RelevantLiterature
• Radziwill,N.&Benton,M.(2017).Costofquality:Managingthecostsofcybersecurityrisk
management.AdministrativeScienceQuarterly. Vol.19(4).
• Carnevale,A.,Smith,N.,&Strohl,J.(2010).Helpwanted:Projectionsofjobsandeducation
requirementsthrough2018.Washington,DC:GeorgetownUniversityCenteronEducationand
theWorkforce.
• Harris,M.,Patten,K.(2015).UsingBloomandWebb’staxonomiestointegrateemerging
cybersecuritytopicsintoacomputingcurriculum.JournalofInformationSystemsEducation. Vol
26(3).
• Knapp,K.J.,Maurer,C.,&Plachkinova,M.(2017).Maintainingacybersecuritycurriculum:
Professionalcertificationsasvaluableguidance. JournalofInformationSystemsEducation, 28(2),
101‐113.
• Schwartz,R.(2016).Thecareerpathwaysmovement:Strategyforincreasingopportunityand
mobility.JournalofSocialIssues. Vol.72(4).
• Wilbanks,L.(2011)Otherdutiesasassigned?.ITPro.IEEEComputerSociety.
• NationalInitiativeforCybersecurityEducation,NationalCybersecurityWorkforceFramework,ver.
2.0,https://www.nist.gov/file/359261
• U.S.DepartmentofHomelandSecurity,CybersecurityWorkforceDevelopmentToolkit(CWDT),
https://niccs.us‐cert.gov/workforce‐development/cybersecurity‐workforce‐development‐toolkit