References

Attwood, Sam, and Ashley Williams. 2023. “Exploring the UK Cyber Skills Gap Through a Mapping of Active Job Listings to the Cyber Security Body of Knowledge (CyBOK).” In Proceedings of the 27th International Conference on Evaluation and Assessment in Software Engineering, 273–78.
Bowker, Geoffrey, and Susan Leigh Star. 1999. “Sorting Things Out.” Classification and Its Consequences 4.
Cabinet Office, ed. 2022. “Government Cyber Security Strategy: 2022 to 2030.” https://assets.publishing.service.gov.uk/media/61f0169de90e070375c230a8/government-cyber-security-strategy.pdf.
Cámara-Menoyo, Carlos, Matt Spencer, and Timothy Monteath. 2025. “The Cyber Expertise Diversity Survey Dataset.” https://github.com/WarwickCIM/cyberexpertisediversity_survey_data. https://doi.org/10.17605/OSF.IO/GX7ME.
Daniel, CarolAnn. 2007. “Outsiders-Within: Critical Race Theory, Graduate Education and Barriers to Professionalization.” J. Soc. & Soc. Welfare 34: 25.
Dekker, Sidney, and Shawn Pruchnicki. 2014. “Drifting into Failure: Theorising the Dynamics of Disaster Incubation.” Theoretical Issues in Ergonomics Science 15 (6): 534–44.
DSIT. 2025. Cyber Security Skills in the UK Labour Market 2025. Department for Science, Innovation & Technology. https://www.gov.uk/government/publications/cyber-security-skills-in-the-uk-labour-market-2025/cyber-security-skills-in-the-uk-labour-market-2025#contents.
Evetts, Julia. 2012. “Similarities in Contexts and Theorizing: Professionalism and Inequality.” Professions and Professionalism 2 (2).
Grabher, Gernot, and David Stark. 1997. “Organizing Diversity: Evolutionary Theory, Network Analysis and Postsocialism.” Regional Studies 31 (5): 533–44.
Herring, Cedric. 2009. “Does Diversity Pay?: Race, Gender, and the Business Case for Diversity.” American Sociological Review 74 (2): 208–24.
Levine, Sheen S, Evan P Apfelbaum, Mark Bernard, Valerie L Bartelt, Edward J Zajac, and David Stark. 2014. “Ethnic Diversity Deflates Price Bubbles.” Proceedings of the National Academy of Sciences 111 (52): 18524–29.
Martin, Andrew, Awais Rashid, Howard Chivers, George Danezis, Steve Schneider, and Emil Lupu. 2021. The Cyber Security Body of Knowledge. 1.1 ed. University of Bristol. https://www.cybok.org/.
Meister, David. 2018. The History of Human Factors and Ergonomics. CRC Press.
Ministry of Defence, ed. 2021. Defence and Security Industrial Strategy: A Strategic Approach to the UK’s Defence and Security Industrial Sectors. London: Dandy Booksellers Ltd. https://assets.publishing.service.gov.uk/media/60590e988fa8f545d879f0aa/Defence_and_Security_Industrial_Strategy_-_FINAL.pdf.
National Cyber Security Centre. 2021. “Decrypting Diversity: Diversity and Inclusion in Cyber Security Report 2021.” https://www.ncsc.gov.uk/report/decrypting-diversity-2021-diversity-and-inclusion-in-cyber-security.
Nautiyal, Lata, and Awais Rashid. 2024. “A Framework for Mapping Organisational Workforce Knowledge Profile in Cyber Security.” Computers & Security 145: 103925.
NCSC, KPMG. 2020. “Decrypting Diversity: Diversity and Inclusion in Cyber Security.” National Cyber Security Centre.
Vaughan, Diane. 1996. The Challenger Launch Decision: Risky Technology, Culture, and Deviance at NASA. University of Chicago press.
Weber, Max. 2019[1921]. Economy and Society: A New Translation. Harvard University Press.
Weick, Karl E. 1987. “Organizational Culture as a Source of High Reliability.” California Management Review 29 (2): 112–27.
Wilkinson, Mark D., Michel Dumontier, IJsbrand Jan Aalbersberg, Gabrielle Appleton, Myles Axton, Arie Baak, Niklas Blomberg, et al. 2016. “The FAIR Guiding Principles for Scientific Data Management and Stewardship.” Scientific Data 3 (1): 160018. https://doi.org/10.1038/sdata.2016.18.