.
Levine, Sheen S, Evan P Apfelbaum, Mark Bernard, Valerie L Bartelt,
Edward J Zajac, and David Stark. 2014. “Ethnic Diversity Deflates
Price Bubbles.” Proceedings of the National Academy of
Sciences 111 (52): 18524–29.
Martin, Andrew, Awais Rashid, Howard Chivers, George Danezis, Steve
Schneider, and Emil Lupu. 2021. The Cyber Security Body of
Knowledge. 1.1 ed. University of Bristol. https://www.cybok.org/.
Meister, David. 2018. The History of Human Factors and
Ergonomics. CRC Press.
Ministry of Defence, ed. 2021. Defence and Security Industrial
Strategy: A Strategic Approach to the
UK’s Defence and Security Industrial Sectors. London:
Dandy Booksellers Ltd. https://assets.publishing.service.gov.uk/media/60590e988fa8f545d879f0aa/Defence_and_Security_Industrial_Strategy_-_FINAL.pdf.
National Cyber Security Centre. 2021. “Decrypting Diversity:
Diversity and Inclusion in Cyber Security Report
2021.” https://www.ncsc.gov.uk/report/decrypting-diversity-2021-diversity-and-inclusion-in-cyber-security.
Nautiyal, Lata, and Awais Rashid. 2024. “A Framework for Mapping
Organisational Workforce Knowledge Profile in Cyber Security.”
Computers & Security 145: 103925.
NCSC, KPMG. 2020. “Decrypting Diversity: Diversity and Inclusion
in Cyber Security.” National Cyber Security Centre.
Vaughan, Diane. 1996. The Challenger Launch Decision: Risky
Technology, Culture, and Deviance at NASA. University of Chicago
press.
Weber, Max. 2019[1921]. Economy and Society: A New Translation.
Harvard University Press.
Weick, Karl E. 1987. “Organizational Culture as a Source of High
Reliability.” California Management Review 29 (2):
112–27.
Wilkinson, Mark D., Michel Dumontier, IJsbrand Jan Aalbersberg,
Gabrielle Appleton, Myles Axton, Arie Baak, Niklas Blomberg, et al.
2016. “The FAIR Guiding Principles for Scientific Data Management
and Stewardship.” Scientific Data 3 (1): 160018. https://doi.org/10.1038/sdata.2016.18.