Chng, S., Lu, H. Y., Kumar, A., & Yau, D. (2022). Hacker
types, motivations and strategies: A comprehensive
framework. Computers in Human Behavior Reports, 5,
100167.
Croasdell. D., Elste, J. and Hill, A. (2018) Cyber Clinics:
Re-imagining Cyber Security Awareness Proceedings
of the 51st Annual Hawaii International Conference on
Information Systems, Waikoloa, HI
Crumpler, W., & Lewis, J. A. (2019). The cybersecurity
workforce gap (p. 10). Washington, DC, USA: Center
for Strategic and International Studies (CSIS).
Dawson J and Thomson R (2018) The Future Cybersecurity
Workforce: Going Beyond Technical Skills for
Successful Cyber Performance. Front. Psychol. 9:744.
doi: 10.3389/fpsyg.2018.00744
Dameff, C. J., Selzer, J. A., Fisher, J., Killeen, J. P., &
Tully, J. L. (2019). Clinical cybersecurity training
through novel high-fidelity simulations. The Journal of
emergency medicine, 56(2), 233-238.
Fanwei, Q. U., Jin, H. E., Hua, M. A., Yanling, J., Wenlan,
Z., Chongsuvivatwong, V., & Runsheng, J. (2019). A
comparative analysis of medical education models and
curriculums of a Medical University and a medical
education center. JNMA: Journal of the Nepal Medical
Association, 57(215), 45.
Gürer, D. (2002). Women in computing history. ACM
SIGCSE Bulletin, 34(2), 116-120.
Hardison, C. M., Whitaker, J., Bean, D., Pavisic, I., Kramer,
J. W., Crosby, B., ... & Haberman, R. (2021). Building
the Best Offensive and Defensiv e Cyber Workforce.
Howell, W.S. (1982). The empathic communicator.
University of Minnesota: Wadsworth Publishing
Company
Hubbell 2008 DOI: 10.3138/jvme.35.1.062
Lathrop, L, Croasdell, D & Elste, J (2023) Extending the
Cyber Capabilities of Small to Midsize Businesses
Proceedings of the 56tht Annual Hawaii International
Conference on Information Systems, Ka’anapali, HI
Lemke, S., & Vilcinskas, A. (2020). European medicinal
leeches—new roles in modern medicine. Biomedicines,
8(5), 99.
Le Compte, A., Elizondo, D., & Watson, T. (2015, May). A
renewed approach to serious games for cyber security.
In 2015 7th International Conference on Cyber
Conflict: Architectures in Cyberspace (pp. 203-216).
IEEE.
Modanlou, H. D. (2011). Historical evidence for the origin
of teaching hospital, medical school and the rise of
academic medicine. Journal of Perinatology, 31(4),
236-239. 44(1): 3-13, at p. 4.
Paller, Alan (2011). Testimony to the Nevada
Technological Crime Advisory Board, December 16,
2011.
Parker, Donn B. (1998). Fighting Computer Crime. New
York, NY: John Wiley & Sons. ISBN 0-471-16378-3.
Pender-Bey, George. "The Parkerian Hexad, the CIA Triad
Model Expanded -- MSc thesis"
Pender-Bey, G. (2019). The parkerian hexad. Information
Security Program at Lewis University.
Reid, R. C., & Gilbert, A. H. (2010, October). Using the
Parkerian Hexad to introduce security in an information
literacy class. In 2010 Information Security Curriculum
Development Conference (pp. 45-47).
Reilly, R. F. (2016, April). Medical and surgical care during
the American Civil War, 1861-1865. In Baylor
University Medical Center Proceedings (Vol. 29, No. 2,
pp. 138-142). Taylor & Francis.
Ruoslahti, H., Coburn, J., Trent, A., & Tikanmäki, I.
(2022). Cyber Skills Gaps–A Systematic Review of the
Academic Literature.
Schelling, Thomas C. (1960). The strategy of conflict
(First ed.). Cambridge: Harvard University Press.
ISBN 978-0-674-84031-7
Schneider, F. B. (2013). Cybersecurity education in
universities. IEEE Security & Privacy, 11(4), 3-4. .
Shaw, J. (2022). Revisiting the Basic/Applied Science
Distinction: The Significance of Urgent Science for
Science Funding Policy. Journal for General
Philosophy of Science, 1-23.
Shneiderman, B. (1998). Relate–Create–Donate: a
teaching/learning philosophy for the cyber-generation.
Computers & education, 31(1), 25-39.
Thomson, A. (1960). History and development of teaching
hospitals in England. British Medical Journal, 2(5201),
749.
Topham, L., Kifayat, K., Younis, Y. A., Shi, Q., & Askwith,
B. (2016). Cyber security teaching and learning
laboratories: A survey. Information & Security, 35(1),
51.
TX-DIR Texas Dept. of Information Resources
https://www.youtube.com/watch?v=YFRK_sImKkQ
Vogel, R. (2016). Closing the cybersecurity skills gap.
Salus Journal, 4(2), 32-46.
Ukwandu, E., Farah, M. A. B., Hindy, H., Brosset, D.,
Kavallieros, D., Atkinson, R., ... & Bellekens, X.
(2020). A review of cyber-ranges and test-beds: Current
and future trends. Sensors, 20(24), 7148.
UWM - Univ. of Wisconsin, Madison (1965)
https://research.cs.wisc.edu/includes/textfiles/phds.65-
70.txt
Zeckhauser, R. (1989). Distinguished Fellow: Reflections
of Thomas Schelling. Journal of Economic
Perspectives, 3(2), 153-164.